Age | Commit message (Expand) | Author | Files | Lines |
2009-08-17 | Security/SELinux: seperate lsm specific mmap_min_addr | Eric Paris | 1 | -1/+1 |
2009-08-17 | Capabilities: move cap_file_mmap to commoncap.c | Eric Paris | 1 | -0/+30 |
2009-05-08 | Merge branch 'master' into next | James Morris | 1 | -1/+0 |
2009-04-09 | cap_prctl: don't set error to 0 at 'no_change' | Serge E. Hallyn | 1 | -1/+0 |
2009-04-03 | don't raise all privs on setuid-root file with fE set (v2) | Serge E. Hallyn | 1 | -0/+32 |
2009-01-07 | Merge branch 'next' into for-linus | James Morris | 1 | -15/+14 |
2009-01-07 | CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #3] | David Howells | 1 | -15/+14 |
2009-01-07 | Revert "CRED: Fix regression in cap_capable() as shown up by sys_faccessat() ... | James Morris | 1 | -29/+13 |
2009-01-05 | inode->i_op is never NULL | Al Viro | 1 | -3/+3 |
2009-01-05 | CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #2] | David Howells | 1 | -13/+29 |
2008-11-15 | capabilities: define get_vfs_caps_from_disk when file caps are not enabled | Eric Paris | 1 | -0/+6 |
2008-11-14 | CRED: Prettify commoncap.c | David Howells | 1 | -52/+248 |
2008-11-14 | CRED: Make execve() take advantage of copy-on-write credentials | David Howells | 1 | -76/+76 |
2008-11-14 | CRED: Inaugurate COW credentials | David Howells | 1 | -140/+125 |
2008-11-14 | CRED: Use RCU to access another task's creds and to release a task's own creds | David Howells | 1 | -24/+40 |
2008-11-14 | CRED: Wrap current->cred and a few other accessors | David Howells | 1 | -1/+1 |
2008-11-14 | CRED: Separate task security context from task_struct | David Howells | 1 | -76/+85 |
2008-11-14 | CRED: Constify the kernel_cap_t arguments to the capset LSM hooks | David Howells | 1 | -4/+6 |
2008-11-14 | CRED: Neuter sys_capset() | David Howells | 1 | -21/+8 |
2008-11-14 | CRED: Wrap task credential accesses in the capabilities code | David Howells | 1 | -12/+18 |
2008-11-11 | Add a new capable interface that will be used by systems that use audit to | Eric Paris | 1 | -4/+4 |
2008-11-11 | Any time fcaps or a setuid app under SECURE_NOROOT is used to result in a | Eric Paris | 1 | -1/+22 |
2008-11-11 | This patch add a generic cpu endian caps structure and externally available | Eric Paris | 1 | -58/+71 |
2008-11-06 | file capabilities: add no_file_caps switch (v4) | Serge E. Hallyn | 1 | -0/+3 |
2008-11-01 | file caps: always start with clear bprm->caps_* | Serge Hallyn | 1 | -3/+3 |
2008-09-27 | file capabilities: uninline cap_safe_nice | Serge E. Hallyn | 1 | -1/+1 |
2008-08-14 | security: Fix setting of PF_SUPERPRIV by __capable() | David Howells | 1 | -7/+17 |
2008-07-24 | security: protect legacy applications from executing with insufficient privilege | Andrew G. Morgan | 1 | -49/+59 |
2008-07-14 | Security: split proc ptrace checking into read vs. attach | Stephen Smalley | 1 | -1/+2 |
2008-07-04 | security: filesystem capabilities: fix CAP_SETPCAP handling | Andrew G. Morgan | 1 | -3/+10 |
2008-04-29 | xattr: add missing consts to function arguments | David Howells | 1 | -3/+3 |
2008-04-28 | capabilities: implement per-process securebits | Andrew G. Morgan | 1 | -9/+94 |
2008-04-18 | security: replace remaining __FUNCTION__ occurrences | Harvey Harrison | 1 | -2/+2 |
2008-03-20 | file capabilities: remove cap_task_kill() | Serge Hallyn | 1 | -40/+0 |
2008-02-24 | file capabilities: simplify signal check | Serge E. Hallyn | 1 | -1/+1 |
2008-02-05 | capabilities: introduce per-process capability bounding set | Serge E. Hallyn | 1 | -17/+27 |
2008-02-05 | Add 64-bit capability support to the kernel | Andrew Morgan | 1 | -30/+57 |
2008-02-05 | revert "capabilities: clean up file capability reading" | Andrew Morton | 1 | -15/+8 |
2008-01-22 | Fix filesystem capability support | Andrew G. Morgan | 1 | -3/+10 |
2007-11-29 | file capabilities: don't prevent signaling setuid root programs | Serge E. Hallyn | 1 | -0/+9 |
2007-11-15 | file capabilities: allow sigcont within session | Serge E. Hallyn | 1 | -0/+4 |
2007-10-22 | capabilities: clean up file capability reading | Serge E. Hallyn | 1 | -8/+15 |
2007-10-19 | pid namespaces: define is_global_init() and is_container_init() | Serge E. Hallyn | 1 | -1/+2 |
2007-10-19 | V3 file capabilities: alter behavior of cap_setpcap | Andrew Morgan | 1 | -5/+54 |
2007-10-17 | security/ cleanups | Adrian Bunk | 1 | -21/+0 |
2007-10-17 | Implement file posix capabilities | Serge E. Hallyn | 1 | -16/+228 |
2007-10-17 | security: Convert LSM into a static interface | James Morris | 1 | -3/+0 |
2007-08-23 | fix NULL pointer dereference in __vm_enough_memory() | Alan Cox | 1 | -2/+2 |
2007-07-19 | coredump masking: reimplementation of dumpable using two flags | Kawai, Hidehiro | 1 | -1/+1 |
2007-05-08 | header cleaning: don't include smp_lock.h when not used | Randy Dunlap | 1 | -1/+0 |