summaryrefslogtreecommitdiffstats
path: root/security/security.c
Commit message (Expand)AuthorAgeFilesLines
* security: allow finer granularity in permitting copy-up of security xattrsStefan Berger2024-04-091-2/+3
* security: Place security_path_post_mknod() where the original IMA call wasRoberto Sassu2024-04-031-2/+2
* lsm: handle the NULL buffer case in lsm_fill_user_ctx()Paul Moore2024-03-141-1/+7
* lsm: use 32-bit compatible data types in LSM syscallsCasey Schaufler2024-03-141-6/+6
* Merge tag 'lsm-pr-20240312' of git://git.kernel.org/pub/scm/linux/kernel/git/...Linus Torvalds2024-03-121-400/+381
|\
| * lsm: use default hook return value in call_int_hook()Ondrej Mosnacek2024-02-221-307/+225
| * lsm: fix typos in security/security.c comment headersPairman Guo2024-02-211-4/+4
| * integrity: Remove LSMRoberto Sassu2024-02-151-2/+0
| * evm: Make it independent from 'integrity' LSMRoberto Sassu2024-02-151-2/+2
| * evm: Move to LSM infrastructureRoberto Sassu2024-02-151-33/+10
| * ima: Move IMA-Appraisal to LSM infrastructureRoberto Sassu2024-02-151-13/+0
| * ima: Move to LSM infrastructureRoberto Sassu2024-02-151-51/+12
| * integrity: Move integrity_kernel_module_request() to IMARoberto Sassu2024-02-151-1/+1
| * security: Introduce key_post_create_or_update hookRoberto Sassu2024-02-151-0/+19
| * security: Introduce inode_post_remove_acl hookRoberto Sassu2024-02-151-0/+17
| * security: Introduce inode_post_set_acl hookRoberto Sassu2024-02-151-0/+17
| * security: Introduce inode_post_create_tmpfile hookRoberto Sassu2024-02-151-0/+15
| * security: Introduce path_post_mknod hookRoberto Sassu2024-02-151-0/+14
| * security: Introduce file_release hookRoberto Sassu2024-02-151-0/+11
| * security: Introduce file_post_open hookRoberto Sassu2024-02-151-0/+17
| * security: Introduce inode_post_removexattr hookRoberto Sassu2024-02-151-0/+14
| * security: Introduce inode_post_setattr hookRoberto Sassu2024-02-151-0/+16
| * security: Align inode_setattr hook definition with EVMRoberto Sassu2024-02-151-1/+1
| * evm: Align evm_inode_post_setxattr() definition with LSM infrastructureRoberto Sassu2024-02-151-1/+1
| * evm: Align evm_inode_setxattr() definition with LSM infrastructureRoberto Sassu2024-02-151-1/+1
| * ima: Align ima_inode_removexattr() definition with LSM infrastructureRoberto Sassu2024-02-151-1/+1
| * ima: Align ima_inode_setxattr() definition with LSM infrastructureRoberto Sassu2024-02-151-1/+1
| * ima: Align ima_file_mprotect() definition with LSM infrastructureRoberto Sassu2024-02-151-1/+1
* | Merge git://git.kernel.org/pub/scm/linux/kernel/git/netdev/netJakub Kicinski2024-02-221-2/+5
|\ \
| * | lsm: fix integer overflow in lsm_set_self_attr() syscallJann Horn2024-02-141-2/+5
| |/
* | Merge git://git.kernel.org/pub/scm/linux/kernel/git/netdev/netJakub Kicinski2024-02-011-5/+40
|\|
| * lsm: fix default return value of the socket_getpeersec_*() hooksOndrej Mosnacek2024-01-301-4/+27
| * lsm: fix the logic in security_inode_getsecctx()Ondrej Mosnacek2024-01-261-1/+13
* | bpf,lsm: Add BPF token LSM hooksAndrii Nakryiko2024-01-241-0/+60
* | bpf,lsm: Refactor bpf_map_alloc/bpf_map_free LSM hooksAndrii Nakryiko2024-01-241-6/+10
* | bpf,lsm: Refactor bpf_prog_alloc/bpf_prog_free LSM hooksAndrii Nakryiko2024-01-241-10/+15
|/
* Merge tag 'integrity-v6.8' of git://git.kernel.org/pub/scm/linux/kernel/git/z...Linus Torvalds2024-01-091-1/+1
|\
| * evm: don't copy up 'security.evm' xattrMimi Zohar2023-12-201-1/+1
* | Merge tag 'lsm-pr-20240105' of git://git.kernel.org/pub/scm/linux/kernel/git/...Linus Torvalds2024-01-091-12/+261
|\ \
| * | lsm: new security_file_ioctl_compat() hookAlfred Piccioni2023-12-241-0/+18
| * | lsm: convert security_setselfattr() to use memdup_user()Paul Moore2023-11-121-8/+3
| * | lsm: align based on pointer length in lsm_fill_user_ctx()Paul Moore2023-11-121-1/+1
| * | lsm: consolidate buffer size handling into lsm_fill_user_ctx()Paul Moore2023-11-121-24/+31
| * | lsm: correct error codes in security_getselfattr()Paul Moore2023-11-121-2/+2
| * | lsm: cleanup the size counters in security_getselfattr()Paul Moore2023-11-121-1/+2
| * | lsm: don't yet account for IMA in LSM_CONFIG_COUNT calculationRoberto Sassu2023-11-121-1/+0
| * | LSM: Helpers for attribute names and filling lsm_ctxCasey Schaufler2023-11-121-0/+41
| * | LSM: syscalls for current process attributesCasey Schaufler2023-11-121-0/+152
| * | proc: Use lsmids instead of lsm names for attrsCasey Schaufler2023-11-121-8/+7
| * | LSM: Maintain a table of LSM attribute dataCasey Schaufler2023-11-121-0/+37