aboutsummaryrefslogtreecommitdiffstats
path: root/security/selinux/include (unfollow)
AgeCommit message (Expand)AuthorFilesLines
2009-08-17SELinux: Convert avc_audit to use lsm_audit.hThomas Liu10-283/+131
2009-08-14security: update documentation for security_request_moduleJames Morris1-0/+1
2009-08-14SELinux: add selinux_kernel_module_requestEric Paris3-0/+8
2009-08-14security: introducing security_request_moduleEric Paris4-0/+25
2009-08-14Networking: use CAP_NET_ADMIN when deciding to call request_moduleEric Paris3-7/+7
2009-08-10pty: fix data loss when stopped (^S/^Q)Linus Torvalds1-0/+2
2009-08-10x86: Fix serialization in pit_expect_msb()Linus Torvalds1-7/+22
2009-08-10MN10300: includecheck fix: mn10300, pci.hJaswinder Singh Rajput1-1/+0
2009-08-10mempool.c: clean up type-castingFigo.zhang1-2/+2
2009-08-10documentation: register ioctl entry of nilfs2Ryusuke Konishi1-0/+1
2009-08-10perf_counter: Zero dead bytes from ftrace raw samples size alignmentFrederic Weisbecker1-0/+4
2009-08-10perf_counter: Subtract the buffer size field from the event record sizeFrederic Weisbecker1-1/+7
2009-08-10mm_for_maps: take ->cred_guard_mutex to fix the race with execOleg Nesterov1-11/+11
2009-08-10mm_for_maps: shift down_read(mmap_sem) to the callerOleg Nesterov3-5/+5
2009-08-10mm_for_maps: simplify, use ptrace_may_access()Oleg Nesterov1-12/+11
2009-08-10perf_counter: Require CAP_SYS_ADMIN for raw tracepoint dataPeter Zijlstra1-0/+8
2009-08-10perf_counter: Correct PERF_SAMPLE_RAW outputPeter Zijlstra3-7/+28
2009-08-10powerpc/dma: pci_set_dma_mask() shouldn't fail if mask fits in RAMBenjamin Herrenschmidt1-3/+3
2009-08-10mm_for_maps: take ->cred_guard_mutex to fix the race with execOleg Nesterov1-11/+11
2009-08-10mm_for_maps: shift down_read(mmap_sem) to the callerOleg Nesterov3-5/+5
2009-08-10security: define round_hint_to_min in !CONFIG_SECURITYEric Paris1-15/+15
2009-08-09perf tools: callchain: Fix bad rounding of minimum rateFrederic Weisbecker1-2/+3
2009-08-09perf_counter tools: Fix libbfd detection for systems with libz dependencyMike Galbraith1-0/+4