summaryrefslogtreecommitdiff
path: root/security/smack
AgeCommit message (Expand)AuthorFilesLines
2012-05-31split ->file_mmap() into ->mmap_addr()/->mmap_file()Al Viro1-10/+5
2012-05-31split cap_mmap_addr() out of cap_file_mmap()Al Viro1-1/+1
2012-05-22Merge branch 'master' of git://git.infradead.org/users/eparis/selinux into nextJames Morris2-4/+4
2012-05-15Smack: allow for significantly longer Smack labels v4Casey Schaufler4-526/+941
2012-05-15gfp flags for security_inode_alloc()?Tetsuo Handa1-4/+4
2012-05-15Smack: recursive tramsmuteCasey Schaufler2-9/+36
2012-04-18Smack: move label list initializationCasey Schaufler2-25/+33
2012-04-11Smack: build when CONFIG_AUDIT not definedKees Cook1-4/+15
2012-04-09LSM: do not initialize common_audit_data to 0Eric Paris1-1/+1
2012-04-09SELinux: rename dentry_open to file_openEric Paris1-3/+3
2012-04-03lsm_audit: don't specify the audit pre/post callbacks in 'struct common_audit...Linus Torvalds1-2/+1
2012-04-03LSM: shrink the common_audit_data data unionEric Paris2-13/+26
2012-04-03LSM: shrink sizeof LSM specific portion of common_audit_dataEric Paris2-6/+18
2012-02-14security: trim security.hAl Viro1-0/+3
2012-01-07vfs: prefer ->dentry->d_sb to ->mnt->mnt_sbAl Viro1-2/+2
2011-11-11Smack: smackfs cipso seq read repairCasey Schaufler1-76/+39
2011-10-21Smack: allow to access /smack/access as normal userJarkko Sakkinen3-23/+50
2011-10-18Smack: fix: invalid length set for the result of /smack/accessJarkko Sakkinen1-1/+1
2011-10-14Smack: compilation fixJarkko Sakkinen1-0/+1
2011-10-13Smack: fix for /smack/access output, use string instead of byteJarkko Sakkinen1-2/+5
2011-10-13Smack: domain transition protections (v3)Jarkko Sakkinen1-11/+42
2011-10-13Smack: Provide information for UDS getsockopt(SO_PEERCRED)Casey Schaufler1-0/+9
2011-10-13Smack: Clean up commentsCasey Schaufler3-12/+10
2011-10-13Smack: Repair processing of fcntlCasey Schaufler1-25/+42
2011-10-13Smack: Rule list lookup performanceCasey Schaufler4-121/+220
2011-10-13Smack: check permissions from user space (v2)Jarkko Sakkinen1-63/+117
2011-08-02doc: Update the email address for Paul Moore in various source filesPaul Moore1-1/+1
2011-07-20->permission() sanitizing: don't pass flags to ->inode_permission()Al Viro1-2/+3
2011-05-24Merge branch 'master' of git://git.infradead.org/users/eparis/selinux into fo...James Morris2-29/+30
2011-04-26SMACK: smack_file_lock can use the struct pathEric Paris1-2/+2
2011-04-26LSM: separate LSM_AUDIT_DATA_DENTRY from LSM_AUDIT_DATA_PATHEric Paris2-20/+21
2011-04-26LSM: split LSM_AUDIT_DATA_FS into _PATH and _INODEEric Paris2-20/+20
2011-04-25SECURITY: Move exec_permission RCU checks into security modulesAndi Kleen1-1/+5
2011-04-23SECURITY: Move exec_permission RCU checks into security modulesAndi Kleen1-1/+5
2011-03-31Fix common misspellingsLucas De Marchi3-7/+7
2011-03-08Merge branch 'master' of git://git.infradead.org/users/eparis/selinux into nextJames Morris1-1/+4
2011-02-10Smack: correct final mmap check comparisonCasey Schaufler1-1/+1
2011-02-10security:smack: kill unused SMACK_LIST_MAX, MAY_ANY and MAY_ANYWRITEShan Wei1-8/+0
2011-02-09Smack: correct behavior in the mmap hookCasey Schaufler1-36/+49
2011-02-01fs/vfs/security: pass last path component to LSM on inode creationEric Paris1-1/+4
2011-01-17Subject: [PATCH] Smack: mmap controls for library containmentCasey Schaufler4-178/+522
2011-01-10Merge branch 'master' into nextJames Morris1-7/+7
2011-01-06af_unix: Avoid socket->sk NULL OOPS in stream connect security hooks.David S. Miller1-7/+7
2010-12-08Smack: Transmute labels on specified directoriesJarkko Sakkinen4-43/+139
2010-12-02This patch adds a new security attribute to Smack calledCasey Schaufler4-54/+176
2010-11-29Smack: UDS revisionCasey Schaufler1-43/+63
2010-11-16capabilities/syslog: open code cap_syslog logic to fix build failureEric Paris1-6/+2
2010-10-29convert get_sb_single() usersAl Viro1-7/+5
2010-10-22Merge branch 'llseek' of git://git.kernel.org/pub/scm/linux/kernel/git/arnd/bklLinus Torvalds1-0/+5
2010-10-21security: secid_to_secctx returns len when data is NULLEric Paris1-1/+2