summaryrefslogtreecommitdiffstats
path: root/security/security.c
Commit message (Expand)AuthorAgeFilesLines
* treewide: Replace GPLv2 boilerplate/reference with SPDX - rule 152Thomas Gleixner2019-05-301-5/+1
* Merge branch 'work.mount-syscalls' of git://git.kernel.org/pub/scm/linux/kern...Linus Torvalds2019-05-071-0/+5
|\
| * vfs: syscall: Add move_mount(2) to move mounts aroundDavid Howells2019-03-201-0/+5
* | LSM: add new hook for kernfs node initializationOndrej Mosnacek2019-03-201-0/+6
|/
* Merge branch 'work.mount' of git://git.kernel.org/pub/scm/linux/kernel/git/vi...Linus Torvalds2019-03-121-0/+10
|\
| * introduce cloning of fs_contextAl Viro2019-02-281-0/+5
| * vfs: Add LSM hooks for the new mount APIDavid Howells2019-02-281-0/+5
* | Merge tag 'audit-pr-20190305' of git://git.kernel.org/pub/scm/linux/kernel/gi...Linus Torvalds2019-03-071-4/+2
|\ \
| * | audit: remove unused actx param from audit_rule_matchRichard Guy Briggs2019-01-311-4/+2
| |/
* | LSM: Ignore "security=" when "lsm=" is specifiedKees Cook2019-02-251-2/+6
* | Merge tag 'v5.0-rc3' into next-generalJames Morris2019-01-221-0/+7
|\ \
| * | LSM: Check for NULL cred-security on freeJames Morris2019-01-161-0/+7
| |/
* | LSM: Make some functions staticWei Yongjun2019-01-181-3/+3
* | LSM: Make lsm_early_cred() and lsm_early_task() local functions.Tetsuo Handa2019-01-181-16/+11
* | LSM: generalize flag passing to security_capableMicah Morton2019-01-101-9/+5
* | LSM: Infrastructure management of the ipc security blobCasey Schaufler2019-01-081-4/+87
* | LSM: Infrastructure management of the task securityCasey Schaufler2019-01-081-1/+53
* | LSM: Infrastructure management of the inode securityCasey Schaufler2019-01-081-2/+62
* | LSM: Infrastructure management of the file securityCasey Schaufler2019-01-081-3/+51
* | Infrastructure management of the cred security blobCasey Schaufler2019-01-081-2/+87
* | procfs: add smack subdir to attrsCasey Schaufler2019-01-081-4/+20
* | capability: Initialize as LSM_ORDER_FIRSTKees Cook2019-01-081-5/+0
* | LSM: Introduce enum lsm_orderKees Cook2019-01-081-1/+8
* | Yama: Initialize as ordered LSMKees Cook2019-01-081-1/+0
* | LoadPin: Initialize as ordered LSMKees Cook2019-01-081-1/+0
* | LSM: Split LSM preparation from initializationKees Cook2019-01-081-6/+15
* | LSM: Add all exclusive LSMs to ordered initializationCasey Schaufler2019-01-081-25/+20
* | LSM: Separate idea of "major" LSM from "exclusive" LSMKees Cook2019-01-081-0/+12
* | LSM: Refactor "security=" in terms of enable/disableKees Cook2019-01-081-8/+20
* | LSM: Prepare for reorganizing "security=" logicKees Cook2019-01-081-9/+8
* | LSM: Tie enabling logic to presence in ordered listKees Cook2019-01-081-3/+11
* | LSM: Introduce "lsm=" for boottime LSM selectionKees Cook2019-01-081-1/+13
* | LSM: Introduce CONFIG_LSMKees Cook2019-01-081-5/+22
* | LSM: Build ordered list of LSMs to initializeKees Cook2019-01-081-5/+53
* | LSM: Lift LSM selection out of individual LSMsKees Cook2019-01-081-31/+71
* | LSM: Provide separate ordered initializationKees Cook2019-01-081-0/+21
|/
* Merge branch 'mount.part1' of git://git.kernel.org/pub/scm/linux/kernel/git/v...Linus Torvalds2019-01-051-13/+26
|\
| * LSM: new method: ->sb_add_mnt_opt()Al Viro2018-12-211-3/+5
| * LSM: hide struct security_mnt_opts from any generic codeAl Viro2018-12-211-9/+18
| * LSM: turn sb_eat_lsm_opts() into a methodAl Viro2018-12-211-10/+1
| * btrfs: sanitize security_mnt_opts useAl Viro2018-12-211-0/+1
| * LSM: split ->sb_set_mnt_opts() out of ->sb_kern_mount()Al Viro2018-12-211-3/+2
| * new helper: security_sb_eat_lsm_opts()Al Viro2018-12-211-3/+12
| * LSM: lift extracting and parsing LSM options into the caller of ->sb_remount()Al Viro2018-12-211-2/+3
| * LSM: lift parsing LSM options into the caller of ->sb_kern_mount()Al Viro2018-12-211-2/+3
* | security: audit and remove any unnecessary uses of module.hPaul Gortmaker2018-12-121-1/+1
|/
* Merge branch 'next-general' of git://git.kernel.org/pub/scm/linux/kernel/git/...Linus Torvalds2018-10-241-16/+27
|\
| * LSM: Don't ignore initialization failuresKees Cook2018-10-101-1/+3
| * LSM: Provide init debugging infrastructureKees Cook2018-10-101-0/+18
| * LSM: Convert from initcall to struct lsm_infoKees Cook2018-10-101-9/+5
OpenPOWER on IntegriCloud