summaryrefslogtreecommitdiff
path: root/security
AgeCommit message (Expand)AuthorFilesLines
2017-03-03Enable setting security contexts on rootfs inodes.Stephen Smalley1-0/+7
2017-03-03SELinux: ss: Fix policy write for ioctl operationsJeff Vander Stoep1-0/+3
2017-03-03SELinux: use deletion-safe iterator to free listJeff Vander Stoep1-2/+4
2017-03-03selinux: add SOCK_DIAG_BY_FAMILY to the list of netlink message typesPaul Moore1-0/+2
2017-03-03selinux/nlmsg: add XFRM_MSG_MAPPINGNicolas Dichtel1-0/+1
2017-03-03selinux/nlmsg: add XFRM_MSG_MIGRATENicolas Dichtel1-0/+1
2017-03-03selinux/nlmsg: add XFRM_MSG_REPORTNicolas Dichtel1-0/+1
2017-03-03selinux/nlmsg: add XFRM_MSG_[NEW|GET]SADINFONicolas Dichtel1-0/+2
2017-03-03selinux/nlmsg: add XFRM_MSG_GETSPDINFONicolas Dichtel1-0/+1
2017-03-03selinux/nlmsg: add XFRM_MSG_NEWSPDINFONicolas Dichtel1-0/+1
2017-03-03SELinux: per-command whitelisting of ioctlsJeff Vander Stoep11-64/+810
2017-03-03security: lsm_audit: add ioctl specific auditingJeff Vander Stoep1-0/+15
2017-03-03SELinux: Update policy version to support constraints infoRichard Haines4-10/+101
2017-03-03selinux: reduce the number of calls to synchronize_net() when flushing cachesPaul Moore7-42/+23
2017-03-03selinux: Fix Kernel panic due to NULL pointer dereferenceSatya Durga Srinivasu Prabhala1-0/+5
2016-07-20Smack: Assign smack_known_web label for kernel thread's socket in the sk_allo...jooseong lee1-2/+10
2016-07-07Smack: adds smackfs/ptrace interfacesubmit/tizen/20160707.123222accepted/tizen/common/20160707.172229Lukasz Pawelczyk4-9/+115
2016-07-07Smack: unify all ptrace accesses in the smackLukasz Pawelczyk1-13/+71
2016-07-07Smack: fix the subject/object order in smack_ptrace_traceme()Lukasz Pawelczyk3-9/+29
2016-07-07Smack: limited capability for changing process labelZbigniew Jasinski4-42/+230
2016-07-07Smack: type confusion in smak sendmsg() handlerRoman Kubiak1-1/+1
2016-07-07Smack: File receive for socketsCasey Schaufler1-1/+24
2016-07-07smack: Add missing logging in bidirectional UDS connect checkRafal Krypa1-1/+1
2016-07-07smack: Fix a bidirectional UDS connect check typoZbigniew Jasinski1-1/+3
2016-07-07Fix a bidirectional UDS connect check typoLukasz Pawelczyk1-2/+2
2016-07-07Smack: bidirectional UDS connect checkCasey Schaufler2-28/+34
2016-07-07Smack: pipefs fix in smack_d_instantiateRoman Kubiak1-1/+4
2016-07-07Smack: ignore private inode for smack_file_receiveSeung-Woo Kim1-0/+3
2016-07-07Kernel threads excluded from smack checksRoman Kubiak1-0/+6
2016-07-07Smack: allow multiple labels in onlycapRafal Krypa3-70/+171
2016-07-07Smack: fix seq operations in smackfsRafal Krypa1-30/+22
2016-07-07Smack: Allow an unconfined label in bringup modeCasey Schaufler4-15/+173
2016-07-07Smack: Bring-up access modeCasey Schaufler5-26/+288
2016-07-07Smack: Correctly remove SMACK64TRANSMUTE attributeCasey Schaufler1-6/+19
2016-07-07Minor improvement of 'smack_sb_kern_mount'José Bollo1-3/+5
2016-07-07Smack: Rationalize mount restrictionsCasey Schaufler1-54/+29
2016-07-06Smack: Assign smack_known_web as default smk_in label for kernel thread's socketMarcin Lis1-1/+15
2016-01-07nick kvfree() from apparmorAl Viro2-34/+0
2015-12-22move d_rcu from overlapping d_child to overlapping d_aliasAl Viro1-3/+3
2015-12-22selinux: fix sel_write_enforce broken return valueJoe Perches1-1/+1
2015-12-22KEYS: close race between key lookup and freeingSasha Levin1-2/+2
2015-12-22KEYS: Fix stale key registration at error pathTakashi Iwai1-1/+4
2015-12-22selinux: fix inode security list corruptionStephen Smalley1-1/+1
2015-12-22evm: check xattr value length and type in evm_inode_setxattr()Dmitry Kasatkin1-3/+6
2015-12-22CAPABILITIES: remove undefined caps from all processesEric Paris1-0/+3
2015-12-22evm: prohibit userspace writing 'security.evm' HMAC valueMimi Zohar1-2/+10
2015-12-22ima: introduce ima_kernel_read()Dmitry Kasatkin1-1/+31
2015-12-22selinux: correctly label /proc inodes in use before the policy is loadedPaul Moore1-9/+27
2015-12-22SELinux: bigendian problems with filename trans rulesEric Paris1-4/+4
2015-12-22SELinux: Fix memory leak upon loading policyTetsuo Handa1-1/+13