index
:
kernel_samsung_smdk4412.git
ath9k
master
migrate_3.2
qmi
replicant-6.0
replicant-6.0-old
upstreaming
kernel for Galaxy S3
about
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
security
/
commoncap.c
Commit message (
Expand
)
Author
Age
Files
Lines
*
userns: allow ptrace from non-init user namespaces
Serge E. Hallyn
2011-03-23
1
-8
/
+32
*
userns: security: make capabilities relative to the user namespace
Serge E. Hallyn
2011-03-23
1
-7
/
+31
*
Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next-2.6
Linus Torvalds
2011-03-16
1
-2
/
+1
|
\
|
*
netlink: kill eff_cap from struct netlink_skb_parms
Patrick McHardy
2011-03-03
1
-2
/
+1
*
|
time: Correct the *settime* parameters
Richard Cochran
2011-02-02
1
-1
/
+1
|
/
*
capabilities/syslog: open code cap_syslog logic to fix build failure
Eric Paris
2010-11-15
1
-21
/
+0
*
Restrict unprivileged access to kernel syslog
Dan Rosenberg
2010-11-12
1
-0
/
+2
*
security: remove unused parameter from security_task_setscheduler()
KOSAKI Motohiro
2010-10-21
1
-4
/
+1
*
Make do_execve() take a const filename pointer
David Howells
2010-08-17
1
-1
/
+1
*
security: whitespace coding style fixes
Justin P. Mattock
2010-04-23
1
-2
/
+2
*
Security: Fix the comment of cap_file_mmap()
wzt.wzt@gmail.com
2010-04-20
1
-1
/
+1
*
syslog: clean up needless comment
Kees Cook
2010-02-05
1
-1
/
+0
*
syslog: use defined constants instead of raw numbers
Kees Cook
2010-02-04
1
-2
/
+3
*
syslog: distinguish between /proc/kmsg and syscalls
Kees Cook
2010-02-04
1
-1
/
+6
*
remove CONFIG_SECURITY_FILE_CAPABILITIES compile option
Serge E. Hallyn
2009-11-24
1
-70
/
+2
*
security: remove root_plug
James Morris
2009-10-20
1
-1
/
+1
*
Security/SELinux: seperate lsm specific mmap_min_addr
Eric Paris
2009-08-06
1
-1
/
+1
*
Capabilities: move cap_file_mmap to commoncap.c
Eric Paris
2009-08-06
1
-0
/
+30
*
security: rename ptrace_may_access => ptrace_access_check
Ingo Molnar
2009-06-25
1
-2
/
+2
*
Merge branch 'master' into next
James Morris
2009-05-08
1
-1
/
+0
|
\
|
*
cap_prctl: don't set error to 0 at 'no_change'
Serge E. Hallyn
2009-04-09
1
-1
/
+0
*
|
don't raise all privs on setuid-root file with fE set (v2)
Serge E. Hallyn
2009-04-03
1
-0
/
+32
|
/
*
Merge branch 'next' into for-linus
James Morris
2009-01-07
1
-15
/
+14
|
\
|
*
CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #3]
David Howells
2009-01-07
1
-15
/
+14
|
*
Revert "CRED: Fix regression in cap_capable() as shown up by sys_faccessat() ...
James Morris
2009-01-07
1
-29
/
+13
|
*
CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #2]
David Howells
2009-01-05
1
-13
/
+29
*
|
inode->i_op is never NULL
Al Viro
2009-01-05
1
-3
/
+3
|
/
*
capabilities: define get_vfs_caps_from_disk when file caps are not enabled
Eric Paris
2008-11-15
1
-0
/
+6
*
CRED: Prettify commoncap.c
David Howells
2008-11-14
1
-52
/
+248
*
CRED: Make execve() take advantage of copy-on-write credentials
David Howells
2008-11-14
1
-76
/
+76
*
CRED: Inaugurate COW credentials
David Howells
2008-11-14
1
-140
/
+125
*
CRED: Use RCU to access another task's creds and to release a task's own creds
David Howells
2008-11-14
1
-24
/
+40
*
CRED: Wrap current->cred and a few other accessors
David Howells
2008-11-14
1
-1
/
+1
*
CRED: Separate task security context from task_struct
David Howells
2008-11-14
1
-76
/
+85
*
CRED: Constify the kernel_cap_t arguments to the capset LSM hooks
David Howells
2008-11-14
1
-4
/
+6
*
CRED: Neuter sys_capset()
David Howells
2008-11-14
1
-21
/
+8
*
CRED: Wrap task credential accesses in the capabilities code
David Howells
2008-11-14
1
-12
/
+18
*
Add a new capable interface that will be used by systems that use audit to
Eric Paris
2008-11-11
1
-4
/
+4
*
Any time fcaps or a setuid app under SECURE_NOROOT is used to result in a
Eric Paris
2008-11-11
1
-1
/
+22
*
This patch add a generic cpu endian caps structure and externally available
Eric Paris
2008-11-11
1
-58
/
+71
*
file capabilities: add no_file_caps switch (v4)
Serge E. Hallyn
2008-11-06
1
-0
/
+3
*
file caps: always start with clear bprm->caps_*
Serge Hallyn
2008-11-01
1
-3
/
+3
*
file capabilities: uninline cap_safe_nice
Serge E. Hallyn
2008-09-27
1
-1
/
+1
*
security: Fix setting of PF_SUPERPRIV by __capable()
David Howells
2008-08-14
1
-7
/
+17
*
security: protect legacy applications from executing with insufficient privilege
Andrew G. Morgan
2008-07-24
1
-49
/
+59
*
Security: split proc ptrace checking into read vs. attach
Stephen Smalley
2008-07-14
1
-1
/
+2
*
security: filesystem capabilities: fix CAP_SETPCAP handling
Andrew G. Morgan
2008-07-04
1
-3
/
+10
*
xattr: add missing consts to function arguments
David Howells
2008-04-29
1
-3
/
+3
*
capabilities: implement per-process securebits
Andrew G. Morgan
2008-04-28
1
-9
/
+94
*
security: replace remaining __FUNCTION__ occurrences
Harvey Harrison
2008-04-18
1
-2
/
+2
[next]