| Commit message (Expand) | Author | Age | Files | Lines |
* | userns: allow ptrace from non-init user namespaces | Serge E. Hallyn | 2011-03-23 | 1 | -8/+32 |
* | userns: security: make capabilities relative to the user namespace | Serge E. Hallyn | 2011-03-23 | 1 | -7/+31 |
* | Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next-2.6 | Linus Torvalds | 2011-03-16 | 1 | -2/+1 |
|\ |
|
| * | netlink: kill eff_cap from struct netlink_skb_parms | Patrick McHardy | 2011-03-03 | 1 | -2/+1 |
* | | time: Correct the *settime* parameters | Richard Cochran | 2011-02-02 | 1 | -1/+1 |
|/ |
|
* | capabilities/syslog: open code cap_syslog logic to fix build failure | Eric Paris | 2010-11-15 | 1 | -21/+0 |
* | Restrict unprivileged access to kernel syslog | Dan Rosenberg | 2010-11-12 | 1 | -0/+2 |
* | security: remove unused parameter from security_task_setscheduler() | KOSAKI Motohiro | 2010-10-21 | 1 | -4/+1 |
* | Make do_execve() take a const filename pointer | David Howells | 2010-08-17 | 1 | -1/+1 |
* | security: whitespace coding style fixes | Justin P. Mattock | 2010-04-23 | 1 | -2/+2 |
* | Security: Fix the comment of cap_file_mmap() | wzt.wzt@gmail.com | 2010-04-20 | 1 | -1/+1 |
* | syslog: clean up needless comment | Kees Cook | 2010-02-05 | 1 | -1/+0 |
* | syslog: use defined constants instead of raw numbers | Kees Cook | 2010-02-04 | 1 | -2/+3 |
* | syslog: distinguish between /proc/kmsg and syscalls | Kees Cook | 2010-02-04 | 1 | -1/+6 |
* | remove CONFIG_SECURITY_FILE_CAPABILITIES compile option | Serge E. Hallyn | 2009-11-24 | 1 | -70/+2 |
* | security: remove root_plug | James Morris | 2009-10-20 | 1 | -1/+1 |
* | Security/SELinux: seperate lsm specific mmap_min_addr | Eric Paris | 2009-08-06 | 1 | -1/+1 |
* | Capabilities: move cap_file_mmap to commoncap.c | Eric Paris | 2009-08-06 | 1 | -0/+30 |
* | security: rename ptrace_may_access => ptrace_access_check | Ingo Molnar | 2009-06-25 | 1 | -2/+2 |
* | Merge branch 'master' into next | James Morris | 2009-05-08 | 1 | -1/+0 |
|\ |
|
| * | cap_prctl: don't set error to 0 at 'no_change' | Serge E. Hallyn | 2009-04-09 | 1 | -1/+0 |
* | | don't raise all privs on setuid-root file with fE set (v2) | Serge E. Hallyn | 2009-04-03 | 1 | -0/+32 |
|/ |
|
* | Merge branch 'next' into for-linus | James Morris | 2009-01-07 | 1 | -15/+14 |
|\ |
|
| * | CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #3] | David Howells | 2009-01-07 | 1 | -15/+14 |
| * | Revert "CRED: Fix regression in cap_capable() as shown up by sys_faccessat() ... | James Morris | 2009-01-07 | 1 | -29/+13 |
| * | CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #2] | David Howells | 2009-01-05 | 1 | -13/+29 |
* | | inode->i_op is never NULL | Al Viro | 2009-01-05 | 1 | -3/+3 |
|/ |
|
* | capabilities: define get_vfs_caps_from_disk when file caps are not enabled | Eric Paris | 2008-11-15 | 1 | -0/+6 |
* | CRED: Prettify commoncap.c | David Howells | 2008-11-14 | 1 | -52/+248 |
* | CRED: Make execve() take advantage of copy-on-write credentials | David Howells | 2008-11-14 | 1 | -76/+76 |
* | CRED: Inaugurate COW credentials | David Howells | 2008-11-14 | 1 | -140/+125 |
* | CRED: Use RCU to access another task's creds and to release a task's own creds | David Howells | 2008-11-14 | 1 | -24/+40 |
* | CRED: Wrap current->cred and a few other accessors | David Howells | 2008-11-14 | 1 | -1/+1 |
* | CRED: Separate task security context from task_struct | David Howells | 2008-11-14 | 1 | -76/+85 |
* | CRED: Constify the kernel_cap_t arguments to the capset LSM hooks | David Howells | 2008-11-14 | 1 | -4/+6 |
* | CRED: Neuter sys_capset() | David Howells | 2008-11-14 | 1 | -21/+8 |
* | CRED: Wrap task credential accesses in the capabilities code | David Howells | 2008-11-14 | 1 | -12/+18 |
* | Add a new capable interface that will be used by systems that use audit to | Eric Paris | 2008-11-11 | 1 | -4/+4 |
* | Any time fcaps or a setuid app under SECURE_NOROOT is used to result in a | Eric Paris | 2008-11-11 | 1 | -1/+22 |
* | This patch add a generic cpu endian caps structure and externally available | Eric Paris | 2008-11-11 | 1 | -58/+71 |
* | file capabilities: add no_file_caps switch (v4) | Serge E. Hallyn | 2008-11-06 | 1 | -0/+3 |
* | file caps: always start with clear bprm->caps_* | Serge Hallyn | 2008-11-01 | 1 | -3/+3 |
* | file capabilities: uninline cap_safe_nice | Serge E. Hallyn | 2008-09-27 | 1 | -1/+1 |
* | security: Fix setting of PF_SUPERPRIV by __capable() | David Howells | 2008-08-14 | 1 | -7/+17 |
* | security: protect legacy applications from executing with insufficient privilege | Andrew G. Morgan | 2008-07-24 | 1 | -49/+59 |
* | Security: split proc ptrace checking into read vs. attach | Stephen Smalley | 2008-07-14 | 1 | -1/+2 |
* | security: filesystem capabilities: fix CAP_SETPCAP handling | Andrew G. Morgan | 2008-07-04 | 1 | -3/+10 |
* | xattr: add missing consts to function arguments | David Howells | 2008-04-29 | 1 | -3/+3 |
* | capabilities: implement per-process securebits | Andrew G. Morgan | 2008-04-28 | 1 | -9/+94 |
* | security: replace remaining __FUNCTION__ occurrences | Harvey Harrison | 2008-04-18 | 1 | -2/+2 |