Eric Paris
|
0968d0060a
security: remove dead hook cred_commit
|
15 years ago |
Eric Paris
|
9d5ed77dad
security: remove dead hook inode_delete
|
15 years ago |
Eric Paris
|
91a9420f58
security: remove dead hook sb_post_pivotroot
|
15 years ago |
Eric Paris
|
3db2910177
security: remove dead hook sb_post_addmount
|
15 years ago |
Eric Paris
|
82dab10453
security: remove dead hook sb_post_remount
|
15 years ago |
Eric Paris
|
4b61d12c84
security: remove dead hook sb_umount_busy
|
15 years ago |
Eric Paris
|
231923bd0e
security: remove dead hook sb_umount_close
|
15 years ago |
Eric Paris
|
353633100d
security: remove sb_check_sb hooks
|
15 years ago |
wzt.wzt@gmail.com
|
189b3b1c89
Security: add static to security_ops and default_security_ops variable
|
15 years ago |
Eric Paris
|
dd8dbf2e68
security: report the module name to security_module_request
|
15 years ago |
Tetsuo Handa
|
8b8efb4403
LSM: Add security_path_chroot().
|
15 years ago |
Tetsuo Handa
|
89eda06837
LSM: Add security_path_chmod() and security_path_chown().
|
15 years ago |
David P. Quigley
|
1ee65e37e9
LSM/SELinux: inode_{get,set,notify}secctx hooks to access LSM security context information.
|
16 years ago |
David Howells
|
ee18d64c1f
KEYS: Add a keyctl to install a process's session keyring on its parent [try #6]
|
16 years ago |
Paul Moore
|
2b980dbd77
lsm: Add hooks to the TUN driver
|
16 years ago |
Eric Paris
|
9188499cdb
security: introducing security_request_module
|
16 years ago |
Eric Paris
|
7c73875e7d
Capabilities: move cap_file_mmap to commoncap.c
|
16 years ago |
Ingo Molnar
|
9e48858f7d
security: rename ptrace_may_access => ptrace_access_check
|
16 years ago |
Paul Moore
|
8651d5c0b1
lsm: Remove the socket_post_accept() hook
|
16 years ago |
Kentaro Takeda
|
be6d3e56a6
introduce new LSM hooks where vfsmount is available.
|
16 years ago |
James Morris
|
12204e24b1
security: pass mount flags to security_sb_kern_mount()
|
16 years ago |
David Howells
|
3a3b7ce933
CRED: Allow kernel services to override LSM settings for task actions
|
16 years ago |
David Howells
|
a6f76f23d2
CRED: Make execve() take advantage of copy-on-write credentials
|
16 years ago |
David Howells
|
d84f4f992c
CRED: Inaugurate COW credentials
|
16 years ago |
David Howells
|
745ca2475a
CRED: Pass credentials through dentry_open()
|
16 years ago |
David Howells
|
f1752eec61
CRED: Detach the credentials from task_struct
|
16 years ago |
David Howells
|
5cd9c58fbe
security: Fix setting of PF_SUPERPRIV by __capable()
|
17 years ago |
Al Viro
|
b77b0646ef
[PATCH] pass MAY_OPEN to vfs_permission() explicitly
|
17 years ago |
James Morris
|
6f0f0fd496
security: remove register_security hook
|
17 years ago |
Miklos Szeredi
|
5915eb5386
security: remove dummy module
|
17 years ago |