summaryrefslogtreecommitdiffstats
path: root/security/security.c
Commit message (Expand)AuthorAgeFilesLines
* LSM: Add __init to fixup function.Tetsuo Handa2010-05-171-2/+2
* security: remove dead hook acctEric Paris2010-04-121-5/+0
* security: remove dead hook key_session_to_parentEric Paris2010-04-121-7/+0
* security: remove dead hook task_setgroupsEric Paris2010-04-121-5/+0
* security: remove dead hook task_setgidEric Paris2010-04-121-5/+0
* security: remove dead hook task_setuidEric Paris2010-04-121-5/+0
* security: remove dead hook cred_commitEric Paris2010-04-121-5/+0
* security: remove dead hook inode_deleteEric Paris2010-04-121-7/+0
* security: remove dead hook sb_post_pivotrootEric Paris2010-04-121-5/+0
* security: remove dead hook sb_post_addmountEric Paris2010-04-121-5/+0
* security: remove dead hook sb_post_remountEric Paris2010-04-121-5/+0
* security: remove dead hook sb_umount_busyEric Paris2010-04-121-5/+0
* security: remove dead hook sb_umount_closeEric Paris2010-04-121-5/+0
* security: remove sb_check_sb hooksEric Paris2010-04-121-5/+0
* Merge branch 'next-queue' into nextJames Morris2010-03-091-1/+1
|\
| * Security: Add __init to register_security to disable load a security module o...wzt.wzt@gmail.com2010-03-031-1/+1
* | Merge branch 'next' into for-linusJames Morris2010-03-011-21/+28
|\ \ | |/ |/|
| * Security: add static to security_ops and default_security_ops variablewzt.wzt@gmail.com2010-02-241-2/+9
| * syslog: distinguish between /proc/kmsg and syscallsKees Cook2010-02-041-2/+2
| * security: correct error returns for get/set security with private inodesJames Morris2010-01-151-2/+2
| * LSM: Rename security_path_ functions argument names.Tetsuo Handa2009-12-081-15/+15
* | Take ima_file_free() to proper place.Al Viro2010-02-071-2/+0
|/
* security: report the module name to security_module_requestEric Paris2009-11-101-2/+2
* Config option to set a default LSMJohn Johansen2009-11-091-3/+6
* LSM: imbed ima calls in the security hooksMimi Zohar2009-10-251-3/+25
* LSM: Add security_path_chroot().Tetsuo Handa2009-10-121-0/+5
* LSM: Add security_path_chmod() and security_path_chown().Tetsuo Handa2009-10-121-0/+15
* LSM/SELinux: inode_{get,set,notify}secctx hooks to access LSM security contex...David P. Quigley2009-09-101-0/+18
* KEYS: Add a keyctl to install a process's session keyring on its parent [try #6]David Howells2009-09-021-0/+17
* lsm: Add hooks to the TUN driverPaul Moore2009-09-011-0/+18
* security: introducing security_request_moduleEric Paris2009-08-141-0/+5
* security: rename ptrace_may_access => ptrace_access_checkIngo Molnar2009-06-251-2/+2
* security: use mmap_min_addr indepedently of security modelsChristoph Lameter2009-06-041-3/+0
* CacheFiles: Export things for CacheFilesDavid Howells2009-04-031-0/+2
* lsm: Remove the socket_post_accept() hookPaul Moore2009-03-281-5/+0
* Merge branch 'next' into for-linusJames Morris2009-01-071-4/+22
|\
| * CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #3]David Howells2009-01-071-4/+22
| * Revert "CRED: Fix regression in cap_capable() as shown up by sys_faccessat() ...James Morris2009-01-071-21/+4
| * CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #2]David Howells2009-01-051-4/+21
* | introduce new LSM hooks where vfsmount is available.Kentaro Takeda2008-12-311-0/+66
|/
* security: pass mount flags to security_sb_kern_mount()James Morris2008-12-201-2/+2
* CRED: fix sparse warningsHannes Eder2008-11-251-3/+3
* CRED: Allow kernel services to override LSM settings for task actionsDavid Howells2008-11-141-0/+10
* CRED: Make execve() take advantage of copy-on-write credentialsDavid Howells2008-11-141-18/+8
* CRED: Inaugurate COW credentialsDavid Howells2008-11-141-31/+27
* CRED: Pass credentials through dentry_open()David Howells2008-11-141-2/+2
* CRED: Detach the credentials from task_structDavid Howells2008-11-141-4/+4
* CRED: Constify the kernel_cap_t arguments to the capset LSM hooksDavid Howells2008-11-141-6/+6
* CRED: Neuter sys_capset()David Howells2008-11-141-10/+8
* Add a new capable interface that will be used by systems that use audit toEric Paris2008-11-111-1/+6
OpenPOWER on IntegriCloud