Commit History

Autor SHA1 Mensaxe Data
  Eric Paris a2551df7ec Security/SELinux: seperate lsm specific mmap_min_addr %!s(int64=16) %!d(string=hai) anos
  Eric Paris 7c73875e7d Capabilities: move cap_file_mmap to commoncap.c %!s(int64=16) %!d(string=hai) anos
  Ingo Molnar 9e48858f7d security: rename ptrace_may_access => ptrace_access_check %!s(int64=16) %!d(string=hai) anos
  James Morris d254117099 Merge branch 'master' into next %!s(int64=16) %!d(string=hai) anos
  Serge E. Hallyn 5bf37ec3e0 cap_prctl: don't set error to 0 at 'no_change' %!s(int64=16) %!d(string=hai) anos
  Serge E. Hallyn b5f22a59c0 don't raise all privs on setuid-root file with fE set (v2) %!s(int64=16) %!d(string=hai) anos
  James Morris ac8cc0fa53 Merge branch 'next' into for-linus %!s(int64=16) %!d(string=hai) anos
  David Howells 3699c53c48 CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #3] %!s(int64=16) %!d(string=hai) anos
  James Morris 29881c4502 Revert "CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #2]" %!s(int64=16) %!d(string=hai) anos
  Al Viro acfa4380ef inode->i_op is never NULL %!s(int64=16) %!d(string=hai) anos
  David Howells 14eaddc967 CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #2] %!s(int64=16) %!d(string=hai) anos
  Eric Paris e50a906e02 capabilities: define get_vfs_caps_from_disk when file caps are not enabled %!s(int64=16) %!d(string=hai) anos
  David Howells 1d045980e1 CRED: Prettify commoncap.c %!s(int64=16) %!d(string=hai) anos
  David Howells a6f76f23d2 CRED: Make execve() take advantage of copy-on-write credentials %!s(int64=16) %!d(string=hai) anos
  David Howells d84f4f992c CRED: Inaugurate COW credentials %!s(int64=16) %!d(string=hai) anos
  David Howells c69e8d9c01 CRED: Use RCU to access another task's creds and to release a task's own creds %!s(int64=16) %!d(string=hai) anos
  David Howells 86a264abe5 CRED: Wrap current->cred and a few other accessors %!s(int64=16) %!d(string=hai) anos
  David Howells b6dff3ec5e CRED: Separate task security context from task_struct %!s(int64=16) %!d(string=hai) anos
  David Howells 15a2460ed0 CRED: Constify the kernel_cap_t arguments to the capset LSM hooks %!s(int64=16) %!d(string=hai) anos
  David Howells 1cdcbec1a3 CRED: Neuter sys_capset() %!s(int64=16) %!d(string=hai) anos
  David Howells b103c59883 CRED: Wrap task credential accesses in the capabilities code %!s(int64=16) %!d(string=hai) anos
  Eric Paris 06112163f5 Add a new capable interface that will be used by systems that use audit to %!s(int64=16) %!d(string=hai) anos
  Eric Paris 3fc689e96c Any time fcaps or a setuid app under SECURE_NOROOT is used to result in a %!s(int64=16) %!d(string=hai) anos
  Eric Paris c0b004413a This patch add a generic cpu endian caps structure and externally available %!s(int64=16) %!d(string=hai) anos
  Serge E. Hallyn 1f29fae297 file capabilities: add no_file_caps switch (v4) %!s(int64=16) %!d(string=hai) anos
  Serge Hallyn 3318a386e4 file caps: always start with clear bprm->caps_* %!s(int64=16) %!d(string=hai) anos
  Serge E. Hallyn de45e806a8 file capabilities: uninline cap_safe_nice %!s(int64=16) %!d(string=hai) anos
  David Howells 5cd9c58fbe security: Fix setting of PF_SUPERPRIV by __capable() %!s(int64=17) %!d(string=hai) anos
  Andrew G. Morgan 5459c164f0 security: protect legacy applications from executing with insufficient privilege %!s(int64=17) %!d(string=hai) anos
  Stephen Smalley 006ebb40d3 Security: split proc ptrace checking into read vs. attach %!s(int64=17) %!d(string=hai) anos