summaryrefslogtreecommitdiffstats
path: root/security (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* | SELinux: shrink sizeof av_inhert selinux_class_perm and contextEric Paris2009-01-053-10/+12
* | CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #2]David Howells2009-01-056-23/+73
* | Merge branch 'master' of git://git.infradead.org/users/pcmoore/lblnet-2.6_nex...James Morris2009-01-047-230/+557
|\ \
| * | smack: Add support for unlabeled network hosts and networksCasey Schaufler2008-12-314-195/+538
| * | selinux: Deprecate and schedule the removal of the the compat_net functionalityPaul Moore2008-12-313-38/+11
| * | netlabel: Update kernel configuration APIPaul Moore2008-12-311-5/+16
| |/
* / keys: fix sparse warning by adding __user annotation to castJames Morris2009-01-011-1/+1
|/
* KEYS: Fix variable uninitialisation warningsDavid Howells2008-12-291-3/+3
* Merge branch 'next' into for-linusJames Morris2008-12-281-4/+16
|\
| * smackfs: check for allocation failures in smk_set_access()Sergio Luis2008-12-251-4/+16
* | Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next-2.6Linus Torvalds2008-12-282-4/+4
|\ \ | |/ |/|
| * Merge branch 'master' of master.kernel.org:/pub/scm/linux/kernel/git/davem/ne...David S. Miller2008-11-123-1/+6
| |\
| | * KEYS: Make request key instantiate the per-user keyringsDavid Howells2008-11-103-1/+6
| * | Merge branch 'master' of master.kernel.org:/pub/scm/linux/kernel/git/davem/ne...David S. Miller2008-11-072-6/+8
| |\|
| * | misc: replace NIPQUAD()Harvey Harrison2008-10-311-1/+1
| * | Merge branch 'master' of master.kernel.org:/pub/scm/linux/kernel/git/davem/ne...David S. Miller2008-10-311-0/+9
| |\ \
| * | | net: replace %p6 with %pI6Harvey Harrison2008-10-291-1/+1
| * | | misc: replace NIP6_FMT with %p6 format specifierHarvey Harrison2008-10-291-1/+1
| * | | net: reduce structures when XFRM=nAlexey Dobriyan2008-10-281-2/+2
* | | | SELinux: don't check permissions for kernel mountsJames Morris2008-12-191-0/+4
* | | | security: pass mount flags to security_sb_kern_mount()James Morris2008-12-194-5/+6
* | | | SELinux: correctly detect proc filesystems of the form "proc/foo"Stephen Smalley2008-12-191-1/+1
* | | | CRED: fix sparse warningsHannes Eder2008-11-251-3/+3
* | | | capabilities: define get_vfs_caps_from_disk when file caps are not enabledEric Paris2008-11-141-0/+6
* | | | CRED: Allow kernel services to override LSM settings for task actionsDavid Howells2008-11-144-0/+105
* | | | CRED: Add a kernel_service object class to SELinuxDavid Howells2008-11-144-0/+10
* | | | CRED: Differentiate objective and effective subjective credentials on a taskDavid Howells2008-11-141-24/+41
* | | | CRED: Prettify commoncap.cDavid Howells2008-11-141-52/+248
* | | | CRED: Make execve() take advantage of copy-on-write credentialsDavid Howells2008-11-148-335/+214
* | | | CRED: Inaugurate COW credentialsDavid Howells2008-11-1414-630/+668
* | | | CRED: Pass credentials through dentry_open()David Howells2008-11-143-9/+12
* | | | CRED: Make inode_has_perm() and file_has_perm() take a cred pointerDavid Howells2008-11-141-48/+92
* | | | CRED: Separate per-task-group keyrings from signal_structDavid Howells2008-11-142-80/+54
* | | | CRED: Wrap access to SELinux's task SIDDavid Howells2008-11-141-194/+218
* | | | CRED: Use RCU to access another task's creds and to release a task's own credsDavid Howells2008-11-145-57/+86
* | | | CRED: Wrap current->cred and a few other accessorsDavid Howells2008-11-148-29/+32
* | | | CRED: Detach the credentials from task_structDavid Howells2008-11-144-35/+33
* | | | CRED: Separate task security context from task_structDavid Howells2008-11-1413-258/+280
* | | | CRED: Constify the kernel_cap_t arguments to the capset LSM hooksDavid Howells2008-11-143-14/+18
* | | | CRED: Neuter sys_capset()David Howells2008-11-143-36/+21
* | | | KEYS: Alter use of key instantiation link-to-keyring argumentDavid Howells2008-11-145-111/+187
* | | | KEYS: Disperse linux/key_ui.hDavid Howells2008-11-143-1/+33
* | | | CRED: Wrap task credential accesses in the capabilities codeDavid Howells2008-11-141-12/+18
* | | | CRED: Wrap task credential accesses in the key management codeDavid Howells2008-11-144-8/+8
* | | | Currently SELinux jumps through some ugly hoops to not audit a capbilityEric Paris2008-11-111-17/+2
* | | | Add a new capable interface that will be used by systems that use audit toEric Paris2008-11-113-12/+23
* | | | Any time fcaps or a setuid app under SECURE_NOROOT is used to result in aEric Paris2008-11-111-1/+22
* | | | This patch add a generic cpu endian caps structure and externally availableEric Paris2008-11-111-58/+71
* | | | SELinux: Use unknown perm handling to handle unknown netlink msg typesEric Paris2008-11-091-1/+1
* | | | file capabilities: add no_file_caps switch (v4)Serge E. Hallyn2008-11-061-0/+3