summaryrefslogtreecommitdiffstats
path: root/security/selinux/hooks.c
Commit message (Expand)AuthorAgeFilesLines
* SELinux: drop secondary_ops->sysctlEric Paris2009-04-301-4/+0
* selinux: Remove the "compat_net" compatibility codePaul Moore2009-03-281-146/+7
* netlabel: Label incoming TCP connections correctly in SELinuxPaul Moore2009-03-281-39/+15
* SELinux: inode_doinit_with_dentry drop no dentry printkEric Paris2009-03-101-3/+9
* SELinux: open perm for sock filesEric Paris2009-03-061-0/+2
* SELinux: NULL terminate al contexts from diskEric Paris2009-02-141-2/+4
* SELinux: better printk when file with invalid label foundEric Paris2009-02-141-4/+13
* SELinux: call capabilities code directoryEric Paris2009-02-141-17/+13
* selinux: remove hooks which simply defer to capabilitiesJames Morris2009-02-021-58/+10
* selinux: remove secondary ops call to shm_shmatJames Morris2009-01-301-5/+0
* selinux: remove secondary ops call to unix_stream_connectJames Morris2009-01-301-4/+0
* selinux: remove secondary ops call to task_killJames Morris2009-01-301-4/+0
* selinux: remove secondary ops call to task_setrlimitJames Morris2009-01-301-5/+0
* selinux: remove unused cred_commit hookJames Morris2009-01-301-9/+0
* selinux: remove secondary ops call to task_createJames Morris2009-01-301-6/+0
* selinux: remove secondary ops call to file_mprotectJames Morris2009-01-301-6/+1
* selinux: remove secondary ops call to inode_setattrJames Morris2009-01-301-5/+0
* selinux: remove secondary ops call to inode_permissionJames Morris2009-01-301-5/+0
* selinux: remove secondary ops call to inode_follow_linkJames Morris2009-01-301-4/+0
* selinux: remove secondary ops call to inode_mknodJames Morris2009-01-301-6/+0
* selinux: remove secondary ops call to inode_unlinkJames Morris2009-01-301-5/+0
* selinux: remove secondary ops call to inode_linkJames Morris2009-01-301-5/+0
* selinux: remove secondary ops call to sb_umountJames Morris2009-01-301-5/+0
* selinux: remove secondary ops call to sb_mountJames Morris2009-01-301-5/+0
* selinux: remove secondary ops call to bprm_committed_credsJames Morris2009-01-301-2/+0
* selinux: remove secondary ops call to bprm_committing_credsJames Morris2009-01-301-2/+0
* selinux: remove unused bprm_check_security hookJames Morris2009-01-301-6/+0
* SELinux: Unify context mount and genfs behaviorDavid P. Quigley2009-01-191-4/+4
* SELinux: Add new security mount option to indicate security label support.David P. Quigley2009-01-191-5/+34
* SELinux: Condense super block security structure flags and cleanup necessary ...David P. Quigley2009-01-191-20/+18
* CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #3]David Howells2009-01-071-6/+10
* Revert "CRED: Fix regression in cap_capable() as shown up by sys_faccessat() ...James Morris2009-01-071-20/+6
* CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #2]David Howells2009-01-051-6/+20
* selinux: Deprecate and schedule the removal of the the compat_net functionalityPaul Moore2008-12-311-3/+3
* Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next-2.6Linus Torvalds2008-12-281-2/+2
|\
| * Merge branch 'master' of master.kernel.org:/pub/scm/linux/kernel/git/davem/ne...David S. Miller2008-11-061-3/+5
| |\
| * | net: reduce structures when XFRM=nAlexey Dobriyan2008-10-281-2/+2
* | | SELinux: don't check permissions for kernel mountsJames Morris2008-12-201-0/+4
* | | security: pass mount flags to security_sb_kern_mount()James Morris2008-12-201-1/+1
* | | SELinux: correctly detect proc filesystems of the form "proc/foo"Stephen Smalley2008-12-201-1/+1
* | | CRED: Allow kernel services to override LSM settings for task actionsDavid Howells2008-11-141-0/+46
* | | CRED: Differentiate objective and effective subjective credentials on a taskDavid Howells2008-11-141-24/+41
* | | CRED: Make execve() take advantage of copy-on-write credentialsDavid Howells2008-11-141-165/+118
* | | CRED: Inaugurate COW credentialsDavid Howells2008-11-141-146/+140
* | | CRED: Pass credentials through dentry_open()David Howells2008-11-141-6/+9
* | | CRED: Make inode_has_perm() and file_has_perm() take a cred pointerDavid Howells2008-11-141-48/+92
* | | CRED: Wrap access to SELinux's task SIDDavid Howells2008-11-141-194/+218
* | | CRED: Detach the credentials from task_structDavid Howells2008-11-141-17/+15
* | | CRED: Separate task security context from task_structDavid Howells2008-11-141-57/+59
* | | CRED: Constify the kernel_cap_t arguments to the capset LSM hooksDavid Howells2008-11-141-4/+6
OpenPOWER on IntegriCloud