path: root/security/security.c (unfollow)
AgeCommit message (Expand)AuthorFilesLines
2019-08-12fanotify, inotify, dnotify, security: add security hook for fs notificationsAaron Goidel1-0/+6
2019-06-14LSM: switch to blocking policy update notifiersJanne Karhunen1-10/+13
2019-05-30treewide: Replace GPLv2 boilerplate/reference with SPDX - rule 152Thomas Gleixner1-5/+1
2019-03-20LSM: add new hook for kernfs node initializationOndrej Mosnacek1-0/+6
2019-03-20vfs: syscall: Add move_mount(2) to move mounts aroundDavid Howells1-0/+5
2019-02-28introduce cloning of fs_contextAl Viro1-0/+5
2019-02-28vfs: Add LSM hooks for the new mount APIDavid Howells1-0/+5
2019-02-25LSM: Ignore "security=" when "lsm=" is specifiedKees Cook1-2/+6
2019-01-31audit: remove unused actx param from audit_rule_matchRichard Guy Briggs1-4/+2
2019-01-18LSM: Make some functions staticWei Yongjun1-3/+3
2019-01-18LSM: Make lsm_early_cred() and lsm_early_task() local functions.Tetsuo Handa1-16/+11
2019-01-16LSM: Check for NULL cred-security on freeJames Morris1-0/+7
2019-01-10LSM: generalize flag passing to security_capableMicah Morton1-9/+5
2019-01-08LSM: Infrastructure management of the ipc security blobCasey Schaufler1-4/+87
2019-01-08LSM: Infrastructure management of the task securityCasey Schaufler1-1/+53
2019-01-08LSM: Infrastructure management of the inode securityCasey Schaufler1-2/+62
2019-01-08LSM: Infrastructure management of the file securityCasey Schaufler1-3/+51
2019-01-08Infrastructure management of the cred security blobCasey Schaufler1-2/+87
2019-01-08procfs: add smack subdir to attrsCasey Schaufler1-4/+20
2019-01-08capability: Initialize as LSM_ORDER_FIRSTKees Cook1-5/+0
2019-01-08LSM: Introduce enum lsm_orderKees Cook1-1/+8
2019-01-08Yama: Initialize as ordered LSMKees Cook1-1/+0
2019-01-08LoadPin: Initialize as ordered LSMKees Cook1-1/+0
2019-01-08LSM: Split LSM preparation from initializationKees Cook1-6/+15
2019-01-08LSM: Add all exclusive LSMs to ordered initializationCasey Schaufler1-25/+20
2019-01-08LSM: Separate idea of "major" LSM from "exclusive" LSMKees Cook1-0/+12
2019-01-08LSM: Refactor "security=" in terms of enable/disableKees Cook1-8/+20
2019-01-08LSM: Prepare for reorganizing "security=" logicKees Cook1-9/+8
2019-01-08LSM: Tie enabling logic to presence in ordered listKees Cook1-3/+11
2019-01-08LSM: Introduce "lsm=" for boottime LSM selectionKees Cook1-1/+13
2019-01-08LSM: Introduce CONFIG_LSMKees Cook1-5/+22
2019-01-08LSM: Build ordered list of LSMs to initializeKees Cook1-5/+53
2019-01-08LSM: Lift LSM selection out of individual LSMsKees Cook1-31/+71
2019-01-08LSM: Provide separate ordered initializationKees Cook1-0/+21
2018-12-21LSM: new method: ->sb_add_mnt_opt()Al Viro1-3/+5
2018-12-21LSM: hide struct security_mnt_opts from any generic codeAl Viro1-9/+18
2018-12-21LSM: turn sb_eat_lsm_opts() into a methodAl Viro1-10/+1
2018-12-21btrfs: sanitize security_mnt_opts useAl Viro1-0/+1
2018-12-21LSM: split ->sb_set_mnt_opts() out of ->sb_kern_mount()Al Viro1-3/+2
2018-12-21new helper: security_sb_eat_lsm_opts()Al Viro1-3/+12
2018-12-21LSM: lift extracting and parsing LSM options into the caller of ->sb_remount()Al Viro1-2/+3
2018-12-21LSM: lift parsing LSM options into the caller of ->sb_kern_mount()Al Viro1-2/+3
2018-12-12security: audit and remove any unnecessary uses of module.hPaul Gortmaker1-1/+1
2018-10-10LSM: Don't ignore initialization failuresKees Cook1-1/+3
2018-10-10LSM: Provide init debugging infrastructureKees Cook1-0/+18
2018-10-10LSM: Convert from initcall to struct lsm_infoKees Cook1-9/+5
2018-10-10LSM: Remove initcall tracingKees Cook1-7/+1
2018-10-10LSM: Rename .security_initcall section to .lsm_infoKees Cook1-2/+2
2018-10-10LSM: Correctly announce start of LSM initializationKees Cook1-1/+2
2018-10-03signal: Distinguish between kernel_siginfo and siginfoEric W. Biederman1-1/+1