This is an updated set of 2.6.23 SELinux changes, rebased & tested against
current git. The vmsplice patch has been dropped from this and will be
resubmitted via Jens. Also added an ack from Chris Wright for the mmap
null dereference hooks (which I'd forgotten to add to my tree some time
ago).
Please pull.
The following changes since commit 4eb6bf6bfb580afaf1e1a1d30cba17a078530cf4:
Alan Cox (1):
lots-of-architectures: enable arbitary speed tty support
are found in the git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/selinux-2.6.git#for-linus
Adrian Bunk (1):
security: unexport mmap_min_addr
Christopher J. PeBenito (4):
selinux: add support for querying object classes and permissions from the running policy
selinux: rename sel_remove_bools() for more general usage.
selinux: change sel_make_dir() to specify inode counter.
selinux: add selinuxfs structure for object class discovery
Eric Paris (2):
selinux: introduce schedule points in policydb_destroy()
security: Protection for exploiting null dereference using mmap
Paul Moore (1):
SELinux: use SECINITSID_NETMSG instead of SECINITSID_UNLABELED for NetLabel
Stephen Smalley (1):
SELinux: allow preemption between transition permission checks
Tobias Oed (1):
SELinux: Use %lu for inode->i_no when printing avc
Documentation/sysctl/vm.txt | 15 ++
include/linux/security.h | 17 ++-
kernel/sysctl.c | 10 +
mm/mmap.c | 4 +-
mm/mremap.c | 13 +-
mm/nommu.c | 2 +-
security/dummy.c | 6 +-
security/security.c | 1 +
security/selinux/avc.c | 12 +-
security/selinux/hooks.c | 42 +++--
security/selinux/include/av_perm_to_string.h | 1 +
security/selinux/include/av_permissions.h | 1 +
security/selinux/include/avc.h | 6 +-
security/selinux/include/class_to_string.h | 1 +
security/selinux/include/flask.h | 1 +
security/selinux/include/security.h | 4 +
security/selinux/netlabel.c | 34 ++--
security/selinux/selinuxfs.c | 269 +++++++++++++++++++++++++-
security/selinux/ss/policydb.c | 7 +
security/selinux/ss/services.c | 144 ++++++++++++--
20 files changed, 504 insertions(+), 86 deletions(-)
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [email protected]
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
[Index of Archives]
[Kernel Newbies]
[Netfilter]
[Bugtraq]
[Photo]
[Stuff]
[Gimp]
[Yosemite News]
[MIPS Linux]
[ARM Linux]
[Linux Security]
[Linux RAID]
[Video 4 Linux]
[Linux for the blind]
[Linux Resources]