David Howells
|
3699c53c48
CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #3]
|
16 years ago |
James Morris
|
29881c4502
Revert "CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #2]"
|
16 years ago |
David Howells
|
14eaddc967
CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #2]
|
16 years ago |
Paul Moore
|
277d342fc4
selinux: Deprecate and schedule the removal of the the compat_net functionality
|
16 years ago |
Linus Torvalds
|
0191b625ca
Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next-2.6
|
16 years ago |
James Morris
|
7419224691
SELinux: don't check permissions for kernel mounts
|
16 years ago |
James Morris
|
12204e24b1
security: pass mount flags to security_sb_kern_mount()
|
16 years ago |
Stephen Smalley
|
459c19f524
SELinux: correctly detect proc filesystems of the form "proc/foo"
|
16 years ago |
David Howells
|
3a3b7ce933
CRED: Allow kernel services to override LSM settings for task actions
|
16 years ago |
David Howells
|
3b11a1dece
CRED: Differentiate objective and effective subjective credentials on a task
|
16 years ago |
David Howells
|
a6f76f23d2
CRED: Make execve() take advantage of copy-on-write credentials
|
16 years ago |
David Howells
|
d84f4f992c
CRED: Inaugurate COW credentials
|
16 years ago |
David Howells
|
745ca2475a
CRED: Pass credentials through dentry_open()
|
16 years ago |
David Howells
|
88e67f3b88
CRED: Make inode_has_perm() and file_has_perm() take a cred pointer
|
16 years ago |
David Howells
|
275bb41e9d
CRED: Wrap access to SELinux's task SID
|
16 years ago |
David Howells
|
f1752eec61
CRED: Detach the credentials from task_struct
|
16 years ago |
David Howells
|
b6dff3ec5e
CRED: Separate task security context from task_struct
|
16 years ago |
David Howells
|
15a2460ed0
CRED: Constify the kernel_cap_t arguments to the capset LSM hooks
|
16 years ago |
David Howells
|
1cdcbec1a3
CRED: Neuter sys_capset()
|
16 years ago |
Eric Paris
|
066746796b
Currently SELinux jumps through some ugly hoops to not audit a capbility
|
16 years ago |
Eric Paris
|
06112163f5
Add a new capable interface that will be used by systems that use audit to
|
16 years ago |
Eric Paris
|
39c9aede2b
SELinux: Use unknown perm handling to handle unknown netlink msg types
|
16 years ago |
David S. Miller
|
9eeda9abd1
Merge branch 'master' of master.kernel.org:/pub/scm/linux/kernel/git/davem/net-2.6
|
16 years ago |
James Morris
|
e21e696edb
Merge branch 'master' into next
|
16 years ago |
Eric Paris
|
41d9f9c524
SELinux: hold tasklist_lock and siglock while waking wait_chldexit
|
16 years ago |
Eric Paris
|
37dd0bd04a
SELinux: properly handle empty tty_files list
|
16 years ago |
Eric Paris
|
8b6a5a37f8
SELinux: check open perms in dentry_open not inode_permission
|
16 years ago |
Alexey Dobriyan
|
def8b4faff
net: reduce structures when XFRM=n
|
16 years ago |
Thomas Gleixner
|
c465a76af6
Merge branches 'timers/clocksource', 'timers/hrtimers', 'timers/nohz', 'timers/ntp', 'timers/posixtimers' and 'timers/debug' into v28-timers-for-linus
|
16 years ago |
Steven Whitehouse
|
a447c09324
vfs: Use const for kernel parser table
|
16 years ago |