summaryrefslogtreecommitdiff
path: root/security/security.c
AgeCommit message (Expand)AuthorFilesLines
2009-04-03CacheFiles: Export things for CacheFilesDavid Howells1-0/+2
2009-03-28lsm: Remove the socket_post_accept() hookPaul Moore1-5/+0
2009-01-07Merge branch 'next' into for-linusJames Morris1-4/+22
2009-01-07CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #3]David Howells1-4/+22
2009-01-07Revert "CRED: Fix regression in cap_capable() as shown up by sys_faccessat() ...James Morris1-21/+4
2009-01-05CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #2]David Howells1-4/+21
2009-01-01introduce new LSM hooks where vfsmount is available.Kentaro Takeda1-0/+66
2008-12-20security: pass mount flags to security_sb_kern_mount()James Morris1-2/+2
2008-11-25CRED: fix sparse warningsHannes Eder1-3/+3
2008-11-14CRED: Allow kernel services to override LSM settings for task actionsDavid Howells1-0/+10
2008-11-14CRED: Make execve() take advantage of copy-on-write credentialsDavid Howells1-18/+8
2008-11-14CRED: Inaugurate COW credentialsDavid Howells1-31/+27
2008-11-14CRED: Pass credentials through dentry_open()David Howells1-2/+2
2008-11-14CRED: Detach the credentials from task_structDavid Howells1-4/+4
2008-11-14CRED: Constify the kernel_cap_t arguments to the capset LSM hooksDavid Howells1-6/+6
2008-11-14CRED: Neuter sys_capset()David Howells1-10/+8
2008-11-11Add a new capable interface that will be used by systems that use audit toEric Paris1-1/+6
2008-10-30nfsd: fix vm overcommit crashAlan Cox1-0/+9
2008-08-28Merge branch 'master' into nextJames Morris1-3/+7
2008-08-20security: add/fix security kernel-docRandy Dunlap1-4/+4
2008-08-14security: Fix setting of PF_SUPERPRIV by __capable()David Howells1-3/+7
2008-07-27[patch 3/4] fat: dont call notify_changeMiklos Szeredi1-0/+1
2008-07-27[PATCH] pass MAY_OPEN to vfs_permission() explicitlyAl Viro1-2/+2
2008-07-14security: remove register_security hookJames Morris1-29/+0
2008-07-14security: remove dummy moduleMiklos Szeredi1-10/+5
2008-07-14security: remove unused sb_get_mnt_opts hookMiklos Szeredi1-6/+0
2008-07-14LSM/SELinux: show LSM mount options in /proc/mountsEric Paris1-0/+5
2008-07-14security: fix return of void-valued expressionsJames Morris1-3/+3
2008-07-14Security: split proc ptrace checking into read vs. attachStephen Smalley1-2/+3
2008-04-30Security: Make secctx_to_secid() take const secdataDavid Howells1-1/+1
2008-04-29keys: add keyctl function to get a security labelDavid Howells1-0/+5
2008-04-29xattr: add missing consts to function argumentsDavid Howells1-6/+6
2008-04-28capabilities: implement per-process securebitsAndrew G. Morgan1-2/+2
2008-04-22[PATCH] switch a bunch of LSM hooks from nameidata to pathAl Viro1-10/+10
2008-04-19Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/jmo...Linus Torvalds1-1/+72
2008-04-19Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6.26Linus Torvalds1-10/+11
2008-04-19security: fix up documentation for security_module_enableJames Morris1-1/+1
2008-04-19Security: Introduce security= boot parameterAhmed S. Darwish1-1/+37
2008-04-19LSM/Audit: Introduce generic Audit LSM hooksAhmed S. Darwish1-0/+25
2008-04-19LSM: Introduce inode_getsecid and ipc_getsecid hooksAhmed S. Darwish1-0/+10
2008-04-18security: replace remaining __FUNCTION__ occurrencesHarvey Harrison1-4/+4
2008-04-13LSM: Make the Labeled IPsec hooks more stack friendlyPaul Moore1-10/+11
2008-03-06LSM/SELinux: Interfaces to allow FS to control mount optionsEric Paris1-8/+15
2008-02-06security: allow Kconfig to set default mmap_min_addr protectionEric Paris1-1/+3
2008-02-05VFS/Security: Rework inode_getsecurity and callers to return resulting bufferDavid P. Quigley1-2/+2
2008-01-25security: add a secctx_to_secid() hookDavid Howells1-0/+6
2008-01-25security: remove security_sb_post_mountroot hookH. Peter Anvin1-5/+0
2008-01-25Security: add get, set, and cloning of superblock security informationEric Paris1-0/+20
2007-10-17security/ cleanupsAdrian Bunk1-57/+1
2007-10-17Implement file posix capabilitiesSerge E. Hallyn1-0/+10