summaryrefslogtreecommitdiffstats
path: root/security/capability.c
Commit message (Expand)AuthorAgeFilesLines
* split ->file_mmap() into ->mmap_addr()/->mmap_file()Al Viro2012-05-311-1/+2
* SELinux: rename dentry_open to file_openEric Paris2012-04-091-2/+2
* security: create task_free security callbackKees Cook2012-02-101-0/+5
* Merge branch 'for-linus' of git://selinuxproject.org/~jmorris/linux-securityLinus Torvalds2012-01-141-1/+0
|\
| * security: remove the security_netlink_recv hook as it is equivalent to capable()Eric Paris2012-01-051-1/+0
* | switch security_path_chmod() to struct path *Al Viro2012-01-061-2/+1
* | switch ->path_mknod() to umode_tAl Viro2012-01-031-1/+1
* | switch ->path_mkdir() to umode_tAl Viro2012-01-031-1/+1
* | switch security_path_chmod() to umode_tAl Viro2012-01-031-1/+1
* | switch ->mknod() to umode_tAl Viro2012-01-031-1/+1
* | switch ->create() to umode_tAl Viro2012-01-031-1/+1
* | switch vfs_mkdir() and ->mkdir() to umode_tAl Viro2012-01-031-1/+1
|/
* ->permission() sanitizing: don't pass flags to ->inode_permission()Al Viro2011-07-201-1/+1
* SECURITY: Move exec_permission RCU checks into security modulesAndi Kleen2011-04-221-1/+1
* Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next-2.6Linus Torvalds2011-03-161-1/+1
|\
| * xfrm: Mark flowi arg to security_xfrm_state_pol_flow_match() const.David S. Miller2011-02-221-1/+1
* | LSM: Pass -o remount options to the LSMEric Paris2011-03-031-0/+6
* | security: remove unused security_sysctl hookLucian Adrian Grijincu2011-02-011-6/+0
* | fs/vfs/security: pass last path component to LSM on inode creationEric Paris2011-02-011-1/+2
|/
* af_unix: Avoid socket->sk NULL OOPS in stream connect security hooks.David S. Miller2011-01-051-1/+1
* capabilities/syslog: open code cap_syslog logic to fix build failureEric Paris2010-11-151-0/+5
* secmark: make secmark object handling genericEric Paris2010-10-211-1/+16
* Merge branch 'writable_limits' of git://decibel.fi.muni.cz/~xslaby/linuxLinus Torvalds2010-08-101-1/+2
|\
| * rlimits: security, add task_struct to setrlimitJiri Slaby2010-07-161-1/+2
* | Security: capability: code style issueChihau Chau2010-08-021-1/+1
* | LSM: Remove unused arguments from security_path_truncate().Tetsuo Handa2010-08-021-2/+1
|/
* LSM: Add __init to fixup function.Tetsuo Handa2010-05-171-1/+1
* security: remove dead hook acctEric Paris2010-04-121-6/+0
* security: remove dead hook key_session_to_parentEric Paris2010-04-121-8/+0
* security: remove dead hook task_setgroupsEric Paris2010-04-121-6/+0
* security: remove dead hook task_setgidEric Paris2010-04-121-6/+0
* security: remove dead hook task_setuidEric Paris2010-04-121-6/+0
* security: remove dead hook cred_commitEric Paris2010-04-121-5/+0
* security: remove dead hook inode_deleteEric Paris2010-04-121-5/+0
* security: remove dead hook sb_post_pivotrootEric Paris2010-04-121-5/+0
* security: remove dead hook sb_post_addmountEric Paris2010-04-121-5/+0
* security: remove dead hook sb_post_remountEric Paris2010-04-121-6/+0
* security: remove dead hook sb_umount_busyEric Paris2010-04-121-5/+0
* security: remove dead hook sb_umount_closeEric Paris2010-04-121-5/+0
* security: remove sb_check_sb hooksEric Paris2010-04-121-6/+0
* Security: add static to security_ops and default_security_ops variablewzt.wzt@gmail.com2010-02-241-4/+0
* security: report the module name to security_module_requestEric Paris2009-11-101-1/+1
* LSM: Add security_path_chroot().Tetsuo Handa2009-10-121-0/+6
* LSM: Add security_path_chmod() and security_path_chown().Tetsuo Handa2009-10-121-0/+13
* LSM/SELinux: inode_{get,set,notify}secctx hooks to access LSM security contex...David P. Quigley2009-09-101-0/+17
* KEYS: Add a keyctl to install a process's session keyring on its parent [try #6]David Howells2009-09-021-0/+19
* lsm: Add hooks to the TUN driverPaul Moore2009-09-011-0/+19
* security: introducing security_request_moduleEric Paris2009-08-141-0/+6
* Capabilities: move cap_file_mmap to commoncap.cEric Paris2009-08-061-9/+0
* security: rename ptrace_may_access => ptrace_access_checkIngo Molnar2009-06-251-1/+1