summaryrefslogtreecommitdiffstats
path: root/security/selinux/include
Commit message (Expand)AuthorAgeFilesLines
* LSM/SELinux: Interfaces to allow FS to control mount optionsEric Paris2008-03-061-0/+5
* d_path: Use struct path in struct avc_audit_dataJan Blunck2008-02-141-4/+2
* selinux: support 64-bit capabilitiesStephen Smalley2008-02-114-0/+8
* SELinux: Remove security_get_policycaps()Paul Moore2008-02-061-1/+0
* SELinux: Allow NetLabel to directly cache SIDsPaul Moore2008-01-302-4/+0
* SELinux: Enable dynamic enable/disable of the network access checksPaul Moore2008-01-301-0/+12
* SELinux: Better integration between peer labeling subsystemsPaul Moore2008-01-303-1/+8
* SELinux: Add a new peer class and permissions to the Flask definitionsPaul Moore2008-01-304-0/+26
* SELinux: Add a capabilities bitmap to SELinux policy version 22Paul Moore2008-01-301-1/+14
* SELinux: Add a network node caching mechanism similar to the sel_netif_*() fu...Paul Moore2008-01-302-0/+41
* SELinux: Only store the network interface's ifindexPaul Moore2008-01-301-1/+1
* SELinux: Convert the netif code to use ifindex valuesPaul Moore2008-01-303-6/+6
* NetLabel: Add IP address family information to the netlbl_skbuff_getattr() fu...Paul Moore2008-01-301-1/+7
* Security: add get, set, and cloning of superblock security informationEric Paris2008-01-251-0/+1
* SELinux: policy selectable handling of unknown classes and permsEric Paris2007-10-171-0/+2
* SELinux: Improve read/write performanceYuichi Nakamura2007-10-172-0/+4
* security: Protection for exploiting null dereference using mmapEric Paris2007-07-114-0/+4
* SELinux: allow preemption between transition permission checksStephen Smalley2007-07-111-2/+4
* selinux: add selinuxfs structure for object class discoveryChristopher J. PeBenito2007-07-111-0/+1
* selinux: add support for querying object classes and permissions from the run...Christopher J. PeBenito2007-07-111-0/+3
* selinux: export initial SID contexts via selinuxfsJames Carter2007-04-261-0/+2
* selinux: remove userland security class and permission definitionsStephen Smalley2007-04-264-314/+17
* SELinux: move security_skb_extlbl_sid() out of the security serverPaul Moore2007-04-261-3/+0
* SELinux: rename selinux_netlabel.h to netlabel.hPaul Moore2007-04-261-0/+0
* SELinux: extract the NetLabel SELinux support from the security serverPaul Moore2007-04-262-37/+58
* [SELINUX]: Fix 2.6.20-rc6 build when no xfrmVenkat Yekkirala2007-01-261-0/+9
* [PATCH] selinux endianness annotationsAl Viro2006-12-041-4/+4
* Compile fix for "peer secid consolidation for external network labeling"James Morris2006-12-021-1/+2
* SELinux: peer secid consolidation for external network labelingPaul Moore2006-12-023-24/+12
* NetLabel: SELinux cleanupsPaul Moore2006-12-022-8/+15
* [SELinux]: Add support for DCCPJames Morris2006-12-025-0/+45
* SELinux: Fix SA selection semanticsVenkat Yekkirala2006-12-021-5/+2
* SELinux: Return correct context for SO_PEERSECVenkat Yekkirala2006-12-021-6/+6
* SELinux: Various xfrm labeling fixesVenkat Yekkirala2006-12-021-2/+2
* SELinux: export object class and permission definitionsChad Sellers2006-11-281-0/+24
* [NetLabel]: protect the CIPSOv4 socket option from setsockopt()Paul Moore2006-10-301-0/+10
* IPsec: correct semantics for SELinux policy matchingVenkat Yekkirala2006-10-111-1/+2
* [PATCH] SELinux: convert sbsec semaphore to a mutexEric Paris2006-09-261-1/+1
* [PATCH] SELinux: change isec semaphore to a mutexEric Paris2006-09-261-1/+1
* [PATCH] selinux: add support for range transitions on object classesDarrel Goeddel2006-09-261-1/+2
* [PATCH] selinux: enable configuration of max policy versionStephen Smalley2006-09-261-1/+5
* [NetLabel]: add some missing #includes to various header filesPaul Moore2006-09-221-0/+9
* [NetLabel]: uninline selinux_netlbl_inode_permission()Paul Moore2006-09-221-34/+1
* [NetLabel]: Correctly initialize the NetLabel fields.Paul Moore2006-09-221-0/+18
* [NetLabel]: SELinux supportVenkat Yekkirala2006-09-222-0/+133
* [MLSXFRM]: Fix build with SECURITY_NETWORK_XFRM disabled.Venkat Yekkirala2006-09-221-1/+6
* [MLSXFRM]: Default labeling of socket specific IPSec policiesVenkat Yekkirala2006-09-221-1/+2
* [MLSXFRM]: Add flow labelingVenkat Yekkirala2006-09-221-13/+1
* [MLSXFRM]: Flow based matching of xfrm policy and stateVenkat Yekkirala2006-09-221-6/+17
* [MLSXFRM]: Add security sid to sockVenkat Yekkirala2006-09-221-0/+1
OpenPOWER on IntegriCloud