summaryrefslogtreecommitdiffstats
path: root/security/security.c
Commit message (Expand)AuthorAgeFilesLines
* evm: Make it independent from 'integrity' LSMRoberto Sassu2024-02-151-2/+2
* evm: Move to LSM infrastructureRoberto Sassu2024-02-151-33/+10
* ima: Move IMA-Appraisal to LSM infrastructureRoberto Sassu2024-02-151-13/+0
* ima: Move to LSM infrastructureRoberto Sassu2024-02-151-51/+12
* integrity: Move integrity_kernel_module_request() to IMARoberto Sassu2024-02-151-1/+1
* security: Introduce key_post_create_or_update hookRoberto Sassu2024-02-151-0/+19
* security: Introduce inode_post_remove_acl hookRoberto Sassu2024-02-151-0/+17
* security: Introduce inode_post_set_acl hookRoberto Sassu2024-02-151-0/+17
* security: Introduce inode_post_create_tmpfile hookRoberto Sassu2024-02-151-0/+15
* security: Introduce path_post_mknod hookRoberto Sassu2024-02-151-0/+14
* security: Introduce file_release hookRoberto Sassu2024-02-151-0/+11
* security: Introduce file_post_open hookRoberto Sassu2024-02-151-0/+17
* security: Introduce inode_post_removexattr hookRoberto Sassu2024-02-151-0/+14
* security: Introduce inode_post_setattr hookRoberto Sassu2024-02-151-0/+16
* security: Align inode_setattr hook definition with EVMRoberto Sassu2024-02-151-1/+1
* evm: Align evm_inode_post_setxattr() definition with LSM infrastructureRoberto Sassu2024-02-151-1/+1
* evm: Align evm_inode_setxattr() definition with LSM infrastructureRoberto Sassu2024-02-151-1/+1
* ima: Align ima_inode_removexattr() definition with LSM infrastructureRoberto Sassu2024-02-151-1/+1
* ima: Align ima_inode_setxattr() definition with LSM infrastructureRoberto Sassu2024-02-151-1/+1
* ima: Align ima_file_mprotect() definition with LSM infrastructureRoberto Sassu2024-02-151-1/+1
* lsm: fix default return value of the socket_getpeersec_*() hooksOndrej Mosnacek2024-01-301-4/+27
* lsm: fix the logic in security_inode_getsecctx()Ondrej Mosnacek2024-01-261-1/+13
* Merge tag 'integrity-v6.8' of git://git.kernel.org/pub/scm/linux/kernel/git/z...Linus Torvalds2024-01-091-1/+1
|\
| * evm: don't copy up 'security.evm' xattrMimi Zohar2023-12-201-1/+1
* | Merge tag 'lsm-pr-20240105' of git://git.kernel.org/pub/scm/linux/kernel/git/...Linus Torvalds2024-01-091-12/+261
|\ \
| * | lsm: new security_file_ioctl_compat() hookAlfred Piccioni2023-12-241-0/+18
| * | lsm: convert security_setselfattr() to use memdup_user()Paul Moore2023-11-121-8/+3
| * | lsm: align based on pointer length in lsm_fill_user_ctx()Paul Moore2023-11-121-1/+1
| * | lsm: consolidate buffer size handling into lsm_fill_user_ctx()Paul Moore2023-11-121-24/+31
| * | lsm: correct error codes in security_getselfattr()Paul Moore2023-11-121-2/+2
| * | lsm: cleanup the size counters in security_getselfattr()Paul Moore2023-11-121-1/+2
| * | lsm: don't yet account for IMA in LSM_CONFIG_COUNT calculationRoberto Sassu2023-11-121-1/+0
| * | LSM: Helpers for attribute names and filling lsm_ctxCasey Schaufler2023-11-121-0/+41
| * | LSM: syscalls for current process attributesCasey Schaufler2023-11-121-0/+152
| * | proc: Use lsmids instead of lsm names for attrsCasey Schaufler2023-11-121-8/+7
| * | LSM: Maintain a table of LSM attribute dataCasey Schaufler2023-11-121-0/+37
| * | LSM: Identify modules by more than nameCasey Schaufler2023-11-121-6/+6
| |/
* | fsnotify: optionally pass access range in file permission hooksAmir Goldstein2023-12-121-7/+1
* | fsnotify: split fsnotify_perm() into two hooksAmir Goldstein2023-12-121-2/+2
|/
* lsm: fix a spelling mistakePaul Moore2023-10-041-1/+1
* lsm: constify 'sb' parameter in security_sb_kern_mount()Khadija Kamran2023-09-141-1/+1
* lsm: constify 'bprm' parameter in security_bprm_committed_creds()Khadija Kamran2023-09-141-1/+1
* lsm: constify 'bprm' parameter in security_bprm_committing_creds()Khadija Kamran2023-09-131-1/+1
* lsm: constify 'file' parameter in security_bprm_creds_from_file()Khadija Kamran2023-09-131-1/+1
* lsm: constify 'sb' parameter in security_quotactl()Khadija Kamran2023-09-131-1/+1
* Merge tag 'lsm-pr-20230829' of git://git.kernel.org/pub/scm/linux/kernel/git/...Linus Torvalds2023-08-301-29/+61
|\
| * lsm: constify the 'file' parameter in security_binder_transfer_file()Khadija Kamran2023-08-151-1/+1
| * lsm: constify the 'target' parameter in security_capget()Khadija Kamran2023-08-081-1/+1
| * lsm: add comment block for security_sk_classify_flow LSM hookKhadija Kamran2023-07-311-0/+7
| * security: Fix ret values doc for security_inode_init_security()Roberto Sassu2023-07-261-2/+2