summaryrefslogtreecommitdiffstats
path: root/security/smack/smack_lsm.c
Commit message (Expand)AuthorAgeFilesLines
* Fix NULL pointer dereference in smack_inode_unlink() and smack_inode_rmdir()Igor Zhbanov2013-03-191-2/+2
* new helper: file_inode(file)Al Viro2013-02-221-10/+4
* consitify do_mount() argumentsAl Viro2012-10-111-2/+2
* Smack: setprocattr memory leak fixCasey Schaufler2012-09-181-12/+2
* Smack: remove task_wait() hook.Casey Schaufler2012-09-181-29/+8
* Smack: onlycap limits on CAP_MAC_ADMINCasey Schaufler2012-07-131-8/+9
* Smack: fix smack_new_inode bogositiesCasey Schaufler2012-07-131-6/+2
* split ->file_mmap() into ->mmap_addr()/->mmap_file()Al Viro2012-05-311-10/+5
* split cap_mmap_addr() out of cap_file_mmap()Al Viro2012-05-311-1/+1
* Merge branch 'master' of git://git.infradead.org/users/eparis/selinux into nextJames Morris2012-05-221-3/+3
|\
| * SELinux: rename dentry_open to file_openEric Paris2012-04-091-3/+3
* | Smack: allow for significantly longer Smack labels v4Casey Schaufler2012-05-141-141/+44
* | gfp flags for security_inode_alloc()?Tetsuo Handa2012-05-141-4/+4
* | Smack: recursive tramsmuteCasey Schaufler2012-05-141-9/+35
* | Smack: move label list initializationCasey Schaufler2012-04-181-11/+33
* | Smack: build when CONFIG_AUDIT not definedKees Cook2012-04-101-4/+15
|/
* LSM: shrink the common_audit_data data unionEric Paris2012-04-031-12/+17
* security: trim security.hAl Viro2012-02-141-0/+3
* vfs: prefer ->dentry->d_sb to ->mnt->mnt_sbAl Viro2012-01-061-2/+2
* Smack: compilation fixJarkko Sakkinen2011-10-141-0/+1
* Smack: domain transition protections (v3)Jarkko Sakkinen2011-10-121-11/+42
* Smack: Provide information for UDS getsockopt(SO_PEERCRED)Casey Schaufler2011-10-121-0/+9
* Smack: Clean up commentsCasey Schaufler2011-10-121-2/+8
* Smack: Repair processing of fcntlCasey Schaufler2011-10-121-25/+42
* Smack: Rule list lookup performanceCasey Schaufler2011-10-121-49/+77
* doc: Update the email address for Paul Moore in various source filesPaul Moore2011-08-011-1/+1
* ->permission() sanitizing: don't pass flags to ->inode_permission()Al Viro2011-07-201-2/+3
* Merge branch 'master' of git://git.infradead.org/users/eparis/selinux into fo...James Morris2011-05-241-21/+27
|\
| * SMACK: smack_file_lock can use the struct pathEric Paris2011-04-251-2/+2
| * LSM: separate LSM_AUDIT_DATA_DENTRY from LSM_AUDIT_DATA_PATHEric Paris2011-04-251-14/+20
| * LSM: split LSM_AUDIT_DATA_FS into _PATH and _INODEEric Paris2011-04-251-16/+16
| * SECURITY: Move exec_permission RCU checks into security modulesAndi Kleen2011-04-251-1/+5
* | SECURITY: Move exec_permission RCU checks into security modulesAndi Kleen2011-04-221-1/+5
* | Fix common misspellingsLucas De Marchi2011-03-311-3/+3
|/
* Merge branch 'master' of git://git.infradead.org/users/eparis/selinux into nextJames Morris2011-03-081-1/+4
|\
| * fs/vfs/security: pass last path component to LSM on inode creationEric Paris2011-02-011-1/+4
* | Smack: correct final mmap check comparisonCasey Schaufler2011-02-091-1/+1
* | Smack: correct behavior in the mmap hookCasey Schaufler2011-02-091-36/+49
|/
* Subject: [PATCH] Smack: mmap controls for library containmentCasey Schaufler2011-01-171-42/+227
* Merge branch 'master' into nextJames Morris2011-01-101-7/+7
|\
| * af_unix: Avoid socket->sk NULL OOPS in stream connect security hooks.David S. Miller2011-01-051-7/+7
* | Smack: Transmute labels on specified directoriesJarkko Sakkinen2010-12-071-24/+50
* | This patch adds a new security attribute to Smack calledCasey Schaufler2010-12-021-50/+142
* | Smack: UDS revisionCasey Schaufler2010-11-291-43/+63
|/
* capabilities/syslog: open code cap_syslog logic to fix build failureEric Paris2010-11-151-6/+2
* security: secid_to_secctx returns len when data is NULLEric Paris2010-10-211-1/+2
* security: remove unused parameter from security_task_setscheduler()KOSAKI Motohiro2010-10-211-3/+2
* Merge branch 'for-next' of git://git.kernel.org/pub/scm/linux/kernel/git/jiko...Linus Torvalds2010-08-041-1/+1
|\
| * fix typos concerning "initiali[zs]e"Uwe Kleine-König2010-06-161-1/+1
* | security: make LSMs explicitly mask off permissionsEric Paris2010-08-021-0/+2
OpenPOWER on IntegriCloud