summaryrefslogtreecommitdiffstats
path: root/include/linux/security.h
Commit message (Expand)AuthorAgeFilesLines
* security,lockdown,selinux: implement SELinux lockdownStephen Smalley2019-12-091-0/+2
* Merge tag 'powerpc-5.5-1' of git://git.kernel.org/pub/scm/linux/kernel/git/po...Linus Torvalds2019-11-301-0/+2
|\
| * powerpc/xmon: Restrict when kernel is locked downChristopher M. Riedl2019-10-281-0/+2
* | Merge tag 'v5.4-rc7' into perf/core, to pick up fixesIngo Molnar2019-11-111-0/+1
|\ \
| * | efi/efi_test: Lock down /dev/efi_test and require CAP_SYS_ADMINJavier Martinez Canillas2019-10-311-0/+1
| |/
* | perf/core: Fix !CONFIG_PERF_EVENTS build warnings and failuresIngo Molnar2019-10-191-0/+1
* | perf_event: Add support for LSM and SELinux checksJoel Fernandes (Google)2019-10-171-1/+37
|/
* Merge branch 'next-lockdown' of git://git.kernel.org/pub/scm/linux/kernel/git...Linus Torvalds2019-09-281-0/+59
|\
| * tracefs: Restrict tracefs when the kernel is locked downMatthew Garrett2019-08-191-0/+1
| * debugfs: Restrict debugfs when the kernel is locked downDavid Howells2019-08-191-0/+1
| * lockdown: Lock down perf when in confidentiality modeDavid Howells2019-08-191-0/+1
| * bpf: Restrict bpf when kernel lockdown is in confidentiality modeDavid Howells2019-08-191-0/+1
| * lockdown: Lock down tracing and perf kprobes when in confidentiality modeDavid Howells2019-08-191-0/+1
| * lockdown: Lock down /proc/kcoreDavid Howells2019-08-191-0/+1
| * x86/mmiotrace: Lock down the testmmiotrace moduleDavid Howells2019-08-191-0/+1
| * lockdown: Lock down module params that specify hardware parameters (eg. ioport)David Howells2019-08-191-0/+1
| * lockdown: Lock down TIOCSSERIALDavid Howells2019-08-191-0/+1
| * lockdown: Prohibit PCMCIA CIS storage when the kernel is locked downDavid Howells2019-08-191-0/+1
| * ACPI: Limit access to custom_method when the kernel is locked downMatthew Garrett2019-08-191-0/+1
| * x86/msr: Restrict MSR access when the kernel is locked downMatthew Garrett2019-08-191-0/+1
| * x86: Lock down IO port access when the kernel is locked downMatthew Garrett2019-08-191-0/+1
| * PCI: Lock down BAR access when the kernel is locked downMatthew Garrett2019-08-191-0/+1
| * hibernate: Disable when the kernel is locked downJosh Boyer2019-08-191-0/+1
| * kexec_load: Disable at runtime if the kernel is locked downMatthew Garrett2019-08-191-0/+1
| * lockdown: Restrict /dev/{mem,kmem,port} when the kernel is locked downMatthew Garrett2019-08-191-0/+1
| * lockdown: Enforce module signatures if the kernel is locked downDavid Howells2019-08-191-0/+1
| * security: Add a static lockdown policy LSMMatthew Garrett2019-08-191-0/+3
| * security: Add a "locked down" LSM hookMatthew Garrett2019-08-191-0/+32
| * security: Support early LSMsMatthew Garrett2019-08-191-0/+6
* | Merge tag 'selinux-pr-20190917' of git://git.kernel.org/pub/scm/linux/kernel/...Linus Torvalds2019-09-231-2/+8
|\ \
| * | fanotify, inotify, dnotify, security: add security hook for fs notificationsAaron Goidel2019-08-121-2/+8
| |/
* / LSM: switch to blocking policy update notifiersJanne Karhunen2019-06-141-6/+6
|/
* Merge branch 'work.mount-syscalls' of git://git.kernel.org/pub/scm/linux/kern...Linus Torvalds2019-05-071-0/+7
|\
| * vfs: syscall: Add move_mount(2) to move mounts aroundDavid Howells2019-03-201-0/+7
* | LSM: add new hook for kernfs node initializationOndrej Mosnacek2019-03-201-0/+9
|/
* Merge branch 'work.mount' of git://git.kernel.org/pub/scm/linux/kernel/git/vi...Linus Torvalds2019-03-121-1/+17
|\
| * introduce cloning of fs_contextAl Viro2019-02-281-0/+6
| * vfs: Put security flags into the fs_context structDavid Howells2019-02-281-1/+1
| * vfs: Add LSM hooks for the new mount APIDavid Howells2019-02-281-0/+10
* | Merge tag 'audit-pr-20190305' of git://git.kernel.org/pub/scm/linux/kernel/gi...Linus Torvalds2019-03-071-3/+2
|\ \
| * | audit: remove unused actx param from audit_rule_matchRichard Guy Briggs2019-01-311-3/+2
| |/
* | LSM: generalize flag passing to security_capableMicah Morton2019-01-101-14/+14
* | procfs: add smack subdir to attrsCasey Schaufler2019-01-081-5/+10
|/
* LSM: new method: ->sb_add_mnt_opt()Al Viro2018-12-211-2/+4
* LSM: bury struct security_mnt_optsAl Viro2018-12-211-8/+0
* LSM: hide struct security_mnt_opts from any generic codeAl Viro2018-12-211-33/+10
* LSM: split ->sb_set_mnt_opts() out of ->sb_kern_mount()Al Viro2018-12-211-4/+2
* new helper: security_sb_eat_lsm_opts()Al Viro2018-12-211-25/+3
* LSM: lift extracting and parsing LSM options into the caller of ->sb_remount()Al Viro2018-12-211-2/+3
* LSM: lift parsing LSM options into the caller of ->sb_kern_mount()Al Viro2018-12-211-2/+4