summaryrefslogtreecommitdiffstats
path: root/security/security.c
AgeCommit message (Expand)AuthorFilesLines
2019-12-09security,lockdown,selinux: implement SELinux lockdownStephen Smalley1-0/+33
2019-10-17perf_event: Add support for LSM and SELinux checksJoel Fernandes (Google)1-0/+27
2019-09-28Merge branch 'next-lockdown' of git://git.kernel.org/pub/scm/linux/kernel/git...Linus Torvalds1-8/+48
2019-09-23Merge tag 'selinux-pr-20190917' of git://git.kernel.org/pub/scm/linux/kernel/...Linus Torvalds1-0/+6
2019-08-19security: Add a "locked down" LSM hookMatthew Garrett1-0/+6
2019-08-19security: Support early LSMsMatthew Garrett1-8/+42
2019-08-12fanotify, inotify, dnotify, security: add security hook for fs notificationsAaron Goidel1-0/+6
2019-07-08Merge branch 'next-integrity' of git://git.kernel.org/pub/scm/linux/kernel/gi...Linus Torvalds1-10/+13
2019-06-14LSM: switch to blocking policy update notifiersJanne Karhunen1-10/+13
2019-05-30treewide: Replace GPLv2 boilerplate/reference with SPDX - rule 152Thomas Gleixner1-5/+1
2019-05-07Merge branch 'work.mount-syscalls' of git://git.kernel.org/pub/scm/linux/kern...Linus Torvalds1-0/+5
2019-03-20LSM: add new hook for kernfs node initializationOndrej Mosnacek1-0/+6
2019-03-20vfs: syscall: Add move_mount(2) to move mounts aroundDavid Howells1-0/+5
2019-03-12Merge branch 'work.mount' of git://git.kernel.org/pub/scm/linux/kernel/git/vi...Linus Torvalds1-0/+10
2019-03-07Merge tag 'audit-pr-20190305' of git://git.kernel.org/pub/scm/linux/kernel/gi...Linus Torvalds1-4/+2
2019-02-28introduce cloning of fs_contextAl Viro1-0/+5
2019-02-28vfs: Add LSM hooks for the new mount APIDavid Howells1-0/+5
2019-02-25LSM: Ignore "security=" when "lsm=" is specifiedKees Cook1-2/+6
2019-01-31audit: remove unused actx param from audit_rule_matchRichard Guy Briggs1-4/+2
2019-01-22Merge tag 'v5.0-rc3' into next-generalJames Morris1-0/+7
2019-01-18LSM: Make some functions staticWei Yongjun1-3/+3
2019-01-18LSM: Make lsm_early_cred() and lsm_early_task() local functions.Tetsuo Handa1-16/+11
2019-01-16LSM: Check for NULL cred-security on freeJames Morris1-0/+7
2019-01-10LSM: generalize flag passing to security_capableMicah Morton1-9/+5
2019-01-08LSM: Infrastructure management of the ipc security blobCasey Schaufler1-4/+87
2019-01-08LSM: Infrastructure management of the task securityCasey Schaufler1-1/+53
2019-01-08LSM: Infrastructure management of the inode securityCasey Schaufler1-2/+62
2019-01-08LSM: Infrastructure management of the file securityCasey Schaufler1-3/+51
2019-01-08Infrastructure management of the cred security blobCasey Schaufler1-2/+87
2019-01-08procfs: add smack subdir to attrsCasey Schaufler1-4/+20
2019-01-08capability: Initialize as LSM_ORDER_FIRSTKees Cook1-5/+0
2019-01-08LSM: Introduce enum lsm_orderKees Cook1-1/+8
2019-01-08Yama: Initialize as ordered LSMKees Cook1-1/+0
2019-01-08LoadPin: Initialize as ordered LSMKees Cook1-1/+0
2019-01-08LSM: Split LSM preparation from initializationKees Cook1-6/+15
2019-01-08LSM: Add all exclusive LSMs to ordered initializationCasey Schaufler1-25/+20
2019-01-08LSM: Separate idea of "major" LSM from "exclusive" LSMKees Cook1-0/+12
2019-01-08LSM: Refactor "security=" in terms of enable/disableKees Cook1-8/+20
2019-01-08LSM: Prepare for reorganizing "security=" logicKees Cook1-9/+8
2019-01-08LSM: Tie enabling logic to presence in ordered listKees Cook1-3/+11
2019-01-08LSM: Introduce "lsm=" for boottime LSM selectionKees Cook1-1/+13
2019-01-08LSM: Introduce CONFIG_LSMKees Cook1-5/+22
2019-01-08LSM: Build ordered list of LSMs to initializeKees Cook1-5/+53
2019-01-08LSM: Lift LSM selection out of individual LSMsKees Cook1-31/+71
2019-01-08LSM: Provide separate ordered initializationKees Cook1-0/+21
2019-01-05Merge branch 'mount.part1' of git://git.kernel.org/pub/scm/linux/kernel/git/v...Linus Torvalds1-13/+26
2018-12-21LSM: new method: ->sb_add_mnt_opt()Al Viro1-3/+5
2018-12-21LSM: hide struct security_mnt_opts from any generic codeAl Viro1-9/+18
2018-12-21LSM: turn sb_eat_lsm_opts() into a methodAl Viro1-10/+1
2018-12-21btrfs: sanitize security_mnt_opts useAl Viro1-0/+1