index
:
kernel/linux.git
linux-2.6.11.y
linux-2.6.12.y
linux-2.6.13.y
linux-2.6.14.y
linux-2.6.15.y
linux-2.6.16.y
linux-2.6.17.y
linux-2.6.18.y
linux-2.6.19.y
linux-2.6.20.y
linux-2.6.21.y
linux-2.6.22.y
linux-2.6.23.y
linux-2.6.24.y
linux-2.6.25.y
linux-2.6.26.y
linux-2.6.27.y
linux-2.6.28.y
linux-2.6.29.y
linux-2.6.30.y
linux-2.6.31.y
linux-2.6.32.y
linux-2.6.33.y
linux-2.6.34.y
linux-2.6.35.y
linux-2.6.36.y
linux-2.6.37.y
linux-2.6.38.y
linux-2.6.39.y
linux-3.0.y
linux-3.1.y
linux-3.10.y
linux-3.11.y
linux-3.12.y
linux-3.13.y
linux-3.14.y
linux-3.15.y
linux-3.16.y
linux-3.17.y
linux-3.18.y
linux-3.19.y
linux-3.2.y
linux-3.3.y
linux-3.4.y
linux-3.5.y
linux-3.6.y
linux-3.7.y
linux-3.8.y
linux-3.9.y
linux-4.0.y
linux-4.1.y
linux-4.10.y
linux-4.11.y
linux-4.12.y
linux-4.13.y
linux-4.14.y
linux-4.15.y
linux-4.16.y
linux-4.17.y
linux-4.18.y
linux-4.19.y
linux-4.2.y
linux-4.20.y
linux-4.3.y
linux-4.4.y
linux-4.5.y
linux-4.6.y
linux-4.7.y
linux-4.8.y
linux-4.9.y
linux-5.0.y
linux-5.1.y
linux-5.10.y
linux-5.11.y
linux-5.12.y
linux-5.13.y
linux-5.14.y
linux-5.15.y
linux-5.16.y
linux-5.17.y
linux-5.18.y
linux-5.19.y
linux-5.2.y
linux-5.3.y
linux-5.4.y
linux-5.5.y
linux-5.6.y
linux-5.7.y
linux-5.8.y
linux-5.9.y
linux-6.0.y
linux-6.1.y
linux-6.10.y
linux-6.11.y
linux-6.12.y
linux-6.2.y
linux-6.3.y
linux-6.4.y
linux-6.5.y
linux-6.6.y
linux-6.7.y
linux-6.8.y
linux-6.9.y
linux-rockchip-6.1.y
linux-rockchip-6.5.y
linux-rolling-lts
linux-rolling-stable
master
Linux kernel stable tree (mirror)
Andrey V.Kosteltsev
summary
refs
log
tree
commit
diff
log msg
author
committer
range
path:
root
/
security
/
commoncap.c
Age
Commit message (
Expand
)
Author
Files
Lines
2012-04-19
security: fix compile error in commoncap.c
Jonghwan Choi
1
-0
/
+1
2012-04-18
fcaps: clear the same personality flags as suid when fcaps are used
Eric Paris
1
-0
/
+5
2012-02-14
security: trim security.h
Al Viro
1
-0
/
+1
2012-01-15
Merge branch 'for-linus' of git://selinuxproject.org/~jmorris/linux-security
Linus Torvalds
1
-17
/
+7
2012-01-06
security: remove the security_netlink_recv hook as it is equivalent to capable()
Eric Paris
1
-8
/
+0
2012-01-06
capabilities: remove the task from capable LSM hook entirely
Eric Paris
1
-9
/
+7
2011-08-16
capabilities: initialize has_cap
Serge Hallyn
1
-1
/
+1
2011-08-12
capabilities: do not grant full privs for setuid w/ file caps + no effective ...
