summaryrefslogtreecommitdiffstats
path: root/security/smack/smack_lsm.c
Commit message (Expand)AuthorAgeFilesLines
* [PATCH] pass MAY_OPEN to vfs_permission() explicitlyAl Viro2008-07-261-2/+1
* security: remove register_security hookJames Morris2008-07-141-23/+0
* Security: split proc ptrace checking into read vs. attachStephen Smalley2008-07-141-2/+3
* Smack: fuse mount hang fixCasey Schaufler2008-06-041-0/+12
* signals: cleanup security_task_kill() usage/implementationOleg Nesterov2008-04-301-9/+0
* Smack: Integrate Smack with AuditAhmed S. Darwish2008-04-301-0/+155
* Security: Make secctx_to_secid() take const secdataDavid Howells2008-04-301-1/+1
* xattr: add missing consts to function argumentsDavid Howells2008-04-291-6/+6
* smack: use cap_task_prctlSerge E. Hallyn2008-04-281-0/+1
* smack: fix integer as NULL pointer warning in smack_lsm.cHarvey Harrison2008-04-281-1/+1
* [PATCH] switch a bunch of LSM hooks from nameidata to pathAl Viro2008-04-211-2/+2
* Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/jmo...Linus Torvalds2008-04-181-1/+6
|\
| * Security: Introduce security= boot parameterAhmed S. Darwish2008-04-191-1/+6
* | NetLabel: Allow passing the LSM domain as a shared pointerPaul Moore2008-04-121-1/+1
|/
* file capabilities: remove cap_task_kill()Serge Hallyn2008-03-201-5/+0
* smack: do not dereference NULL ipc objectAhmed S. Darwish2008-03-191-3/+6
* LSM/SELinux: Interfaces to allow FS to control mount optionsEric Paris2008-03-061-8/+1
* Smack: update for file capabilitiesCasey Schaufler2008-02-231-13/+74
* Smack: unlabeled outgoing ambient packetsCasey Schaufler2008-02-191-8/+28
* Embed a struct path into struct nameidata instead of nd->{dentry,mnt}Jan Blunck2008-02-141-1/+1
* Smack: check for 'struct socket' with NULL skAhmed S. Darwish2008-02-131-4/+5
* Smack: Simplified Mandatory Access Control KernelCasey Schaufler2008-02-051-0/+2518
OpenPOWER on IntegriCloud