summaryrefslogtreecommitdiff
path: root/security
AgeCommit message (Expand)AuthorFilesLines
2012-05-15Smack: allow for significantly longer Smack labels v4Casey Schaufler4-526/+941
2012-05-15gfp flags for security_inode_alloc()?Tetsuo Handa1-4/+4
2012-05-15Smack: recursive tramsmuteCasey Schaufler2-9/+36
2012-05-15Yama: replace capable() with ns_capable()Kees Cook1-2/+2
2012-05-15TOMOYO: Accept manager programs which do not start with / .Tetsuo Handa2-21/+6
2012-05-11KEYS: Add invalidation supportDavid Howells8-28/+110
2012-05-11KEYS: Do LRU discard in full keyringsDavid Howells2-7/+42
2012-05-11KEYS: Permit in-place link replacement in keyring listDavid Howells2-40/+57
2012-05-11KEYS: Perform RCU synchronisation on keys prior to key destructionDavid Howells1-29/+44
2012-05-11KEYS: Announce key type (un)registrationDavid Howells1-0/+3
2012-05-11KEYS: Reorganise keys MakefileDavid Howells1-3/+9
2012-05-11KEYS: Move the key config into security/keys/KconfigDavid Howells2-67/+72
2012-05-08netfilter: remove ip_queue supportPablo Neira Ayuso1-13/+0
2012-05-04Merge tag 'v3.4-rc5' into nextJames Morris3-29/+54
2012-05-03userns: Convert capabilities related permsion checksEric W. Biederman1-15/+26
2012-05-03userns: Store uid and gid values in struct cred with kuid_t and kgid_t typesEric W. Biederman1-2/+1
2012-05-03userns: Convert group_info values from gid_t to kgid_t.Eric W. Biederman1-1/+2
2012-04-26userns: Simplify the user_namespace by making userns->creator a kuid.Eric W. Biederman1-2/+3
2012-04-23Yama: remove an unused variableDan Carpenter1-1/+0
2012-04-19Yama: add additional ptrace scopesKees Cook1-11/+51
2012-04-19security: fix compile error in commoncap.cJonghwan Choi1-0/+1
2012-04-18fcaps: clear the same personality flags as suid when fcaps are usedEric Paris1-0/+5
2012-04-18Smack: move label list initializationCasey Schaufler2-25/+33
2012-04-14Fix execve behavior apparmor for PR_{GET,SET}_NO_NEW_PRIVSJohn Johansen1-4/+35
2012-04-14Add PR_{GET,SET}_NO_NEW_PRIVS to prevent execve from granting privsAndy Lutomirski3-3/+18
2012-04-11Smack: build when CONFIG_AUDIT not definedKees Cook1-4/+15
2012-04-09SELinux: remove unused common_audit_data in flush_unauthorized_filesEric Paris1-4/+0
2012-04-09SELinux: avc: remove the useless fields in avc_add_callbackWanlong Gao6-47/+15
2012-04-09SELinux: replace weak GFP_ATOMIC to GFP_KERNEL in avc_add_callbackWanlong Gao1-2/+2
2012-04-09SELinux: unify the selinux_audit_data and selinux_late_audit_dataEric Paris3-91/+16
2012-04-09SELinux: remove auditdeny from selinux_audit_dataEric Paris1-8/+1
2012-04-09LSM: do not initialize common_audit_data to 0Eric Paris11-44/+44
2012-04-09LSM: BUILD_BUG_ON if the common_audit_data union ever growsEric Paris1-0/+7
2012-04-09LSM: remove the task field from common_audit_dataEric Paris2-7/+2
2012-04-09apparmor: move task from common_audit_data to apparmor_audit_dataEric Paris3-3/+11
2012-04-09LSM: remove the COMMON_AUDIT_DATA_INIT type expansionEric Paris10-43/+43
2012-04-09SELinux: move common_audit_data to a noinline slow path functionEric Paris1-11/+21
2012-04-09SELinux: remove inode_has_perm_noadpEric Paris1-24/+4
2012-04-09SELinux: delay initialization of audit data in selinux_inode_permissionEric Paris3-70/+105
2012-04-09SELinux: if sel_make_bools errors don't leave inconsistent stateEric Paris1-0/+1
2012-04-09SELinux: remove needless sel_div functionEric Paris1-6/+1
2012-04-09SELinux: possible NULL deref in context_struct_to_stringEric Paris1-3/+5
2012-04-09SELinux: audit failed attempts to set invalid labelsEric Paris1-2/+34
2012-04-09SELinux: rename dentry_open to file_openEric Paris6-15/+15
2012-04-09SELinux: check OPEN on truncate callsEric Paris1-1/+5
2012-04-09SELinux: add default_type statementsEric Paris4-6/+33
2012-04-09SELinux: allow default source/target selectors for user/role/rangeEric Paris6-8/+109
2012-04-09SELinux: loosen DAC perms on reading policyEric Paris1-1/+1
2012-04-09SELinux: allow seek operations on the file exposing policyEric Paris1-0/+1
2012-04-08userns: Add an explicit reference to the parent user namespaceEric W. Biederman1-1/+1