summaryrefslogtreecommitdiffstats
Commit message (Expand)AuthorAgeFilesLines
* Merge branch 'next' into for-linusJames Morris2008-12-25223-3322/+5678
|\
| * SELinux: don't check permissions for kernel mountsJames Morris2008-12-201-0/+4
| * security: pass mount flags to security_sb_kern_mount()James Morris2008-12-206-9/+10
| * SELinux: correctly detect proc filesystems of the form "proc/foo"Stephen Smalley2008-12-201-1/+1
| * Audit: Log TIOCSTIAl Viro2008-12-093-17/+66
| * user namespaces: document CFS behaviorSerge E. Hallyn2008-12-092-1/+28
| * user namespaces: require cap_set{ug}id for CLONE_NEWUSERSerge E. Hallyn2008-12-081-1/+2
| * user namespaces: let user_ns be cloned with fairschedSerge E. Hallyn2008-12-081-0/+4
| * Merge branch 'master' into nextJames Morris2008-12-04541-4545/+8260
| |\
| * \ Merge branch 'serge-next' into nextJames Morris2008-11-2613-129/+96
| |\ \
| | * | User namespaces: use the current_user_ns() macroSerge Hallyn2008-11-241-1/+1
| | * | User namespaces: set of cleanups (v2)Serge Hallyn2008-11-2413-129/+96
| * | | CRED: fix sparse warningsHannes Eder2008-11-251-3/+3
| |/ /
| * | nfsctl: add headers for credentialsRandy Dunlap2008-11-201-0/+2
| * | coda: fix creds referenceRandy Dunlap2008-11-201-0/+1
| * | Merge branch 'master' into nextJames Morris2008-11-18184-1528/+2405
| |\ \
| * | | capabilities: define get_vfs_caps_from_disk when file caps are not enabledEric Paris2008-11-151-0/+6
| * | | Merge branch 'master' into nextJames Morris2008-11-14538-5812/+20101
| |\ \ \
| * | | | CRED: Allow kernel services to override LSM settings for task actionsDavid Howells2008-11-147-0/+252
| * | | | CRED: Add a kernel_service object class to SELinuxDavid Howells2008-11-144-0/+10
| * | | | CRED: Differentiate objective and effective subjective credentials on a taskDavid Howells2008-11-147-54/+95
| * | | | CRED: DocumentationDavid Howells2008-11-143-2/+594
| * | | | CRED: Use creds in file structsDavid Howells2008-11-1411-27/+31
| * | | | CRED: Prettify commoncap.cDavid Howells2008-11-141-52/+248
| * | | | CRED: Make execve() take advantage of copy-on-write credentialsDavid Howells2008-11-1423-515/+429
| * | | | CRED: Inaugurate COW credentialsDavid Howells2008-11-1441-1239/+1603
| * | | | CRED: Pass credentials through dentry_open()David Howells2008-11-1419-40/+67
| * | | | CRED: Make inode_has_perm() and file_has_perm() take a cred pointerDavid Howells2008-11-141-48/+92
| * | | | CRED: Rename is_single_threaded() to is_wq_single_threaded()David Howells2008-11-142-4/+49
| * | | | CRED: Separate per-task-group keyrings from signal_structDavid Howells2008-11-147-99/+135
| * | | | CRED: Wrap access to SELinux's task SIDDavid Howells2008-11-141-194/+218
| * | | | CRED: Use RCU to access another task's creds and to release a task's own credsDavid Howells2008-11-1428-204/+355
| * | | | CRED: Wrap current->cred and a few other accessorsDavid Howells2008-11-1427-162/+271
| * | | | CRED: Detach the credentials from task_structDavid Howells2008-11-1411-83/+179
| * | | | CRED: Separate task security context from task_structDavid Howells2008-11-1463-677/+832
| * | | | CRED: Constify the kernel_cap_t arguments to the capset LSM hooksDavid Howells2008-11-144-34/+42
| * | | | CRED: Neuter sys_capset()David Howells2008-11-146-283/+61
| * | | | KEYS: Alter use of key instantiation link-to-keyring argumentDavid Howells2008-11-148-121/+199
| * | | | KEYS: Disperse linux/key_ui.hDavid Howells2008-11-145-67/+64
| * | | | CRED: Wrap task credential accesses in the core kernelDavid Howells2008-11-1415-52/+72
| * | | | CRED: Wrap task credential accesses in the capabilities codeDavid Howells2008-11-141-12/+18
| * | | | CRED: Wrap task credential accesses in the key management codeDavid Howells2008-11-144-8/+8
| * | | | CRED: Wrap task credential accesses in the networking subsystemDavid Howells2008-11-144-10/+14
| * | | | CRED: Wrap task credential accesses in the UNIX socket protocolDavid Howells2008-11-141-6/+5
| * | | | CRED: Wrap task credential accesses in the SunRPC protocolDavid Howells2008-11-141-2/+2
| * | | | CRED: Wrap task credential accesses in the ROSE protocolDavid Howells2008-11-141-2/+2
| * | | | CRED: Wrap task credential accesses in the netrom protocolDavid Howells2008-11-141-2/+2
| * | | | CRED: Wrap task credential accesses in the IPv6 protocolDavid Howells2008-11-141-1/+1
| * | | | CRED: Wrap task credential accesses in the AX25 protocolDavid Howells2008-11-142-2/+2
| * | | | CRED: Wrap task credential accesses in the SYSV IPC subsystemDavid Howells2008-11-143-10/+19
OpenPOWER on IntegriCloud