summaryrefslogtreecommitdiff
path: root/security/security.c
AgeCommit message (Expand)AuthorFilesLines
2024-04-03security: Place security_path_post_mknod() where the original IMA call wasRoberto Sassu1-2/+2
2024-03-14lsm: handle the NULL buffer case in lsm_fill_user_ctx()Paul Moore1-1/+7
2024-03-14lsm: use 32-bit compatible data types in LSM syscallsCasey Schaufler1-6/+6
2024-03-13Merge tag 'lsm-pr-20240312' of git://git.kernel.org/pub/scm/linux/kernel/git/...Linus Torvalds1-400/+381
2024-02-23Merge git://git.kernel.org/pub/scm/linux/kernel/git/netdev/netJakub Kicinski1-2/+5
2024-02-23lsm: use default hook return value in call_int_hook()Ondrej Mosnacek1-307/+225
2024-02-22lsm: fix typos in security/security.c comment headersPairman Guo1-4/+4
2024-02-16integrity: Remove LSMRoberto Sassu1-2/+0
2024-02-16evm: Make it independent from 'integrity' LSMRoberto Sassu1-2/+2
2024-02-16evm: Move to LSM infrastructureRoberto Sassu1-33/+10
2024-02-16ima: Move IMA-Appraisal to LSM infrastructureRoberto Sassu1-13/+0
2024-02-16ima: Move to LSM infrastructureRoberto Sassu1-51/+12
2024-02-16integrity: Move integrity_kernel_module_request() to IMARoberto Sassu1-1/+1
2024-02-16security: Introduce key_post_create_or_update hookRoberto Sassu1-0/+19
2024-02-16security: Introduce inode_post_remove_acl hookRoberto Sassu1-0/+17
2024-02-16security: Introduce inode_post_set_acl hookRoberto Sassu1-0/+17
2024-02-16security: Introduce inode_post_create_tmpfile hookRoberto Sassu1-0/+15
2024-02-16security: Introduce path_post_mknod hookRoberto Sassu1-0/+14
2024-02-16security: Introduce file_release hookRoberto Sassu1-0/+11
2024-02-16security: Introduce file_post_open hookRoberto Sassu1-0/+17
2024-02-16security: Introduce inode_post_removexattr hookRoberto Sassu1-0/+14
2024-02-16security: Introduce inode_post_setattr hookRoberto Sassu1-0/+16
2024-02-16security: Align inode_setattr hook definition with EVMRoberto Sassu1-1/+1
2024-02-16evm: Align evm_inode_post_setxattr() definition with LSM infrastructureRoberto Sassu1-1/+1
2024-02-16evm: Align evm_inode_setxattr() definition with LSM infrastructureRoberto Sassu1-1/+1
2024-02-16ima: Align ima_inode_removexattr() definition with LSM infrastructureRoberto Sassu1-1/+1
2024-02-16ima: Align ima_inode_setxattr() definition with LSM infrastructureRoberto Sassu1-1/+1
2024-02-16ima: Align ima_file_mprotect() definition with LSM infrastructureRoberto Sassu1-1/+1
2024-02-14lsm: fix integer overflow in lsm_set_self_attr() syscallJann Horn1-2/+5
2024-02-02Merge git://git.kernel.org/pub/scm/linux/kernel/git/netdev/netJakub Kicinski1-5/+40
2024-01-31lsm: fix default return value of the socket_getpeersec_*() hooksOndrej Mosnacek1-4/+27
2024-01-27lsm: fix the logic in security_inode_getsecctx()Ondrej Mosnacek1-1/+13
2024-01-25bpf,lsm: Add BPF token LSM hooksAndrii Nakryiko1-0/+60
2024-01-25bpf,lsm: Refactor bpf_map_alloc/bpf_map_free LSM hooksAndrii Nakryiko1-6/+10
2024-01-25bpf,lsm: Refactor bpf_prog_alloc/bpf_prog_free LSM hooksAndrii Nakryiko1-10/+15
2024-01-10Merge tag 'integrity-v6.8' of git://git.kernel.org/pub/scm/linux/kernel/git/z...Linus Torvalds1-1/+1
2024-01-09Merge tag 'lsm-pr-20240105' of git://git.kernel.org/pub/scm/linux/kernel/git/...Linus Torvalds1-12/+261
2023-12-24lsm: new security_file_ioctl_compat() hookAlfred Piccioni1-0/+18
2023-12-20evm: don't copy up 'security.evm' xattrMimi Zohar1-1/+1
2023-12-12fsnotify: optionally pass access range in file permission hooksAmir Goldstein1-7/+1
2023-12-12fsnotify: split fsnotify_perm() into two hooksAmir Goldstein1-2/+2
2023-11-13lsm: convert security_setselfattr() to use memdup_user()Paul Moore1-8/+3
2023-11-13lsm: align based on pointer length in lsm_fill_user_ctx()Paul Moore1-1/+1
2023-11-13lsm: consolidate buffer size handling into lsm_fill_user_ctx()Paul Moore1-24/+31
2023-11-13lsm: correct error codes in security_getselfattr()Paul Moore1-2/+2
2023-11-13lsm: cleanup the size counters in security_getselfattr()Paul Moore1-1/+2
2023-11-13lsm: don't yet account for IMA in LSM_CONFIG_COUNT calculationRoberto Sassu1-1/+0
2023-11-13LSM: Helpers for attribute names and filling lsm_ctxCasey Schaufler1-0/+41
2023-11-13LSM: syscalls for current process attributesCasey Schaufler1-0/+152
2023-11-13proc: Use lsmids instead of lsm names for attrsCasey Schaufler1-8/+7