aboutsummaryrefslogtreecommitdiffstats
path: root/security/security.c (unfollow)
AgeCommit message (Expand)AuthorFilesLines
2020-01-27security: remove EARLY_LSM_COUNT which never usedAlex Shi1-1/+0
2019-12-09security,lockdown,selinux: implement SELinux lockdownStephen Smalley1-0/+33
2019-10-17perf_event: Add support for LSM and SELinux checksJoel Fernandes (Google)1-0/+27
2019-08-19security: Add a "locked down" LSM hookMatthew Garrett1-0/+6
2019-08-19security: Support early LSMsMatthew Garrett1-8/+42
2019-08-12fanotify, inotify, dnotify, security: add security hook for fs notificationsAaron Goidel1-0/+6
2019-06-14LSM: switch to blocking policy update notifiersJanne Karhunen1-10/+13
2019-05-30treewide: Replace GPLv2 boilerplate/reference with SPDX - rule 152Thomas Gleixner1-5/+1
2019-03-20LSM: add new hook for kernfs node initializationOndrej Mosnacek1-0/+6
2019-03-20vfs: syscall: Add move_mount(2) to move mounts aroundDavid Howells1-0/+5
2019-02-28introduce cloning of fs_contextAl Viro1-0/+5
2019-02-28vfs: Add LSM hooks for the new mount APIDavid Howells1-0/+5
2019-02-25LSM: Ignore "security=" when "lsm=" is specifiedKees Cook1-2/+6
2019-01-31audit: remove unused actx param from audit_rule_matchRichard Guy Briggs1-4/+2
2019-01-18LSM: Make some functions staticWei Yongjun1-3/+3
2019-01-18LSM: Make lsm_early_cred() and lsm_early_task() local functions.Tetsuo Handa1-16/+11
2019-01-16LSM: Check for NULL cred-security on freeJames Morris1-0/+7
2019-01-10LSM: generalize flag passing to security_capableMicah Morton1-9/+5
2019-01-08LSM: Infrastructure management of the ipc security blobCasey Schaufler1-4/+87
2019-01-08LSM: Infrastructure management of the task securityCasey Schaufler1-1/+53
2019-01-08LSM: Infrastructure management of the inode securityCasey Schaufler1-2/+62
2019-01-08LSM: Infrastructure management of the file securityCasey Schaufler1-3/+51
2019-01-08Infrastructure management of the cred security blobCasey Schaufler1-2/+87
2019-01-08procfs: add smack subdir to attrsCasey Schaufler1-4/+20
2019-01-08capability: Initialize as LSM_ORDER_FIRSTKees Cook1-5/+0
2019-01-08LSM: Introduce enum lsm_orderKees Cook1-1/+8
2019-01-08Yama: Initialize as ordered LSMKees Cook1-1/+0
2019-01-08LoadPin: Initialize as ordered LSMKees Cook1-1/+0
2019-01-08LSM: Split LSM preparation from initializationKees Cook1-6/+15
2019-01-08LSM: Add all exclusive LSMs to ordered initializationCasey Schaufler1-25/+20
2019-01-08LSM: Separate idea of "major" LSM from "exclusive" LSMKees Cook1-0/+12
2019-01-08LSM: Refactor "security=" in terms of enable/disableKees Cook1-8/+20
2019-01-08LSM: Prepare for reorganizing "security=" logicKees Cook1-9/+8
2019-01-08LSM: Tie enabling logic to presence in ordered listKees Cook1-3/+11
2019-01-08LSM: Introduce "lsm=" for boottime LSM selectionKees Cook1-1/+13
2019-01-08LSM: Introduce CONFIG_LSMKees Cook1-5/+22
2019-01-08LSM: Build ordered list of LSMs to initializeKees Cook1-5/+53
2019-01-08LSM: Lift LSM selection out of individual LSMsKees Cook1-31/+71
2019-01-08LSM: Provide separate ordered initializationKees Cook1-0/+21
2018-12-21LSM: new method: ->sb_add_mnt_opt()Al Viro1-3/+5
2018-12-21LSM: hide struct security_mnt_opts from any generic codeAl Viro1-9/+18
2018-12-21LSM: turn sb_eat_lsm_opts() into a methodAl Viro1-10/+1
2018-12-21btrfs: sanitize security_mnt_opts useAl Viro1-0/+1
2018-12-21LSM: split ->sb_set_mnt_opts() out of ->sb_kern_mount()Al Viro1-3/+2
2018-12-21new helper: security_sb_eat_lsm_opts()Al Viro1-3/+12
2018-12-21LSM: lift extracting and parsing LSM options into the caller of ->sb_remount()Al Viro1-2/+3
2018-12-21LSM: lift parsing LSM options into the caller of ->sb_kern_mount()Al Viro1-2/+3
2018-12-12security: audit and remove any unnecessary uses of module.hPaul Gortmaker1-1/+1
2018-10-10LSM: Don't ignore initialization failuresKees Cook1-1/+3
2018-10-10LSM: Provide init debugging infrastructureKees Cook1-0/+18