summaryrefslogtreecommitdiffstats
path: root/include/linux/security.h
Commit message (Expand)AuthorAgeFilesLines
* [PATCH] pass MAY_OPEN to vfs_permission() explicitlyAl Viro2008-07-261-4/+3
* security: remove unused forwardsHugh Dickins2008-07-241-2/+0
* security: remove register_security hookJames Morris2008-07-141-10/+0
* security: remove unused sb_get_mnt_opts hookMiklos Szeredi2008-07-141-14/+0
* LSM/SELinux: show LSM mount options in /proc/mountsEric Paris2008-07-141-0/+9
* Security: split proc ptrace checking into read vs. attachStephen Smalley2008-07-141-5/+11
* Security: Make secctx_to_secid() take const secdataDavid Howells2008-04-291-3/+3
* keys: add keyctl function to get a security labelDavid Howells2008-04-291-1/+19
* xattr: add missing consts to function argumentsDavid Howells2008-04-291-20/+23
* Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/jmo...Linus Torvalds2008-04-281-449/+449
|\
| * SELinux: include/security.h whitespace, syntax, and other cleanupsEric Paris2008-04-281-449/+449
* | capabilities: implement per-process securebitsAndrew G. Morgan2008-04-281-7/+9
|/
* [PATCH] switch a bunch of LSM hooks from nameidata to pathAl Viro2008-04-211-26/+26
* Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/jmo...Linus Torvalds2008-04-181-1/+113
|\
| * Security: Introduce security= boot parameterAhmed S. Darwish2008-04-191-0/+12
| * LSM/Audit: Introduce generic Audit LSM hooksAhmed S. Darwish2008-04-191-0/+72
| * LSM: Introduce inode_getsecid and ipc_getsecid hooksAhmed S. Darwish2008-04-191-1/+29
* | LSM: Make the Labeled IPsec hooks more stack friendlyPaul Moore2008-04-121-24/+24
|/
* file capabilities: remove cap_task_kill()Serge Hallyn2008-03-201-2/+1
* LSM/SELinux: Interfaces to allow FS to control mount optionsEric Paris2008-03-061-25/+74
* capabilities: introduce per-process capability bounding setSerge E. Hallyn2008-02-051-5/+0
* VFS/Security: Rework inode_getsecurity and callers to return resulting bufferDavid P. Quigley2008-02-051-12/+9
* security/selinux: constify function pointer tables and fieldsJan Engelhardt2008-01-251-1/+1
* security: add a secctx_to_secid() hookDavid Howells2008-01-251-0/+13
* security: remove security_sb_post_mountroot hookH. Peter Anvin2008-01-251-8/+0
* Security: add get, set, and cloning of superblock security informationEric Paris2008-01-251-0/+36
* fix up security_socket_getpeersec_* documentationSerge Hallyn2007-10-201-2/+15
* V3 file capabilities: alter behavior of cap_setpcapAndrew Morgan2007-10-181-0/+7
* security/ cleanupsAdrian Bunk2007-10-171-15/+0
* Implement file posix capabilitiesSerge E. Hallyn2007-10-171-4/+36
* security: Convert LSM into a static interfaceJames Morris2007-10-171-984/+206
* SELinux: Improve read/write performanceYuichi Nakamura2007-10-171-0/+18
* fix NULL pointer dereference in __vm_enough_memory()Alan Cox2007-08-221-5/+15
* security: Protection for exploiting null dereference using mmapEric Paris2007-07-111-5/+12
* Fix occurrences of "the the "Michael Opdenacker2007-05-091-1/+1
* [PATCH] sanitize security_getprocattr() APIAl Viro2007-03-141-4/+4
* [PATCH] mark struct file_operations const 1Arjan van de Ven2007-02-121-1/+1
* [PATCH] Replace regular code with appropriate calls to container_of()Robert P. J. Day2007-02-111-1/+1
* SELinux: Fix SA selection semanticsVenkat Yekkirala2006-12-021-19/+0
* SELinux: Return correct context for SO_PEERSECVenkat Yekkirala2006-12-021-1/+15
* SELinux: Various xfrm labeling fixesVenkat Yekkirala2006-12-021-11/+10
* IPsec: correct semantics for SELinux policy matchingVenkat Yekkirala2006-10-111-15/+9
* [PATCH] fs.h: ifdef security fieldsAlexey Dobriyan2006-09-291-0/+1
* [NetLabel]: SELinux supportVenkat Yekkirala2006-09-221-12/+13
* [MLSXFRM]: Auto-labeling of child socketsVenkat Yekkirala2006-09-221-0/+55
* [MLSXFRM]: Default labeling of socket specific IPSec policiesVenkat Yekkirala2006-09-221-3/+16
* [MLSXFRM]: Add flow labelingVenkat Yekkirala2006-09-221-13/+25
* [MLSXFRM]: Flow based matching of xfrm policy and stateVenkat Yekkirala2006-09-221-16/+90
* [MLSXFRM]: Add security sid to sockVenkat Yekkirala2006-09-221-0/+12
* [SECURITY]: Fix build with CONFIG_SECURITY disabled.David S. Miller2006-08-021-1/+0
OpenPOWER on IntegriCloud