aboutsummaryrefslogtreecommitdiffstats
path: root/security/security.c
Commit message (Expand)AuthorAgeFilesLines
* CacheFiles: Export things for CacheFilesDavid Howells2009-04-031-0/+2
* lsm: Remove the socket_post_accept() hookPaul Moore2009-03-281-5/+0
* Merge branch 'next' into for-linusJames Morris2009-01-071-4/+22
|\
| * CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #3]David Howells2009-01-071-4/+22
| * Revert "CRED: Fix regression in cap_capable() as shown up by sys_faccessat() ...James Morris2009-01-071-21/+4
| * CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #2]David Howells2009-01-051-4/+21
* | introduce new LSM hooks where vfsmount is available.Kentaro Takeda2008-12-311-0/+66
|/
* security: pass mount flags to security_sb_kern_mount()James Morris2008-12-201-2/+2
* CRED: fix sparse warningsHannes Eder2008-11-251-3/+3
* CRED: Allow kernel services to override LSM settings for task actionsDavid Howells2008-11-141-0/+10
* CRED: Make execve() take advantage of copy-on-write credentialsDavid Howells2008-11-141-18/+8
* CRED: Inaugurate COW credentialsDavid Howells2008-11-141-31/+27
* CRED: Pass credentials through dentry_open()David Howells2008-11-141-2/+2
* CRED: Detach the credentials from task_structDavid Howells2008-11-141-4/+4
* CRED: Constify the kernel_cap_t arguments to the capset LSM hooksDavid Howells2008-11-141-6/+6
* CRED: Neuter sys_capset()David Howells2008-11-141-10/+8
* Add a new capable interface that will be used by systems that use audit toEric Paris2008-11-111-1/+6
* nfsd: fix vm overcommit crashAlan Cox2008-10-301-0/+9
* Merge branch 'master' into nextJames Morris2008-08-281-3/+7
|\
| * security: Fix setting of PF_SUPERPRIV by __capable()David Howells2008-08-141-3/+7
* | security: add/fix security kernel-docRandy Dunlap2008-08-201-4/+4
|/
* [patch 3/4] fat: dont call notify_changeMiklos Szeredi2008-07-261-0/+1
* [PATCH] pass MAY_OPEN to vfs_permission() explicitlyAl Viro2008-07-261-2/+2
* security: remove register_security hookJames Morris2008-07-141-29/+0
* security: remove dummy moduleMiklos Szeredi2008-07-141-10/+5
* security: remove unused sb_get_mnt_opts hookMiklos Szeredi2008-07-141-6/+0
* LSM/SELinux: show LSM mount options in /proc/mountsEric Paris2008-07-141-0/+5
* security: fix return of void-valued expressionsJames Morris2008-07-141-3/+3
* Security: split proc ptrace checking into read vs. attachStephen Smalley2008-07-141-2/+3
* Security: Make secctx_to_secid() take const secdataDavid Howells2008-04-291-1/+1
* keys: add keyctl function to get a security labelDavid Howells2008-04-291-0/+5
* xattr: add missing consts to function argumentsDavid Howells2008-04-291-6/+6
* capabilities: implement per-process securebitsAndrew G. Morgan2008-04-281-2/+2
* [PATCH] switch a bunch of LSM hooks from nameidata to pathAl Viro2008-04-211-10/+10
* Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/jmo...Linus Torvalds2008-04-181-1/+72
|\
| * security: fix up documentation for security_module_enableJames Morris2008-04-191-1/+1
| * Security: Introduce security= boot parameterAhmed S. Darwish2008-04-191-1/+37
| * LSM/Audit: Introduce generic Audit LSM hooksAhmed S. Darwish2008-04-191-0/+25
| * LSM: Introduce inode_getsecid and ipc_getsecid hooksAhmed S. Darwish2008-04-191-0/+10
* | Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6.26Linus Torvalds2008-04-181-10/+11
|\ \ | |/ |/|
| * LSM: Make the Labeled IPsec hooks more stack friendlyPaul Moore2008-04-121-10/+11
* | security: replace remaining __FUNCTION__ occurrencesHarvey Harrison2008-04-181-4/+4
|/
* LSM/SELinux: Interfaces to allow FS to control mount optionsEric Paris2008-03-061-8/+15
* security: allow Kconfig to set default mmap_min_addr protectionEric Paris2008-02-061-1/+3
* VFS/Security: Rework inode_getsecurity and callers to return resulting bufferDavid P. Quigley2008-02-051-2/+2
* security: add a secctx_to_secid() hookDavid Howells2008-01-251-0/+6
* security: remove security_sb_post_mountroot hookH. Peter Anvin2008-01-251-5/+0
* Security: add get, set, and cloning of superblock security informationEric Paris2008-01-251-0/+20
* security/ cleanupsAdrian Bunk2007-10-171-57/+1
* Implement file posix capabilitiesSerge E. Hallyn2007-10-171-0/+10