summaryrefslogtreecommitdiffstats
path: root/security/capability.c
Commit message (Expand)AuthorAgeFilesLines
* ->permission() sanitizing: don't pass flags to ->inode_permission()Al Viro2011-07-201-1/+1
* SECURITY: Move exec_permission RCU checks into security modulesAndi Kleen2011-04-221-1/+1
* Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next-2.6Linus Torvalds2011-03-161-1/+1
|\
| * xfrm: Mark flowi arg to security_xfrm_state_pol_flow_match() const.David S. Miller2011-02-221-1/+1
* | LSM: Pass -o remount options to the LSMEric Paris2011-03-031-0/+6
* | security: remove unused security_sysctl hookLucian Adrian Grijincu2011-02-011-6/+0
* | fs/vfs/security: pass last path component to LSM on inode creationEric Paris2011-02-011-1/+2
|/
* af_unix: Avoid socket->sk NULL OOPS in stream connect security hooks.David S. Miller2011-01-051-1/+1
* capabilities/syslog: open code cap_syslog logic to fix build failureEric Paris2010-11-151-0/+5
* secmark: make secmark object handling genericEric Paris2010-10-211-1/+16
* Merge branch 'writable_limits' of git://decibel.fi.muni.cz/~xslaby/linuxLinus Torvalds2010-08-101-1/+2
|\
| * rlimits: security, add task_struct to setrlimitJiri Slaby2010-07-161-1/+2
* | Security: capability: code style issueChihau Chau2010-08-021-1/+1
* | LSM: Remove unused arguments from security_path_truncate().Tetsuo Handa2010-08-021-2/+1
|/
* LSM: Add __init to fixup function.Tetsuo Handa2010-05-171-1/+1
* security: remove dead hook acctEric Paris2010-04-121-6/+0
* security: remove dead hook key_session_to_parentEric Paris2010-04-121-8/+0
* security: remove dead hook task_setgroupsEric Paris2010-04-121-6/+0
* security: remove dead hook task_setgidEric Paris2010-04-121-6/+0
* security: remove dead hook task_setuidEric Paris2010-04-121-6/+0
* security: remove dead hook cred_commitEric Paris2010-04-121-5/+0
* security: remove dead hook inode_deleteEric Paris2010-04-121-5/+0
* security: remove dead hook sb_post_pivotrootEric Paris2010-04-121-5/+0
* security: remove dead hook sb_post_addmountEric Paris2010-04-121-5/+0
* security: remove dead hook sb_post_remountEric Paris2010-04-121-6/+0
* security: remove dead hook sb_umount_busyEric Paris2010-04-121-5/+0
* security: remove dead hook sb_umount_closeEric Paris2010-04-121-5/+0
* security: remove sb_check_sb hooksEric Paris2010-04-121-6/+0
* Security: add static to security_ops and default_security_ops variablewzt.wzt@gmail.com2010-02-241-4/+0
* security: report the module name to security_module_requestEric Paris2009-11-101-1/+1
* LSM: Add security_path_chroot().Tetsuo Handa2009-10-121-0/+6
* LSM: Add security_path_chmod() and security_path_chown().Tetsuo Handa2009-10-121-0/+13
* LSM/SELinux: inode_{get,set,notify}secctx hooks to access LSM security contex...David P. Quigley2009-09-101-0/+17
* KEYS: Add a keyctl to install a process's session keyring on its parent [try #6]David Howells2009-09-021-0/+19
* lsm: Add hooks to the TUN driverPaul Moore2009-09-011-0/+19
* security: introducing security_request_moduleEric Paris2009-08-141-0/+6
* Capabilities: move cap_file_mmap to commoncap.cEric Paris2009-08-061-9/+0
* security: rename ptrace_may_access => ptrace_access_checkIngo Molnar2009-06-251-1/+1
* lsm: Remove the socket_post_accept() hookPaul Moore2009-03-281-5/+0
* introduce new LSM hooks where vfsmount is available.Kentaro Takeda2008-12-311-0/+57
* security: pass mount flags to security_sb_kern_mount()James Morris2008-12-201-1/+1
* CRED: Allow kernel services to override LSM settings for task actionsDavid Howells2008-11-141-0/+12
* CRED: Make execve() take advantage of copy-on-write credentialsDavid Howells2008-11-141-13/+6
* CRED: Inaugurate COW credentialsDavid Howells2008-11-141-9/+12
* CRED: Pass credentials through dentry_open()David Howells2008-11-141-1/+1
* CRED: Detach the credentials from task_structDavid Howells2008-11-141-4/+4
* security: Fix setting of PF_SUPERPRIV by __capable()David Howells2008-08-141-1/+2
* [PATCH] pass MAY_OPEN to vfs_permission() explicitlyAl Viro2008-07-261-2/+1
* security: remove register_security hookJames Morris2008-07-141-7/+0
* security: remove dummy moduleMiklos Szeredi2008-07-141-64/+986