summaryrefslogtreecommitdiffstats
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/vir...Linus Torvalds2009-01-053-8/+3
|\
| * zero i_uid/i_gid on inode allocationAl Viro2009-01-052-5/+0
| * inode->i_op is never NULLAl Viro2009-01-051-3/+3
* | audit: validate comparison operations, store them in sane formAl Viro2009-01-042-16/+16
|/
* Merge branch 'cpus4096-for-linus-3' of git://git.kernel.org/pub/scm/linux/ker...Linus Torvalds2009-01-031-1/+1
|\
| * cpumask: prepare for iterators to only go to nr_cpu_ids/nr_cpumask_bits.: coreRusty Russell2009-01-011-1/+1
* | introduce new LSM hooks where vfsmount is available.Kentaro Takeda2008-12-313-0/+132
|/
* KEYS: Fix variable uninitialisation warningsDavid Howells2008-12-291-3/+3
* Merge branch 'next' into for-linusJames Morris2008-12-291-4/+16
|\
| * smackfs: check for allocation failures in smk_set_access()Sergio Luis2008-12-251-4/+16
* | Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next-2.6Linus Torvalds2008-12-282-4/+4
|\ \ | |/ |/|
| * Merge branch 'master' of master.kernel.org:/pub/scm/linux/kernel/git/davem/ne...David S. Miller2008-11-113-1/+6
| |\
| | * KEYS: Make request key instantiate the per-user keyringsDavid Howells2008-11-103-1/+6
| * | Merge branch 'master' of master.kernel.org:/pub/scm/linux/kernel/git/davem/ne...David S. Miller2008-11-062-6/+8
| |\ \ | | |/
| * | misc: replace NIPQUAD()Harvey Harrison2008-10-311-1/+1
| * | Merge branch 'master' of master.kernel.org:/pub/scm/linux/kernel/git/davem/ne...David S. Miller2008-10-311-0/+9
| |\ \
| * | | net: replace %p6 with %pI6Harvey Harrison2008-10-291-1/+1
| * | | misc: replace NIP6_FMT with %p6 format specifierHarvey Harrison2008-10-281-1/+1
| * | | net: reduce structures when XFRM=nAlexey Dobriyan2008-10-281-2/+2
* | | | SELinux: don't check permissions for kernel mountsJames Morris2008-12-201-0/+4
* | | | security: pass mount flags to security_sb_kern_mount()James Morris2008-12-204-5/+6
* | | | SELinux: correctly detect proc filesystems of the form "proc/foo"Stephen Smalley2008-12-201-1/+1
* | | | CRED: fix sparse warningsHannes Eder2008-11-251-3/+3
* | | | capabilities: define get_vfs_caps_from_disk when file caps are not enabledEric Paris2008-11-151-0/+6
* | | | CRED: Allow kernel services to override LSM settings for task actionsDavid Howells2008-11-144-0/+105
* | | | CRED: Add a kernel_service object class to SELinuxDavid Howells2008-11-144-0/+10
* | | | CRED: Differentiate objective and effective subjective credentials on a taskDavid Howells2008-11-141-24/+41
* | | | CRED: Prettify commoncap.cDavid Howells2008-11-141-52/+248
* | | | CRED: Make execve() take advantage of copy-on-write credentialsDavid Howells2008-11-148-335/+214
* | | | CRED: Inaugurate COW credentialsDavid Howells2008-11-1414-630/+668
* | | | CRED: Pass credentials through dentry_open()David Howells2008-11-143-9/+12
* | | | CRED: Make inode_has_perm() and file_has_perm() take a cred pointerDavid Howells2008-11-141-48/+92
* | | | CRED: Separate per-task-group keyrings from signal_structDavid Howells2008-11-142-80/+54
* | | | CRED: Wrap access to SELinux's task SIDDavid Howells2008-11-141-194/+218
* | | | CRED: Use RCU to access another task's creds and to release a task's own credsDavid Howells2008-11-145-57/+86
* | | | CRED: Wrap current->cred and a few other accessorsDavid Howells2008-11-148-29/+32
* | | | CRED: Detach the credentials from task_structDavid Howells2008-11-144-35/+33
* | | | CRED: Separate task security context from task_structDavid Howells2008-11-1413-258/+280
* | | | CRED: Constify the kernel_cap_t arguments to the capset LSM hooksDavid Howells2008-11-143-14/+18
* | | | CRED: Neuter sys_capset()David Howells2008-11-143-36/+21
* | | | KEYS: Alter use of key instantiation link-to-keyring argumentDavid Howells2008-11-145-111/+187
* | | | KEYS: Disperse linux/key_ui.hDavid Howells2008-11-143-1/+33
* | | | CRED: Wrap task credential accesses in the capabilities codeDavid Howells2008-11-141-12/+18
* | | | CRED: Wrap task credential accesses in the key management codeDavid Howells2008-11-144-8/+8
* | | | Currently SELinux jumps through some ugly hoops to not audit a capbilityEric Paris2008-11-111-17/+2
* | | | Add a new capable interface that will be used by systems that use audit toEric Paris2008-11-113-12/+23
* | | | Any time fcaps or a setuid app under SECURE_NOROOT is used to result in aEric Paris2008-11-111-1/+22
* | | | This patch add a generic cpu endian caps structure and externally availableEric Paris2008-11-111-58/+71
* | | | SELinux: Use unknown perm handling to handle unknown netlink msg typesEric Paris2008-11-091-1/+1
* | | | file capabilities: add no_file_caps switch (v4)Serge E. Hallyn2008-11-061-0/+3
OpenPOWER on IntegriCloud