summaryrefslogtreecommitdiff
path: root/security
AgeCommit message (Expand)AuthorFilesLines
2011-04-26LSM: split LSM_AUDIT_DATA_FS into _PATH and _INODEEric Paris5-68/+74
2011-04-26SELINUX: Make selinux cache VFS RCU walks safeEric Paris3-25/+55
2011-04-25SECURITY: Move exec_permission RCU checks into security modulesAndi Kleen4-7/+13
2011-04-25SELinux: security_read_policy should take a size_t not ssize_tEric Paris2-2/+2
2011-04-25SELinux: silence build warning when !CONFIG_BUGEric Paris2-0/+3
2011-04-20SELinux: delete debugging printks from filename_trans rule processingEric Paris1-4/+0
2011-04-07Initialize policydb.process_class eariler.Harry Ciao1-5/+5
2011-04-07selinux: Fix regression for XorgStephen Smalley1-1/+1
2011-04-02selinux: add type_transition with name extension support for selinuxfsKohei Kaigai3-12/+25
2011-03-28SELinux: Write class field in role_trans_write.Harry Ciao1-2/+9
2011-03-28SELinux: Compute role in newcontext for all classesHarry Ciao1-11/+9
2011-03-28SELinux: Add class support to the role_trans structureHarry Ciao3-2/+18
2011-03-08Merge branch 'master' of git://git.infradead.org/users/eparis/selinux into nextJames Morris13-216/+434
2011-03-08KEYS: Add an iovec version of KEYCTL_INSTANTIATEDavid Howells3-7/+150
2011-03-08KEYS: Add a new keyctl op to reject a key with a specified error codeDavid Howells6-13/+56
2011-03-08KEYS: Add a key type op to permit the key description to be vettedDavid Howells1-0/+8
2011-03-08KEYS: Add an RCU payload dereference macroDavid Howells3-6/+3
2011-03-08Merge branch 'master'; commit 'v2.6.38-rc7' into nextJames Morris24-671/+930
2011-03-04SELinux: implement the new sb_remount LSM hookEric Paris1-0/+86
2011-03-04LSM: Pass -o remount options to the LSMEric Paris2-0/+11
2011-03-03SELinux: Compute SID for the newly created socketHarry Ciao1-6/+21
2011-03-03SELinux: Socket retains creator role and MLS attributeHarry Ciao3-7/+29
2011-03-03SELinux: Auto-generate security_is_socket_classHarry Ciao1-0/+4
2011-03-03TOMOYO: Fix memory leak upon file open.Tetsuo Handa1-4/+1
2011-02-25Revert "selinux: simplify ioctl checking"Eric Paris1-8/+42
2011-02-25selinux: drop unused packet flow permissionsEric Paris1-2/+1
2011-02-25selinux: Fix packet forwarding checks on postroutingSteffen Klassert1-18/+5
2011-02-25selinux: Fix wrong checks for selinux_policycap_netpeerSteffen Klassert1-18/+6
2011-02-25selinux: Fix check for xfrm selinux context algorithmSteffen Klassert1-1/+1
2011-02-24ima: remove unnecessary call to ima_must_measureMimi Zohar3-15/+7
2011-02-11security: add cred argument to security_capable()Chris Wright1-3/+2
2011-02-10IMA: remove IMA imbalance checkingMimi Zohar2-104/+4
2011-02-10IMA: maintain i_readcount in the VFS layerMimi Zohar2-19/+8
2011-02-10IMA: convert i_readcount to atomicMimi Zohar2-8/+10
2011-02-10Smack: correct final mmap check comparisonCasey Schaufler1-1/+1
2011-02-10security:smack: kill unused SMACK_LIST_MAX, MAY_ANY and MAY_ANYWRITEShan Wei1-8/+0
2011-02-09Smack: correct behavior in the mmap hookCasey Schaufler1-36/+49
2011-02-08CRED: Fix BUG() upon security_cred_alloc_blank() failureTetsuo Handa1-1/+5
2011-02-01security: remove unused security_sysctl hookLucian Adrian Grijincu2-11/+0
2011-02-01security/selinux: fix /proc/sys/ labelingLucian Adrian Grijincu1-102/+18
2011-02-01SELinux: Use dentry name in new object labelingEric Paris6-37/+197
2011-02-01fs/vfs/security: pass last path component to LSM on inode creationEric Paris4-6/+13
2011-01-26KEYS: Fix __key_link_end() quota fixup on errorDavid Howells4-20/+27
2011-01-24selinux: return -ENOMEM when memory allocation failsDavidlohr Bueso2-3/+3
2011-01-24trusted keys: Fix a memory leak in trusted_update().Jesper Juhl1-0/+1
2011-01-24CacheFiles: Add calls to path-based security hooksDavid Howells1-0/+3
2011-01-24security:selinux: kill unused MAX_AVTAB_HASH_MASK and ebitmap_startbitShan Wei2-2/+0
2011-01-24encrypted-keys: rename encrypted_defined files to encryptedMimi Zohar3-2/+3
2011-01-24trusted-keys: rename trusted_defined files to trustedMimi Zohar3-2/+2
2011-01-22KEYS: Fix up comments in key management codeDavid Howells11-366/+777