aboutsummaryrefslogtreecommitdiffstats
path: root/include/linux/security.h (follow)
AgeCommit message (Expand)AuthorFilesLines
2008-08-17security.h: fix build failureAlexander Beregalov1-1/+1
2008-08-14security: Fix setting of PF_SUPERPRIV by __capable()David Howells1-14/+25
2008-07-26[PATCH] pass MAY_OPEN to vfs_permission() explicitlyAl Viro1-4/+3
2008-07-24security: remove unused forwardsHugh Dickins1-2/+0
2008-07-14security: remove register_security hookJames Morris1-10/+0
2008-07-14security: remove unused sb_get_mnt_opts hookMiklos Szeredi1-14/+0
2008-07-14LSM/SELinux: show LSM mount options in /proc/mountsEric Paris1-0/+9
2008-07-14Security: split proc ptrace checking into read vs. attachStephen Smalley1-5/+11
2008-04-29Security: Make secctx_to_secid() take const secdataDavid Howells1-3/+3
2008-04-29keys: add keyctl function to get a security labelDavid Howells1-1/+19
2008-04-29xattr: add missing consts to function argumentsDavid Howells1-20/+23
2008-04-28Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/selinux-2.6Linus Torvalds1-449/+449
2008-04-28capabilities: implement per-process securebitsAndrew G. Morgan1-7/+9
2008-04-28SELinux: include/security.h whitespace, syntax, and other cleanupsEric Paris1-449/+449
2008-04-21[PATCH] switch a bunch of LSM hooks from nameidata to pathAl Viro1-26/+26
2008-04-18Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/security-testing-2.6Linus Torvalds1-1/+113
2008-04-19Security: Introduce security= boot parameterAhmed S. Darwish1-0/+12
2008-04-19LSM/Audit: Introduce generic Audit LSM hooksAhmed S. Darwish1-0/+72
2008-04-19LSM: Introduce inode_getsecid and ipc_getsecid hooksAhmed S. Darwish1-1/+29
2008-04-12LSM: Make the Labeled IPsec hooks more stack friendlyPaul Moore1-24/+24
2008-03-20file capabilities: remove cap_task_kill()Serge Hallyn1-2/+1
2008-03-06LSM/SELinux: Interfaces to allow FS to control mount optionsEric Paris1-25/+74
2008-02-05capabilities: introduce per-process capability bounding setSerge E. Hallyn1-5/+0
2008-02-05VFS/Security: Rework inode_getsecurity and callers to return resulting bufferDavid P. Quigley1-12/+9
2008-01-25security/selinux: constify function pointer tables and fieldsJan Engelhardt1-1/+1
2008-01-25security: add a secctx_to_secid() hookDavid Howells1-0/+13
2008-01-25security: remove security_sb_post_mountroot hookH. Peter Anvin1-8/+0
2008-01-25Security: add get, set, and cloning of superblock security informationEric Paris1-0/+36
2007-10-20fix up security_socket_getpeersec_* documentationSerge Hallyn1-2/+15
2007-10-18V3 file capabilities: alter behavior of cap_setpcapAndrew Morgan1-0/+7
2007-10-17security/ cleanupsAdrian Bunk1-15/+0
2007-10-17Implement file posix capabilitiesSerge E. Hallyn1-4/+36
2007-10-17security: Convert LSM into a static interfaceJames Morris1-984/+206
2007-10-17SELinux: Improve read/write performanceYuichi Nakamura1-0/+18
2007-08-22fix NULL pointer dereference in __vm_enough_memory()Alan Cox1-5/+15
2007-07-11security: Protection for exploiting null dereference using mmapEric Paris1-5/+12
2007-05-09Fix occurrences of "the the "Michael Opdenacker1-1/+1
2007-03-14[PATCH] sanitize security_getprocattr() APIAl Viro1-4/+4
2007-02-12[PATCH] mark struct file_operations const 1Arjan van de Ven1-1/+1
2007-02-11[PATCH] Replace regular code with appropriate calls to container_of()Robert P. J. Day1-1/+1
2006-12-02SELinux: Fix SA selection semanticsVenkat Yekkirala1-19/+0
2006-12-02SELinux: Return correct context for SO_PEERSECVenkat Yekkirala1-1/+15
2006-12-02SELinux: Various xfrm labeling fixesVenkat Yekkirala1-11/+10
2006-10-11IPsec: correct semantics for SELinux policy matchingVenkat Yekkirala1-15/+9
2006-09-29[PATCH] fs.h: ifdef security fieldsAlexey Dobriyan1-0/+1
2006-09-22[NetLabel]: SELinux supportVenkat Yekkirala1-12/+13
2006-09-22[MLSXFRM]: Auto-labeling of child socketsVenkat Yekkirala1-0/+55
2006-09-22[MLSXFRM]: Default labeling of socket specific IPSec policiesVenkat Yekkirala1-3/+16
2006-09-22[MLSXFRM]: Add flow labelingVenkat Yekkirala1-13/+25
2006-09-22[MLSXFRM]: Flow based matching of xfrm policy and stateVenkat Yekkirala1-16/+90