summaryrefslogtreecommitdiffstats
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* cgroup files: convert devcgroup_access_write() into a cgroup write_string() h...Paul Menage2008-07-251-63/+38
* security: filesystem capabilities no longer experimentalAndrew G. Morgan2008-07-241-2/+1
* security: protect legacy applications from executing with insufficient privilegeAndrew G. Morgan2008-07-241-49/+59
* Revert "SELinux: allow fstype unknown to policy to use xattrs if present"James Morris2008-07-153-37/+14
* security: remove register_security hookJames Morris2008-07-145-95/+5
* security: remove dummy module fixMiklos Szeredi2008-07-141-1/+1
* security: remove dummy moduleMiklos Szeredi2008-07-145-1340/+996
* security: remove unused sb_get_mnt_opts hookMiklos Szeredi2008-07-143-15/+0
* LSM/SELinux: show LSM mount options in /proc/mountsEric Paris2008-07-143-1/+65
* SELinux: allow fstype unknown to policy to use xattrs if presentEric Paris2008-07-143-14/+37
* security: fix return of void-valued expressionsJames Morris2008-07-141-3/+3
* SELinux: use do_each_thread as a proper do/while blockJames Morris2008-07-141-2/+2
* SELinux: remove unused and shadowed addrlen variableJames Morris2008-07-141-3/+1
* SELinux: more user friendly unknown handling printkEric Paris2008-07-142-5/+7
* selinux: change handling of invalid classes (Was: Re: 2.6.26-rc5-mm1 selinux ...Stephen Smalley2008-07-141-3/+13
* SELinux: drop load_mutex in security_load_policyEric Paris2008-07-141-13/+1
* SELinux: fix off by 1 reference of class_to_string in context_struct_compute_avEric Paris2008-07-141-1/+1
* SELinux: open code sidtab lockJames Morris2008-07-141-11/+7
* SELinux: open code load_mutexJames Morris2008-07-141-12/+9
* SELinux: open code policy_rwlockJames Morris2008-07-141-56/+52
* selinux: fix endianness bug in network node address handlingStephen Smalley2008-07-141-7/+8
* selinux: simplify ioctl checkingStephen Smalley2008-07-141-40/+8
* SELinux: enable processes with mac_admin to get the raw inode contextsStephen Smalley2008-07-141-4/+23
* Security: split proc ptrace checking into read vs. attachStephen Smalley2008-07-145-8/+21
* SELinux: remove inherit field from inode_security_structJames Morris2008-07-141-1/+0
* SELinux: reorder inode_security_struct to increase objs/slab on 64bitRichard Kennedy2008-07-141-1/+1
* SELinux: keep the code clean formating and syntaxEric Paris2008-07-149-30/+35
* SELinux: fix sleeping allocation in security_context_to_sidStephen Smalley2008-07-141-30/+40
* selinux: support deferred mapping of contextsStephen Smalley2008-07-148-128/+248
* devcgroup: fix permission check when adding entry to child cgroupLi Zefan2008-07-131-1/+1
* devcgroup: always show positive major/minor numLi Zefan2008-07-131-2/+2
* devcgroup: fix odd behaviour when writing 'a' to devices.allowLi Zefan2008-07-041-0/+2
* security: filesystem capabilities: fix CAP_SETPCAP handlingAndrew G. Morgan2008-07-041-3/+10
* capabilities: add (back) dummy support for KEEPCAPSAndrew G. Morgan2008-06-121-1/+23
* keys: remove unused key_alloc_semDaniel Walker2008-06-061-1/+0
* devscgroup: make white list more compact in some casesPavel Emelyanov2008-06-061-2/+16
* devscgroup: relax task to dev_cgroup conversionPavel Emelyanov2008-06-061-6/+4
* devcgroup: make a helper to convert cgroup_subsys_state to devs_cgroupPavel Emelyanov2008-06-061-2/+6
* Smack: fuse mount hang fixCasey Schaufler2008-06-041-0/+12
* [PATCH] split linux/file.hAl Viro2008-05-011-0/+1
* signals: cleanup security_task_kill() usage/implementationOleg Nesterov2008-04-302-12/+0
* Smack: Integrate Smack with AuditAhmed S. Darwish2008-04-301-0/+155
* Security: Make secctx_to_secid() take const secdataDavid Howells2008-04-306-7/+7
* Merge branch 'audit.b50' of git://git.kernel.org/pub/scm/linux/kernel/git/vir...Linus Torvalds2008-04-292-1/+3
|\
| * Audit: standardize string audit interfacesEric Paris2008-04-281-1/+1
| * Audit: collect sessionid in netlink messagesEric Paris2008-04-281-0/+2
* | keys: explicitly include required slab.h header file.Robert P. J. Day2008-04-292-0/+2
* | keys: make the keyring quotas controllable through /proc/sysDavid Howells2008-04-296-15/+94
* | keys: don't generate user and user session keyrings unless they're accessedDavid Howells2008-04-295-126/+92
* | keys: allow clients to set key perms in key_create_or_update()Arun Raghavan2008-04-292-9/+12
OpenPOWER on IntegriCloud