Historique des commits

Auteur SHA1 Message Date
  Serge E. Hallyn 5bf37ec3e0 cap_prctl: don't set error to 0 at 'no_change' il y a 16 ans
  James Morris ac8cc0fa53 Merge branch 'next' into for-linus il y a 16 ans
  David Howells 3699c53c48 CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #3] il y a 16 ans
  James Morris 29881c4502 Revert "CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #2]" il y a 16 ans
  Al Viro acfa4380ef inode->i_op is never NULL il y a 16 ans
  David Howells 14eaddc967 CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #2] il y a 16 ans
  Eric Paris e50a906e02 capabilities: define get_vfs_caps_from_disk when file caps are not enabled il y a 16 ans
  David Howells 1d045980e1 CRED: Prettify commoncap.c il y a 16 ans
  David Howells a6f76f23d2 CRED: Make execve() take advantage of copy-on-write credentials il y a 16 ans
  David Howells d84f4f992c CRED: Inaugurate COW credentials il y a 16 ans
  David Howells c69e8d9c01 CRED: Use RCU to access another task's creds and to release a task's own creds il y a 16 ans
  David Howells 86a264abe5 CRED: Wrap current->cred and a few other accessors il y a 16 ans
  David Howells b6dff3ec5e CRED: Separate task security context from task_struct il y a 16 ans
  David Howells 15a2460ed0 CRED: Constify the kernel_cap_t arguments to the capset LSM hooks il y a 16 ans
  David Howells 1cdcbec1a3 CRED: Neuter sys_capset() il y a 16 ans
  David Howells b103c59883 CRED: Wrap task credential accesses in the capabilities code il y a 16 ans
  Eric Paris 06112163f5 Add a new capable interface that will be used by systems that use audit to il y a 16 ans
  Eric Paris 3fc689e96c Any time fcaps or a setuid app under SECURE_NOROOT is used to result in a il y a 16 ans
  Eric Paris c0b004413a This patch add a generic cpu endian caps structure and externally available il y a 16 ans
  Serge E. Hallyn 1f29fae297 file capabilities: add no_file_caps switch (v4) il y a 16 ans
  Serge Hallyn 3318a386e4 file caps: always start with clear bprm->caps_* il y a 16 ans
  Serge E. Hallyn de45e806a8 file capabilities: uninline cap_safe_nice il y a 16 ans
  David Howells 5cd9c58fbe security: Fix setting of PF_SUPERPRIV by __capable() il y a 17 ans
  Andrew G. Morgan 5459c164f0 security: protect legacy applications from executing with insufficient privilege il y a 17 ans
  Stephen Smalley 006ebb40d3 Security: split proc ptrace checking into read vs. attach il y a 17 ans
  Andrew G. Morgan 1209726ce9 security: filesystem capabilities: fix CAP_SETPCAP handling il y a 17 ans
  David Howells 8f0cfa52a1 xattr: add missing consts to function arguments il y a 17 ans
  Andrew G. Morgan 3898b1b4eb capabilities: implement per-process securebits il y a 17 ans
  Harvey Harrison dd6f953adb security: replace remaining __FUNCTION__ occurrences il y a 17 ans
  Serge Hallyn aedb60a67c file capabilities: remove cap_task_kill() il y a 17 ans