summaryrefslogtreecommitdiffstats
path: root/security/security.c
AgeCommit message (Expand)AuthorFilesLines
2010-02-07Take ima_file_free() to proper place.Al Viro1-2/+0
2009-11-10security: report the module name to security_module_requestEric Paris1-2/+2
2009-11-09Config option to set a default LSMJohn Johansen1-3/+6
2009-10-25LSM: imbed ima calls in the security hooksMimi Zohar1-3/+25
2009-10-12LSM: Add security_path_chroot().Tetsuo Handa1-0/+5
2009-10-12LSM: Add security_path_chmod() and security_path_chown().Tetsuo Handa1-0/+15
2009-09-10LSM/SELinux: inode_{get,set,notify}secctx hooks to access LSM security contex...David P. Quigley1-0/+18
2009-09-02KEYS: Add a keyctl to install a process's session keyring on its parent [try #6]David Howells1-0/+17
2009-09-01lsm: Add hooks to the TUN driverPaul Moore1-0/+18
2009-08-14security: introducing security_request_moduleEric Paris1-0/+5
2009-06-25security: rename ptrace_may_access => ptrace_access_checkIngo Molnar1-2/+2
2009-06-04security: use mmap_min_addr indepedently of security modelsChristoph Lameter1-3/+0
2009-04-03CacheFiles: Export things for CacheFilesDavid Howells1-0/+2
2009-03-28lsm: Remove the socket_post_accept() hookPaul Moore1-5/+0
2009-01-07Merge branch 'next' into for-linusJames Morris1-4/+22
2009-01-07CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #3]David Howells1-4/+22
2009-01-07Revert "CRED: Fix regression in cap_capable() as shown up by sys_faccessat() ...James Morris1-21/+4
2009-01-05CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #2]David Howells1-4/+21
2008-12-31introduce new LSM hooks where vfsmount is available.Kentaro Takeda1-0/+66
2008-12-20security: pass mount flags to security_sb_kern_mount()James Morris1-2/+2
2008-11-25CRED: fix sparse warningsHannes Eder1-3/+3
2008-11-14CRED: Allow kernel services to override LSM settings for task actionsDavid Howells1-0/+10
2008-11-14CRED: Make execve() take advantage of copy-on-write credentialsDavid Howells1-18/+8
2008-11-14CRED: Inaugurate COW credentialsDavid Howells1-31/+27
2008-11-14CRED: Pass credentials through dentry_open()David Howells1-2/+2
2008-11-14CRED: Detach the credentials from task_structDavid Howells1-4/+4
2008-11-14CRED: Constify the kernel_cap_t arguments to the capset LSM hooksDavid Howells1-6/+6
2008-11-14CRED: Neuter sys_capset()David Howells1-10/+8
2008-11-11Add a new capable interface that will be used by systems that use audit toEric Paris1-1/+6
2008-10-30nfsd: fix vm overcommit crashAlan Cox1-0/+9
2008-08-28Merge branch 'master' into nextJames Morris1-3/+7
2008-08-20security: add/fix security kernel-docRandy Dunlap1-4/+4
2008-08-14security: Fix setting of PF_SUPERPRIV by __capable()David Howells1-3/+7
2008-07-26[patch 3/4] fat: dont call notify_changeMiklos Szeredi1-0/+1
2008-07-26[PATCH] pass MAY_OPEN to vfs_permission() explicitlyAl Viro1-2/+2
2008-07-14security: remove register_security hookJames Morris1-29/+0
2008-07-14security: remove dummy moduleMiklos Szeredi1-10/+5
2008-07-14security: remove unused sb_get_mnt_opts hookMiklos Szeredi1-6/+0
2008-07-14LSM/SELinux: show LSM mount options in /proc/mountsEric Paris1-0/+5
2008-07-14security: fix return of void-valued expressionsJames Morris1-3/+3
2008-07-14Security: split proc ptrace checking into read vs. attachStephen Smalley1-2/+3
2008-04-29Security: Make secctx_to_secid() take const secdataDavid Howells1-1/+1
2008-04-29keys: add keyctl function to get a security labelDavid Howells1-0/+5
2008-04-29xattr: add missing consts to function argumentsDavid Howells1-6/+6
2008-04-28capabilities: implement per-process securebitsAndrew G. Morgan1-2/+2
2008-04-21[PATCH] switch a bunch of LSM hooks from nameidata to pathAl Viro1-10/+10
2008-04-18Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/jmo...Linus Torvalds1-1/+72
2008-04-18Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6.26Linus Torvalds1-10/+11
2008-04-19security: fix up documentation for security_module_enableJames Morris1-1/+1
2008-04-19Security: Introduce security= boot parameterAhmed S. Darwish1-1/+37