summaryrefslogtreecommitdiff
path: root/include/linux/security.h
AgeCommit message (Expand)AuthorFilesLines
2019-09-28Merge branch 'next-lockdown' of git://git.kernel.org/pub/scm/linux/kernel/git...Linus Torvalds1-0/+59
2019-09-23Merge tag 'selinux-pr-20190917' of git://git.kernel.org/pub/scm/linux/kernel/...Linus Torvalds1-2/+8
2019-08-20tracefs: Restrict tracefs when the kernel is locked downMatthew Garrett1-0/+1
2019-08-20debugfs: Restrict debugfs when the kernel is locked downDavid Howells1-0/+1
2019-08-20lockdown: Lock down perf when in confidentiality modeDavid Howells1-0/+1
2019-08-20bpf: Restrict bpf when kernel lockdown is in confidentiality modeDavid Howells1-0/+1
2019-08-20lockdown: Lock down tracing and perf kprobes when in confidentiality modeDavid Howells1-0/+1
2019-08-20lockdown: Lock down /proc/kcoreDavid Howells1-0/+1
2019-08-20x86/mmiotrace: Lock down the testmmiotrace moduleDavid Howells1-0/+1
2019-08-20lockdown: Lock down module params that specify hardware parameters (eg. ioport)David Howells1-0/+1
2019-08-20lockdown: Lock down TIOCSSERIALDavid Howells1-0/+1
2019-08-20lockdown: Prohibit PCMCIA CIS storage when the kernel is locked downDavid Howells1-0/+1
2019-08-20ACPI: Limit access to custom_method when the kernel is locked downMatthew Garrett1-0/+1
2019-08-20x86/msr: Restrict MSR access when the kernel is locked downMatthew Garrett1-0/+1
2019-08-20x86: Lock down IO port access when the kernel is locked downMatthew Garrett1-0/+1
2019-08-20PCI: Lock down BAR access when the kernel is locked downMatthew Garrett1-0/+1
2019-08-20hibernate: Disable when the kernel is locked downJosh Boyer1-0/+1
2019-08-20kexec_load: Disable at runtime if the kernel is locked downMatthew Garrett1-0/+1
2019-08-20lockdown: Restrict /dev/{mem,kmem,port} when the kernel is locked downMatthew Garrett1-0/+1
2019-08-20lockdown: Enforce module signatures if the kernel is locked downDavid Howells1-0/+1
2019-08-20security: Add a static lockdown policy LSMMatthew Garrett1-0/+3
2019-08-20security: Add a "locked down" LSM hookMatthew Garrett1-0/+32
2019-08-20security: Support early LSMsMatthew Garrett1-0/+6
2019-08-13fanotify, inotify, dnotify, security: add security hook for fs notificationsAaron Goidel1-2/+8
2019-06-14LSM: switch to blocking policy update notifiersJanne Karhunen1-6/+6
2019-05-08Merge branch 'work.mount-syscalls' of git://git.kernel.org/pub/scm/linux/kern...Linus Torvalds1-0/+7
2019-03-21LSM: add new hook for kernfs node initializationOndrej Mosnacek1-0/+9
2019-03-21vfs: syscall: Add move_mount(2) to move mounts aroundDavid Howells1-0/+7
2019-03-13Merge branch 'work.mount' of git://git.kernel.org/pub/scm/linux/kernel/git/vi...Linus Torvalds1-1/+17
2019-03-07Merge tag 'audit-pr-20190305' of git://git.kernel.org/pub/scm/linux/kernel/gi...Linus Torvalds1-3/+2
2019-02-28introduce cloning of fs_contextAl Viro1-0/+6
2019-02-28vfs: Put security flags into the fs_context structDavid Howells1-1/+1
2019-02-28vfs: Add LSM hooks for the new mount APIDavid Howells1-0/+10
2019-02-01audit: remove unused actx param from audit_rule_matchRichard Guy Briggs1-3/+2
2019-01-11LSM: generalize flag passing to security_capableMicah Morton1-14/+14
2019-01-09procfs: add smack subdir to attrsCasey Schaufler1-5/+10
2018-12-21LSM: new method: ->sb_add_mnt_opt()Al Viro1-2/+4
2018-12-21LSM: bury struct security_mnt_optsAl Viro1-8/+0
2018-12-21LSM: hide struct security_mnt_opts from any generic codeAl Viro1-33/+10
2018-12-21LSM: split ->sb_set_mnt_opts() out of ->sb_kern_mount()Al Viro1-4/+2
2018-12-21new helper: security_sb_eat_lsm_opts()Al Viro1-25/+3
2018-12-21LSM: lift extracting and parsing LSM options into the caller of ->sb_remount()Al Viro1-2/+3
2018-12-21LSM: lift parsing LSM options into the caller of ->sb_kern_mount()Al Viro1-2/+4
2018-10-03signal: Distinguish between kernel_siginfo and siginfoEric W. Biederman1-3/+3
2018-08-15Merge branch 'next-general' of git://git.kernel.org/pub/scm/linux/kernel/git/...Linus Torvalds1-0/+27
2018-07-16security: define new LSM hook named security_kernel_load_dataMimi Zohar1-0/+27
2018-07-12security_file_open(): lose cred argumentAl Viro1-3/+2
2018-05-04security: add hook for socketpair()David Herrmann1-0/+7
2018-04-23Merge tag 'v4.17-rc2' into next-generalJames Morris1-35/+58
2018-04-17security: remove security_settimeSargun Dhillon1-14/+0