summaryrefslogtreecommitdiffstats
path: root/include/linux/security.h
Commit message (Expand)AuthorAgeFilesLines
* kmemtrace, fs, security: move alloc_secdata() and free_secdata() to linux/sec...Pekka Enberg2009-04-031-0/+24
* lsm: Remove the socket_post_accept() hookPaul Moore2009-03-281-13/+0
* Merge branch 'next' into for-linusJames Morris2009-01-071-9/+32
|\
| * CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #3]David Howells2009-01-071-9/+32
| * Revert "CRED: Fix regression in cap_capable() as shown up by sys_faccessat() ...James Morris2009-01-071-40/+9
| * CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #2]David Howells2009-01-051-9/+40
* | introduce new LSM hooks where vfsmount is available.Kentaro Takeda2008-12-311-0/+137
|/
* security: pass mount flags to security_sb_kern_mount()James Morris2008-12-201-3/+3
* Merge branch 'master' into nextJames Morris2008-12-041-4/+8
|\
| * nfsd: fix vm overcommit crash fix #2Junjiro R. Okajima2008-12-021-4/+8
* | CRED: Allow kernel services to override LSM settings for task actionsDavid Howells2008-11-141-0/+28
* | CRED: Make execve() take advantage of copy-on-write credentialsDavid Howells2008-11-141-66/+37
* | CRED: Inaugurate COW credentialsDavid Howells2008-11-141-96/+82
* | CRED: Pass credentials through dentry_open()David Howells2008-11-141-3/+4
* | CRED: Detach the credentials from task_structDavid Howells2008-11-141-13/+13
* | CRED: Constify the kernel_cap_t arguments to the capset LSM hooksDavid Howells2008-11-141-20/+24
* | CRED: Neuter sys_capset()David Howells2008-11-141-32/+16
* | Add a new capable interface that will be used by systems that use audit toEric Paris2008-11-111-3/+13
|/
* nfsd: fix vm overcommit crashAlan Cox2008-10-301-0/+6
* securityfs: do not depend on CONFIG_SECURITYEric Paris2008-08-281-24/+30
* security.h: fix build failureAlexander Beregalov2008-08-171-1/+1
* security: Fix setting of PF_SUPERPRIV by __capable()David Howells2008-08-141-14/+25
* [PATCH] pass MAY_OPEN to vfs_permission() explicitlyAl Viro2008-07-261-4/+3
* security: remove unused forwardsHugh Dickins2008-07-241-2/+0
* security: remove register_security hookJames Morris2008-07-141-10/+0
* security: remove unused sb_get_mnt_opts hookMiklos Szeredi2008-07-141-14/+0
* LSM/SELinux: show LSM mount options in /proc/mountsEric Paris2008-07-141-0/+9
* Security: split proc ptrace checking into read vs. attachStephen Smalley2008-07-141-5/+11
* Security: Make secctx_to_secid() take const secdataDavid Howells2008-04-291-3/+3
* keys: add keyctl function to get a security labelDavid Howells2008-04-291-1/+19
* xattr: add missing consts to function argumentsDavid Howells2008-04-291-20/+23
* Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/jmo...Linus Torvalds2008-04-281-449/+449
|\
| * SELinux: include/security.h whitespace, syntax, and other cleanupsEric Paris2008-04-281-449/+449
* | capabilities: implement per-process securebitsAndrew G. Morgan2008-04-281-7/+9
|/
* [PATCH] switch a bunch of LSM hooks from nameidata to pathAl Viro2008-04-211-26/+26
* Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/jmo...Linus Torvalds2008-04-181-1/+113
|\
| * Security: Introduce security= boot parameterAhmed S. Darwish2008-04-191-0/+12
| * LSM/Audit: Introduce generic Audit LSM hooksAhmed S. Darwish2008-04-191-0/+72
| * LSM: Introduce inode_getsecid and ipc_getsecid hooksAhmed S. Darwish2008-04-191-1/+29
* | LSM: Make the Labeled IPsec hooks more stack friendlyPaul Moore2008-04-121-24/+24
|/
* file capabilities: remove cap_task_kill()Serge Hallyn2008-03-201-2/+1
* LSM/SELinux: Interfaces to allow FS to control mount optionsEric Paris2008-03-061-25/+74
* capabilities: introduce per-process capability bounding setSerge E. Hallyn2008-02-051-5/+0
* VFS/Security: Rework inode_getsecurity and callers to return resulting bufferDavid P. Quigley2008-02-051-12/+9
* security/selinux: constify function pointer tables and fieldsJan Engelhardt2008-01-251-1/+1
* security: add a secctx_to_secid() hookDavid Howells2008-01-251-0/+13
* security: remove security_sb_post_mountroot hookH. Peter Anvin2008-01-251-8/+0
* Security: add get, set, and cloning of superblock security informationEric Paris2008-01-251-0/+36
* fix up security_socket_getpeersec_* documentationSerge Hallyn2007-10-201-2/+15
* V3 file capabilities: alter behavior of cap_setpcapAndrew Morgan2007-10-181-0/+7