summaryrefslogtreecommitdiff
path: root/security/security.c
AgeCommit message (Expand)AuthorFilesLines
2014-11-18xattr: Constify ->name member of "struct xattr".Tetsuo Handa1-5/+3
2014-11-18Security: Add Hook to test if the particular xattr is part of a MAC model.David Quigley1-0/+6
2013-04-30Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/jmo...Linus Torvalds1-2/+2
2013-04-09selinux: add a skb_owned_by() hookEric Dumazet1-0/+5
2013-04-02selinux: make security_sb_clone_mnt_opts return an error on context mismatchJeff Layton1-2/+2
2013-01-14tun: fix LSM/SELinux labeling of tun/tap devicesPaul Moore1-5/+23
2012-12-14ima: support new kernel module syscallMimi Zohar1-1/+6
2012-12-14security: introduce kernel_module_from_file hookKees Cook1-0/+5
2012-10-11consitify do_mount() argumentsAl Viro1-2/+2
2012-10-02Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/...Linus Torvalds1-0/+27
2012-09-21userns: Teach security_path_chown to take kuids and kgidsEric W. Biederman1-1/+1
2012-09-07ima: add ima_inode_setxattr/removexattr function and callsMimi Zohar1-0/+6
2012-09-05security: allow Yama to be unconditionally stackedKees Cook1-0/+21
2012-07-03security: Fix nommu build.Paul Mundt1-0/+1
2012-07-02security: Fix nommu build.Paul Mundt1-0/+1
2012-06-01take calculation of final prot in security_mmap_file() into a helperAl Viro1-18/+28
2012-06-01take security_mmap_file() outside of ->mmap_semAl Viro1-3/+30
2012-05-31split ->file_mmap() into ->mmap_addr()/->mmap_file()Al Viro1-4/+8
2012-04-09SELinux: rename dentry_open to file_openEric Paris1-2/+2
2012-02-14security: trim security.hAl Viro1-0/+2
2012-02-14mm: collapse security_vm_enough_memory() variants into a single functionAl Viro1-14/+0
2012-02-10security: create task_free security callbackKees Cook1-0/+5
2012-01-14Merge branch 'for-linus' of git://selinuxproject.org/~jmorris/linux-securityLinus Torvalds1-30/+5
2012-01-06switch security_path_chmod() to struct path *Al Viro1-4/+3
2012-01-05security: remove the security_netlink_recv hook as it is equivalent to capable()Eric Paris1-6/+0
2012-01-05capabilities: remove all _real_ interfacesEric Paris1-24/+0
2012-01-05capabilities: introduce security_capable_noauditEric Paris1-0/+6
2012-01-05capabilities: reverse arguments to security_capableEric Paris1-1/+1
2012-01-05capabilities: remove the task from capable LSM hook entirelyEric Paris1-4/+3
2012-01-03switch ->path_mknod() to umode_tAl Viro1-1/+1
2012-01-03switch ->path_mkdir() to umode_tAl Viro1-1/+1
2012-01-03switch security_path_chmod() to umode_tAl Viro1-1/+1
2012-01-03switch ->mknod() to umode_tAl Viro1-1/+1
2012-01-03switch ->create() to umode_tAl Viro1-1/+1
2012-01-03switch vfs_mkdir() and ->mkdir() to umode_tAl Viro1-1/+1
2012-01-03security: Fix security_old_inode_init_security() when CONFIG_SECURITY is not setJan Kara1-1/+1
2011-10-25Merge branch 'next' of git://selinuxproject.org/~jmorris/linux-securityLinus Torvalds1-11/+65
2011-10-18bluetooth: Properly clone LSM attributes to newly created child connectionsPaul Moore1-0/+1
2011-09-14evm: fix security/security_old_init_security return codeMimi Zohar1-2/+2
2011-09-09security: sparse fix: Move security_fixup_op to security.hJames Morris1-3/+0
2011-08-09Merge branch 'next-evm' of git://git.kernel.org/pub/scm/linux/kernel/git/zoha...James Morris1-7/+64
2011-07-20->permission() sanitizing: don't pass flags to exec_permission()Al Viro1-10/+0
2011-07-20->permission() sanitizing: don't pass flags to ->inode_permission()Al Viro1-2/+5
2011-07-18evm: add evm_inode_setattr to prevent updating an invalid security.evmMimi Zohar1-1/+6
2011-07-18evm: call evm_inode_init_security from security_inode_init_securityMimi Zohar1-6/+12
2011-07-18security: imbed evm calls in security hooksMimi Zohar1-2/+14
2011-07-18integrity: move ima inode integrity data managementMimi Zohar1-1/+2
2011-07-18security: new security_inode_init_security API adds function callbackMimi Zohar1-3/+36
2011-04-22SECURITY: Move exec_permission RCU checks into security modulesAndi Kleen1-4/+2
2011-03-23userns: security: make capabilities relative to the user namespaceSerge E. Hallyn1-6/+10