summaryrefslogtreecommitdiffstats
path: root/security/selinux/hooks.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* treewide: Replace GPLv2 boilerplate/reference with SPDX - rule 500Thomas Gleixner2019-06-191-4/+1
* selinux: fix a missing-check bug in selinux_sb_eat_lsm_opts()Gen Zhang2019-06-121-6/+14
* selinux: fix a missing-check bug in selinux_add_mnt_opt( )Gen Zhang2019-06-121-5/+14
* selinux: do not report error on connect(AF_UNSPEC)Paolo Abeni2019-05-211-2/+8
* selinux: Check address length before reading address familyTetsuo Handa2019-04-151-1/+6
* kernfs: fix xattr name handling in LSM helpersOndrej Mosnacek2019-04-041-5/+4
* selinux: Make selinux_kernfs_init_security staticYueHaibing2019-03-221-2/+2
* selinux: implement the kernfs_init_security hookOndrej Mosnacek2019-03-211-0/+66
* selinux: try security xattr after genfs for kernfs filesystemsOndrej Mosnacek2019-03-211-73/+84
* Merge tag 'selinux-pr-20190312' of git://git.kernel.org/pub/scm/linux/kernel/...Linus Torvalds2019-03-131-1/+7
|\
| * security/selinux: fix SECURITY_LSM_NATIVE_LABELS on reused superblockJ. Bruce Fields2019-03-111-1/+4
| * selinux: add the missing walk_size + len check in selinux_sctp_bind_connectXin Long2019-03-111-0/+3
* | Merge branch 'work.mount' of git://git.kernel.org/pub/scm/linux/kernel/git/vi...Linus Torvalds2019-03-121-5/+83
|\ \
| * | introduce cloning of fs_contextAl Viro2019-02-281-0/+39
| * | selinux: Implement the new mount API LSM hooksDavid Howells2019-02-281-5/+44
* | | Merge tag 'docs-5.1' of git://git.lwn.net/linuxLinus Torvalds2019-03-091-1/+1
|\ \ \
| * | | doc: sctp: Merge and clean up rst filesKees Cook2019-02-221-1/+1
| |/ /
* | | Merge tag 'selinux-pr-20190305' of git://git.kernel.org/pub/scm/linux/kernel/...Linus Torvalds2019-03-071-14/+44
|\ \ \ | | |/ | |/|
| * | selinux: do not override context on context mountsOndrej Mosnacek2019-01-111-1/+8
| * | selinux: never allow relabeling on context mountsOndrej Mosnacek2019-01-111-9/+31
| * | selinux: stop passing MAY_NOT_BLOCK to the AVC upon follow_linkStephen Smalley2019-01-111-3/+2
| * | selinux: avoid silent denials in permissive mode under RCU walkStephen Smalley2019-01-111-1/+3
| |/
* | LSM: Make lsm_early_cred() and lsm_early_task() local functions.Tetsuo Handa2019-01-181-1/+0
* | LSM: generalize flag passing to security_capableMicah Morton2019-01-101-9/+9
* | LSM: Infrastructure management of the ipc security blobCasey Schaufler2019-01-081-85/+13
* | SELinux: Abstract use of ipc security blobsCasey Schaufler2019-01-081-9/+9
* | LSM: Infrastructure management of the inode securityCasey Schaufler2019-01-081-31/+6
* | SELinux: Abstract use of inode security blobCasey Schaufler2019-01-081-13/+13
* | LSM: Infrastructure management of the file securityCasey Schaufler2019-01-081-23/+2
* | SELinux: Abstract use of file security blobCasey Schaufler2019-01-081-9/+9
* | Infrastructure management of the cred security blobCasey Schaufler2019-01-081-41/+10
* | SELinux: Remove unused selinux_is_enabledCasey Schaufler2019-01-081-1/+0
* | SELinux: Remove cred security blob poisoningCasey Schaufler2019-01-081-6/+0
* | SELinux: Abstract use of cred security blobCasey Schaufler2019-01-081-27/+27
* | selinux: Remove SECURITY_SELINUX_BOOTPARAM_VALUEKees Cook2019-01-081-4/+1
* | LSM: Separate idea of "major" LSM from "exclusive" LSMKees Cook2019-01-081-1/+1
* | LSM: Lift LSM selection out of individual LSMsKees Cook2019-01-081-10/+0
* | LSM: Plumb visibility into optional "enabled" stateKees Cook2019-01-081-0/+1
* | LSM: Introduce LSM_FLAG_LEGACY_MAJORKees Cook2019-01-081-0/+1
|/
* Merge branch 'mount.part1' of git://git.kernel.org/pub/scm/linux/kernel/git/v...Linus Torvalds2019-01-051-506/+293
|\
| * LSM: new method: ->sb_add_mnt_opt()Al Viro2018-12-211-26/+19
| * selinux: rewrite selinux_sb_eat_lsm_opts()Al Viro2018-12-211-92/+54
| * selinux: regularize Opt_... names a bitAl Viro2018-12-211-8/+8
| * selinux: switch away from match_token()Al Viro2018-12-211-27/+55
| * selinux: new helper - selinux_add_opt()Al Viro2018-12-211-73/+53
| * selinux: switch to private struct selinux_mnt_optsAl Viro2018-12-211-161/+101
| * LSM: hide struct security_mnt_opts from any generic codeAl Viro2018-12-211-15/+37
| * selinux: kill selinux_sb_get_mnt_opts()Al Viro2018-12-211-147/+51
| * LSM: turn sb_eat_lsm_opts() into a methodAl Viro2018-12-211-1/+15
| * selinux; don't open-code a loop in sb_finish_set_opts()Al Viro2018-12-211-4/+2