summaryrefslogtreecommitdiff
path: root/include/linux/security.h
AgeCommit message (Expand)AuthorFilesLines
2020-12-11Merge tag 'fixes-v5.10a' of git://git.kernel.org/pub/scm/linux/kernel/git/jmo...Linus Torvalds1-1/+1
2020-12-05[SECURITY] fix namespaced fscaps when !CONFIG_SECURITYSerge Hallyn1-1/+1
2020-10-05LSM: Add "contents" flag to kernel_read_file hookKees Cook1-2/+4
2020-10-05LSM: Introduce kernel_post_load_data() hookKees Cook1-2/+12
2020-10-05fs/kernel_read_file: Split into separate include fileScott Branden1-0/+1
2020-06-14Merge tag 'LSM-add-setgid-hook-5.8-author-fix' of git://github.com/micah-mort...Linus Torvalds1-0/+9
2020-06-14security: Add LSM hooks to set*gid syscallsThomas Cedeno1-0/+9
2020-06-13Merge tag 'notifications-20200601' of git://git.kernel.org/pub/scm/linux/kern...Linus Torvalds1-3/+27
2020-06-05Merge branch 'exec-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/eb...Linus Torvalds1-4/+11
2020-05-30exec: Compute file based creds only onceEric W. Biederman1-4/+5
2020-05-21exec: Convert security_bprm_set_creds into security_bprm_repopulate_credsEric W. Biederman1-4/+4
2020-05-20exec: Factor security_bprm_creds_for_exec out of security_bprm_set_credsEric W. Biederman1-0/+6
2020-05-19keys: Make the KEY_NEED_* perms an enum rather than a maskDavid Howells1-3/+3
2020-05-19security: Add hooks to rule on setting a watchDavid Howells1-0/+9
2020-05-19security: Add a hook for the point of notification insertionDavid Howells1-0/+15
2020-04-27sysctl: pass kernel pointers to ->proc_handlerChristoph Hellwig1-1/+1
2020-04-01Merge branch 'next-general' of git://git.kernel.org:/pub/scm/linux/kernel/git...Linus Torvalds1-1/+0
2020-02-21security: remove duplicated include from security.hYueHaibing1-1/+0
2019-12-10security,lockdown,selinux: implement SELinux lockdownStephen Smalley1-0/+2
2019-12-01Merge tag 'powerpc-5.5-1' of git://git.kernel.org/pub/scm/linux/kernel/git/po...Linus Torvalds1-0/+2
2019-11-11Merge tag 'v5.4-rc7' into perf/core, to pick up fixesIngo Molnar1-0/+1
2019-10-31efi/efi_test: Lock down /dev/efi_test and require CAP_SYS_ADMINJavier Martinez Canillas1-0/+1
2019-10-28powerpc/xmon: Restrict when kernel is locked downChristopher M. Riedl1-0/+2
2019-10-19perf/core: Fix !CONFIG_PERF_EVENTS build warnings and failuresIngo Molnar1-0/+1
2019-10-17perf_event: Add support for LSM and SELinux checksJoel Fernandes (Google)1-1/+37
2019-09-28Merge branch 'next-lockdown' of git://git.kernel.org/pub/scm/linux/kernel/git...Linus Torvalds1-0/+59
2019-09-23Merge tag 'selinux-pr-20190917' of git://git.kernel.org/pub/scm/linux/kernel/...Linus Torvalds1-2/+8
2019-08-20tracefs: Restrict tracefs when the kernel is locked downMatthew Garrett1-0/+1
2019-08-20debugfs: Restrict debugfs when the kernel is locked downDavid Howells1-0/+1
2019-08-20lockdown: Lock down perf when in confidentiality modeDavid Howells1-0/+1
2019-08-20bpf: Restrict bpf when kernel lockdown is in confidentiality modeDavid Howells1-0/+1
2019-08-20lockdown: Lock down tracing and perf kprobes when in confidentiality modeDavid Howells1-0/+1
2019-08-20lockdown: Lock down /proc/kcoreDavid Howells1-0/+1
2019-08-20x86/mmiotrace: Lock down the testmmiotrace moduleDavid Howells1-0/+1
2019-08-20lockdown: Lock down module params that specify hardware parameters (eg. ioport)David Howells1-0/+1
2019-08-20lockdown: Lock down TIOCSSERIALDavid Howells1-0/+1
2019-08-20lockdown: Prohibit PCMCIA CIS storage when the kernel is locked downDavid Howells1-0/+1
2019-08-20ACPI: Limit access to custom_method when the kernel is locked downMatthew Garrett1-0/+1
2019-08-20x86/msr: Restrict MSR access when the kernel is locked downMatthew Garrett1-0/+1
2019-08-20x86: Lock down IO port access when the kernel is locked downMatthew Garrett1-0/+1
2019-08-20PCI: Lock down BAR access when the kernel is locked downMatthew Garrett1-0/+1
2019-08-20hibernate: Disable when the kernel is locked downJosh Boyer1-0/+1
2019-08-20kexec_load: Disable at runtime if the kernel is locked downMatthew Garrett1-0/+1
2019-08-20lockdown: Restrict /dev/{mem,kmem,port} when the kernel is locked downMatthew Garrett1-0/+1
2019-08-20lockdown: Enforce module signatures if the kernel is locked downDavid Howells1-0/+1
2019-08-20security: Add a static lockdown policy LSMMatthew Garrett1-0/+3
2019-08-20security: Add a "locked down" LSM hookMatthew Garrett1-0/+32
2019-08-20security: Support early LSMsMatthew Garrett1-0/+6
2019-08-13fanotify, inotify, dnotify, security: add security hook for fs notificationsAaron Goidel1-2/+8
2019-06-14LSM: switch to blocking policy update notifiersJanne Karhunen1-6/+6