aboutsummaryrefslogtreecommitdiffstats
path: root/security
Commit message (Expand)AuthorAge
* Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/vir...Linus Torvalds2009-01-05
|\
| * zero i_uid/i_gid on inode allocationAl Viro2009-01-05
| * inode->i_op is never NULLAl Viro2009-01-05
* | audit: validate comparison operations, store them in sane formAl Viro2009-01-04
|/
* Merge branch 'cpus4096-for-linus-3' of git://git.kernel.org/pub/scm/linux/ker...Linus Torvalds2009-01-03
|\
| * cpumask: prepare for iterators to only go to nr_cpu_ids/nr_cpumask_bits.: coreRusty Russell2008-12-31
* | introduce new LSM hooks where vfsmount is available.Kentaro Takeda2008-12-31
|/
* KEYS: Fix variable uninitialisation warningsDavid Howells2008-12-28
* Merge branch 'next' into for-linusJames Morris2008-12-28
|\
| * smackfs: check for allocation failures in smk_set_access()Sergio Luis2008-12-24
* | Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next-2.6Linus Torvalds2008-12-28
|\ \ | |/ |/|
| * Merge branch 'master' of master.kernel.org:/pub/scm/linux/kernel/git/davem/ne...David S. Miller2008-11-11
| |\
| | * KEYS: Make request key instantiate the per-user keyringsDavid Howells2008-11-10
| * | Merge branch 'master' of master.kernel.org:/pub/scm/linux/kernel/git/davem/ne...David S. Miller2008-11-07
| |\|
| * | misc: replace NIPQUAD()Harvey Harrison2008-10-31
| * | Merge branch 'master' of master.kernel.org:/pub/scm/linux/kernel/git/davem/ne...David S. Miller2008-10-31
| |\ \
| * | | net: replace %p6 with %pI6Harvey Harrison2008-10-29
| * | | misc: replace NIP6_FMT with %p6 format specifierHarvey Harrison2008-10-28
| * | | net: reduce structures when XFRM=nAlexey Dobriyan2008-10-28
* | | | SELinux: don't check permissions for kernel mountsJames Morris2008-12-19
* | | | security: pass mount flags to security_sb_kern_mount()James Morris2008-12-19
* | | | SELinux: correctly detect proc filesystems of the form "proc/foo"Stephen Smalley2008-12-19
* | | | CRED: fix sparse warningsHannes Eder2008-11-24
* | | | capabilities: define get_vfs_caps_from_disk when file caps are not enabledEric Paris2008-11-14
* | | | CRED: Allow kernel services to override LSM settings for task actionsDavid Howells2008-11-13
* | | | CRED: Add a kernel_service object class to SELinuxDavid Howells2008-11-13
* | | | CRED: Differentiate objective and effective subjective credentials on a taskDavid Howells2008-11-13
* | | | CRED: Prettify commoncap.cDavid Howells2008-11-13
* | | | CRED: Make execve() take advantage of copy-on-write credentialsDavid Howells2008-11-13
* | | | CRED: Inaugurate COW credentialsDavid Howells2008-11-13
* | | | CRED: Pass credentials through dentry_open()David Howells2008-11-13
* | | | CRED: Make inode_has_perm() and file_has_perm() take a cred pointerDavid Howells2008-11-13
* | | | CRED: Separate per-task-group keyrings from signal_structDavid Howells2008-11-13
* | | | CRED: Wrap access to SELinux's task SIDDavid Howells2008-11-13
* | | | CRED: Use RCU to access another task's creds and to release a task's own credsDavid Howells2008-11-13
* | | | CRED: Wrap current->cred and a few other accessorsDavid Howells2008-11-13
* | | | CRED: Detach the credentials from task_structDavid Howells2008-11-13
* | | | CRED: Separate task security context from task_structDavid Howells2008-11-13
* | | | CRED: Constify the kernel_cap_t arguments to the capset LSM hooksDavid Howells2008-11-13
* | | | CRED: Neuter sys_capset()David Howells2008-11-13
* | | | KEYS: Alter use of key instantiation link-to-keyring argumentDavid Howells2008-11-13
* | | | KEYS: Disperse linux/key_ui.hDavid Howells2008-11-13
* | | | CRED: Wrap task credential accesses in the capabilities codeDavid Howells2008-11-13
* | | | CRED: Wrap task credential accesses in the key management codeDavid Howells2008-11-13
* | | | Currently SELinux jumps through some ugly hoops to not audit a capbilityEric Paris2008-11-11
* | | | Add a new capable interface that will be used by systems that use audit toEric Paris2008-11-11
* | | | Any time fcaps or a setuid app under SECURE_NOROOT is used to result in aEric Paris2008-11-11
* | | | This patch add a generic cpu endian caps structure and externally availableEric Paris2008-11-11
* | | | SELinux: Use unknown perm handling to handle unknown netlink msg typesEric Paris2008-11-08
* | | | file capabilities: add no_file_caps switch (v4)Serge E. Hallyn2008-11-05