path: root/include/linux/security.h
AgeCommit message (Expand)AuthorFilesLines
2009-12-17NOMMU: Optimise away the {dac_,}mmap_min_addr testsDavid Howells1-0/+7
2009-11-10security: report the module name to security_module_requestEric Paris1-3/+4
2009-10-12LSM: Add security_path_chroot().Tetsuo Handa1-0/+11
2009-10-12LSM: Add security_path_chmod() and security_path_chown().Tetsuo Handa1-0/+30
2009-09-24sysctl: remove "struct file *" argument of ->proc_handlerAlexey Dobriyan1-1/+1
2009-09-10LSM/SELinux: inode_{get,set,notify}secctx hooks to access LSM security contex...David P. Quigley1-0/+55
2009-09-07KEYS: Fix default security_session_to_parent()David Howells1-1/+4
2009-09-07KEYS: security_cred_alloc_blank() should return int under all circumstancesDavid Howells1-2/+4
2009-09-02KEYS: Add a keyctl to install a process's session keyring on its parent [try #6]David Howells1-0/+38
2009-09-01lsm: Add hooks to the TUN driverPaul Moore1-0/+31
2009-08-14security: update documentation for security_request_moduleJames Morris1-0/+1
2009-08-14security: introducing security_request_moduleEric Paris1-0/+10
2009-08-10security: define round_hint_to_min in !CONFIG_SECURITYEric Paris1-15/+15
2009-08-06Security/SELinux: seperate lsm specific mmap_min_addrEric Paris1-0/+17
2009-08-06Capabilities: move cap_file_mmap to commoncap.cEric Paris1-3/+4
2009-06-25security: rename ptrace_may_access => ptrace_access_checkIngo Molnar1-7/+7
2009-06-04security: use mmap_min_addr indepedently of security modelsChristoph Lameter1-0/+2
2009-04-03kmemtrace, fs, security: move alloc_secdata() and free_secdata() to linux/sec...Pekka Enberg1-0/+24
2009-03-28lsm: Remove the socket_post_accept() hookPaul Moore1-13/+0
2009-01-07Merge branch 'next' into for-linusJames Morris1-9/+32
2009-01-07CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #3]David Howells1-9/+32
2009-01-07Revert "CRED: Fix regression in cap_capable() as shown up by sys_faccessat() ...James Morris1-40/+9
2009-01-05CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #2]David Howells1-9/+40
2008-12-31introduce new LSM hooks where vfsmount is available.Kentaro Takeda1-0/+137
2008-12-20security: pass mount flags to security_sb_kern_mount()James Morris1-3/+3
2008-12-04Merge branch 'master' into nextJames Morris1-4/+8
2008-12-02nfsd: fix vm overcommit crash fix #2Junjiro R. Okajima1-4/+8
2008-11-14CRED: Allow kernel services to override LSM settings for task actionsDavid Howells1-0/+28
2008-11-14CRED: Make execve() take advantage of copy-on-write credentialsDavid Howells1-66/+37
2008-11-14CRED: Inaugurate COW credentialsDavid Howells1-96/+82
2008-11-14CRED: Pass credentials through dentry_open()David Howells1-3/+4
2008-11-14CRED: Detach the credentials from task_structDavid Howells1-13/+13
2008-11-14CRED: Constify the kernel_cap_t arguments to the capset LSM hooksDavid Howells1-20/+24
2008-11-14CRED: Neuter sys_capset()David Howells1-32/+16
2008-11-11Add a new capable interface that will be used by systems that use audit toEric Paris1-3/+13
2008-10-30nfsd: fix vm overcommit crashAlan Cox1-0/+6
2008-08-28securityfs: do not depend on CONFIG_SECURITYEric Paris1-24/+30
2008-08-17security.h: fix build failureAlexander Beregalov1-1/+1
2008-08-14security: Fix setting of PF_SUPERPRIV by __capable()David Howells1-14/+25
2008-07-26[PATCH] pass MAY_OPEN to vfs_permission() explicitlyAl Viro1-4/+3
2008-07-24security: remove unused forwardsHugh Dickins1-2/+0
2008-07-14security: remove register_security hookJames Morris1-10/+0
2008-07-14security: remove unused sb_get_mnt_opts hookMiklos Szeredi1-14/+0
2008-07-14LSM/SELinux: show LSM mount options in /proc/mountsEric Paris1-0/+9
2008-07-14Security: split proc ptrace checking into read vs. attachStephen Smalley1-5/+11
2008-04-29Security: Make secctx_to_secid() take const secdataDavid Howells1-3/+3
2008-04-29keys: add keyctl function to get a security labelDavid Howells1-1/+19
2008-04-29xattr: add missing consts to function argumentsDavid Howells1-20/+23
2008-04-28Merge branch 'for-linus' of git:// Torvalds1-449/+449
2008-04-28capabilities: implement per-process securebitsAndrew G. Morgan1-7/+9