summaryrefslogtreecommitdiffstats
path: root/security/security.c
Commit message (Expand)AuthorAgeFilesLines
* Merge branch 'next-queue' into nextJames Morris2010-03-091-1/+1
|\
| * Security: Add __init to register_security to disable load a security module o...wzt.wzt@gmail.com2010-03-031-1/+1
* | Merge branch 'next' into for-linusJames Morris2010-03-011-21/+28
|\ \ | |/ |/|
| * Security: add static to security_ops and default_security_ops variablewzt.wzt@gmail.com2010-02-241-2/+9
| * syslog: distinguish between /proc/kmsg and syscallsKees Cook2010-02-041-2/+2
| * security: correct error returns for get/set security with private inodesJames Morris2010-01-151-2/+2
| * LSM: Rename security_path_ functions argument names.Tetsuo Handa2009-12-081-15/+15
* | Take ima_file_free() to proper place.Al Viro2010-02-071-2/+0
|/
* security: report the module name to security_module_requestEric Paris2009-11-101-2/+2
* Config option to set a default LSMJohn Johansen2009-11-091-3/+6
* LSM: imbed ima calls in the security hooksMimi Zohar2009-10-251-3/+25
* LSM: Add security_path_chroot().Tetsuo Handa2009-10-121-0/+5
* LSM: Add security_path_chmod() and security_path_chown().Tetsuo Handa2009-10-121-0/+15
* LSM/SELinux: inode_{get,set,notify}secctx hooks to access LSM security contex...David P. Quigley2009-09-101-0/+18
* KEYS: Add a keyctl to install a process's session keyring on its parent [try #6]David Howells2009-09-021-0/+17
* lsm: Add hooks to the TUN driverPaul Moore2009-09-011-0/+18
* security: introducing security_request_moduleEric Paris2009-08-141-0/+5
* security: rename ptrace_may_access => ptrace_access_checkIngo Molnar2009-06-251-2/+2
* security: use mmap_min_addr indepedently of security modelsChristoph Lameter2009-06-041-3/+0
* CacheFiles: Export things for CacheFilesDavid Howells2009-04-031-0/+2
* lsm: Remove the socket_post_accept() hookPaul Moore2009-03-281-5/+0
* Merge branch 'next' into for-linusJames Morris2009-01-071-4/+22
|\
| * CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #3]David Howells2009-01-071-4/+22
| * Revert "CRED: Fix regression in cap_capable() as shown up by sys_faccessat() ...James Morris2009-01-071-21/+4
| * CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #2]David Howells2009-01-051-4/+21
* | introduce new LSM hooks where vfsmount is available.Kentaro Takeda2008-12-311-0/+66
|/
* security: pass mount flags to security_sb_kern_mount()James Morris2008-12-201-2/+2
* CRED: fix sparse warningsHannes Eder2008-11-251-3/+3
* CRED: Allow kernel services to override LSM settings for task actionsDavid Howells2008-11-141-0/+10
* CRED: Make execve() take advantage of copy-on-write credentialsDavid Howells2008-11-141-18/+8
* CRED: Inaugurate COW credentialsDavid Howells2008-11-141-31/+27
* CRED: Pass credentials through dentry_open()David Howells2008-11-141-2/+2
* CRED: Detach the credentials from task_structDavid Howells2008-11-141-4/+4
* CRED: Constify the kernel_cap_t arguments to the capset LSM hooksDavid Howells2008-11-141-6/+6
* CRED: Neuter sys_capset()David Howells2008-11-141-10/+8
* Add a new capable interface that will be used by systems that use audit toEric Paris2008-11-111-1/+6
* nfsd: fix vm overcommit crashAlan Cox2008-10-301-0/+9
* Merge branch 'master' into nextJames Morris2008-08-281-3/+7
|\
| * security: Fix setting of PF_SUPERPRIV by __capable()David Howells2008-08-141-3/+7
* | security: add/fix security kernel-docRandy Dunlap2008-08-201-4/+4
|/
* [patch 3/4] fat: dont call notify_changeMiklos Szeredi2008-07-261-0/+1
* [PATCH] pass MAY_OPEN to vfs_permission() explicitlyAl Viro2008-07-261-2/+2
* security: remove register_security hookJames Morris2008-07-141-29/+0
* security: remove dummy moduleMiklos Szeredi2008-07-141-10/+5
* security: remove unused sb_get_mnt_opts hookMiklos Szeredi2008-07-141-6/+0
* LSM/SELinux: show LSM mount options in /proc/mountsEric Paris2008-07-141-0/+5
* security: fix return of void-valued expressionsJames Morris2008-07-141-3/+3
* Security: split proc ptrace checking into read vs. attachStephen Smalley2008-07-141-2/+3
* Security: Make secctx_to_secid() take const secdataDavid Howells2008-04-291-1/+1
* keys: add keyctl function to get a security labelDavid Howells2008-04-291-0/+5
OpenPOWER on IntegriCloud