Zhi Li
1
-6
/
+10
2011-04-04
capabilities: do not special case exec of init
Eric Paris
1
-9
/
+4
2011-03-24
userns: allow ptrace from non-init user namespaces
Serge E. Hallyn
1
-8
/
+32
2011-03-24
userns: security: make capabilities relative to the user namespace
Serge E. Hallyn
1
-7
/
+31
2011-03-17
Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next-2.6
Linus Torvalds
1
-2
/
+1
2011-03-04
netlink: kill eff_cap from struct netlink_skb_parms
Patrick McHardy
1
-2
/
+1
2011-02-02
time: Correct the *settime* parameters
Richard Cochran
1
-1
/
+1
2010-11-16
capabilities/syslog: open code cap_syslog logic to fix build failure
Eric Paris
1
-21
/
+0
2010-11-12
Restrict unprivileged access to kernel syslog
Dan Rosenberg
1
-0
/
+2
2010-10-21
security: remove unused parameter from security_task_setscheduler()
KOSAKI Motohiro
1
-4
/
+1
2010-08-18
Make do_execve() take a const filename pointer
David Howells
1
-1
/
+1
2010-04-23
security: whitespace coding style fixes
Justin P. Mattock
1
-2
/
+2
2010-04-20
Security: Fix the comment of cap_file_mmap()
wzt.wzt@gmail.com
1
-1
/
+1
2010-02-05
syslog: clean up needless comment
Kees Cook
1
-1
/
+0
2010-02-04
syslog: use defined constants instead of raw numbers
Kees Cook
1
-2
/
+3
2010-02-04
syslog: distinguish between /proc/kmsg and syscalls
Kees Cook
1
-1
/
+6
2009-11-24
remove CONFIG_SECURITY_FILE_CAPABILITIES compile option
Serge E. Hallyn
1
-70
/
+2
2009-10-20
security: remove root_plug
James Morris
1
-1
/
+1
2009-08-06
Security/SELinux: seperate lsm specific mmap_min_addr
Eric Paris
1
-1
/
+1
2009-08-06
Capabilities: move cap_file_mmap to commoncap.c
Eric Paris
1
-0
/
+30
2009-06-24
security: rename ptrace_may_access => ptrace_access_check
Ingo Molnar
1
-2
/
+2
2009-05-08
Merge branch 'master' into next
James Morris
1
-1
/
+0
2009-04-09
cap_prctl: don't set error to 0 at 'no_change'
Serge E. Hallyn
1
-1
/
+0
2009-04-03
don't raise all privs on setuid-root file with fE set (v2)
Serge E. Hallyn
1
-0
/
+32
2009-01-07
Merge branch 'next' into for-linus
James Morris
1
-15
/
+14
2009-01-07
CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #3]
David Howells
1
-15
/
+14
2009-01-07
Revert "CRED: Fix regression in cap_capable() as shown up by sys_faccessat() ...
James Morris
1
-29
/
+13
2009-01-05
inode->i_op is never NULL
Al Viro
1
-3
/
+3
2009-01-05
CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #2]
David Howells
1
-13
/
+29
2008-11-15
capabilities: define get_vfs_caps_from_disk when file caps are not enabled
Eric Paris
1
-0
/
+6
2008-11-14
CRED: Prettify commoncap.c
David Howells
1
-52
/
+248
2008-11-14
CRED: Make execve() take advantage of copy-on-write credentials
David Howells
1
-76
/
+76
2008-11-14
CRED: Inaugurate COW credentials
David Howells
1
-140
/
+125
2008-11-14
CRED: Use RCU to access another task's creds and to release a task's own creds
David Howells
1
-24
/
+40
2008-11-14
CRED: Wrap current->cred and a few other accessors
David Howells
1
-1
/
+1
2008-11-14
CRED: Separate task security context from task_struct
David Howells
1
-76
/
+85
2008-11-14
CRED: Constify the kernel_cap_t arguments to the capset LSM hooks
David Howells
1
-4
/
+6
2008-11-14
CRED: Neuter sys_capset()
David Howells
1
-21
/
+8
2008-11-14
CRED: Wrap task credential accesses in the capabilities code
David Howells
1
-12
/
+18
2008-11-11
Add a new capable interface that will be used by systems that use audit to
Eric Paris
1
-4
/
+4
2008-11-11
Any time fcaps or a setuid app under SECURE_NOROOT is used to result in a
Eric Paris
1
-1
/
+22
2008-11-11
This patch add a generic cpu endian caps structure and externally available
Eric Paris
1
-58
/
+71
2008-11-06
file capabilities: add no_file_caps switch (v4)
Serge E. Hallyn
1
-0
/
+3
[next]