aboutsummaryrefslogtreecommitdiffstatshomepage
path: root/security/security.c (follow)
AgeCommit message (Expand)AuthorFilesLines
2020-06-06Merge tag 'integrity-v5.8' of git://git.kernel.org/pub/scm/linux/kernel/git/zohar/linux-integrityLinus Torvalds1-1/+6
2020-06-04Merge branch 'exec-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/ebiederm/user-namespaceLinus Torvalds1-2/+7
2020-05-29exec: Compute file based creds only onceEric W. Biederman1-2/+2
2020-05-22ima: verify mprotect change is consistent with mmap policyMimi Zohar1-1/+6
2020-05-21exec: Convert security_bprm_set_creds into security_bprm_repopulate_credsEric W. Biederman1-2/+2
2020-05-20security: Fix hook iteration for secid_to_secctxKP Singh1-2/+14
2020-05-20exec: Factor security_bprm_creds_for_exec out of security_bprm_set_credsEric W. Biederman1-0/+5
2020-03-30security: Refactor declaration of LSM hooksKP Singh1-11/+30
2020-01-28Merge branch 'for-v5.6' of git://git.kernel.org:/pub/scm/linux/kernel/git/jmorris/linux-securityLinus Torvalds1-1/+0
2020-01-27security: remove EARLY_LSM_COUNT which never usedAlex Shi1-1/+0
2019-12-09security,lockdown,selinux: implement SELinux lockdownStephen Smalley1-0/+33
2019-10-17perf_event: Add support for LSM and SELinux checksJoel Fernandes (Google)1-0/+27
2019-09-28Merge branch 'next-lockdown' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-securityLinus Torvalds1-8/+48
2019-09-23Merge tag 'selinux-pr-20190917' of git://git.kernel.org/pub/scm/linux/kernel/git/pcmoore/selinuxLinus Torvalds1-0/+6
2019-08-19security: Add a "locked down" LSM hookMatthew Garrett1-0/+6
2019-08-19security: Support early LSMsMatthew Garrett1-8/+42
2019-08-12fanotify, inotify, dnotify, security: add security hook for fs notificationsAaron Goidel1-0/+6
2019-07-08Merge branch 'next-integrity' of git://git.kernel.org/pub/scm/linux/kernel/git/zohar/linux-integrityLinus Torvalds1-10/+13
2019-06-14LSM: switch to blocking policy update notifiersJanne Karhunen1-10/+13
2019-05-30treewide: Replace GPLv2 boilerplate/reference with SPDX - rule 152Thomas Gleixner1-5/+1
2019-05-07Merge branch 'work.mount-syscalls' of git://git.kernel.org/pub/scm/linux/kernel/git/viro/vfsLinus Torvalds1-0/+5
2019-03-20LSM: add new hook for kernfs node initializationOndrej Mosnacek1-0/+6
2019-03-20vfs: syscall: Add move_mount(2) to move mounts aroundDavid Howells1-0/+5
2019-03-12Merge branch 'work.mount' of git://git.kernel.org/pub/scm/linux/kernel/git/viro/vfsLinus Torvalds1-0/+10
2019-03-07Merge tag 'audit-pr-20190305' of git://git.kernel.org/pub/scm/linux/kernel/git/pcmoore/auditLinus Torvalds1-4/+2
2019-02-28introduce cloning of fs_contextAl Viro1-0/+5
2019-02-28vfs: Add LSM hooks for the new mount APIDavid Howells1-0/+5
2019-02-25LSM: Ignore "security=" when "lsm=" is specifiedKees Cook1-2/+6
2019-01-31audit: remove unused actx param from audit_rule_matchRichard Guy Briggs1-4/+2
2019-01-22Merge tag 'v5.0-rc3' into next-generalJames Morris1-0/+7
2019-01-18LSM: Make some functions staticWei Yongjun1-3/+3
2019-01-18LSM: Make lsm_early_cred() and lsm_early_task() local functions.Tetsuo Handa1-16/+11
2019-01-16LSM: Check for NULL cred-security on freeJames Morris1-0/+7
2019-01-10LSM: generalize flag passing to security_capableMicah Morton1-9/+5
2019-01-08LSM: Infrastructure management of the ipc security blobCasey Schaufler1-4/+87
2019-01-08LSM: Infrastructure management of the task securityCasey Schaufler1-1/+53
2019-01-08LSM: Infrastructure management of the inode securityCasey Schaufler1-2/+62
2019-01-08LSM: Infrastructure management of the file securityCasey Schaufler1-3/+51
2019-01-08Infrastructure management of the cred security blobCasey Schaufler1-2/+87
2019-01-08procfs: add smack subdir to attrsCasey Schaufler1-4/+20
2019-01-08capability: Initialize as LSM_ORDER_FIRSTKees Cook1-5/+0
2019-01-08LSM: Introduce enum lsm_orderKees Cook1-1/+8
2019-01-08Yama: Initialize as ordered LSMKees Cook1-1/+0
2019-01-08LoadPin: Initialize as ordered LSMKees Cook1-1/+0
2019-01-08LSM: Split LSM preparation from initializationKees Cook1-6/+15
2019-01-08LSM: Add all exclusive LSMs to ordered initializationCasey Schaufler1-25/+20
2019-01-08LSM: Separate idea of "major" LSM from "exclusive" LSMKees Cook1-0/+12
2019-01-08LSM: Refactor "security=" in terms of enable/disableKees Cook1-8/+20
2019-01-08LSM: Prepare for reorganizing "security=" logicKees Cook1-9/+8
2019-01-08LSM: Tie enabling logic to presence in ordered listKees Cook1-3/+11