1. f40a708 syslog: clean up needless comment by Kees Cook · 15 years ago
  2. d78ca3c syslog: use defined constants instead of raw numbers by Kees Cook · 15 years ago
  3. 0023459 syslog: distinguish between /proc/kmsg and syscalls by Kees Cook · 15 years ago
  4. b3a222e remove CONFIG_SECURITY_FILE_CAPABILITIES compile option by Serge E. Hallyn · 15 years ago
  5. 3e1c251 security: remove root_plug by James Morris · 15 years ago
  6. a2551df Security/SELinux: seperate lsm specific mmap_min_addr by Eric Paris · 15 years ago
  7. 7c73875 Capabilities: move cap_file_mmap to commoncap.c by Eric Paris · 15 years ago
  8. 9e48858 security: rename ptrace_may_access => ptrace_access_check by Ingo Molnar · 16 years ago
  9. d254117 Merge branch 'master' into next by James Morris · 16 years ago
  10. 5bf37ec cap_prctl: don't set error to 0 at 'no_change' by Serge E. Hallyn · 16 years ago
  11. b5f22a5 don't raise all privs on setuid-root file with fE set (v2) by Serge E. Hallyn · 16 years ago
  12. ac8cc0f Merge branch 'next' into for-linus by James Morris · 16 years ago
  13. 3699c53 CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #3] by David Howells · 16 years ago
  14. 29881c4 Revert "CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #2]" by James Morris · 16 years ago
  15. acfa438 inode->i_op is never NULL by Al Viro · 16 years ago
  16. 14eaddc CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #2] by David Howells · 16 years ago
  17. e50a906 capabilities: define get_vfs_caps_from_disk when file caps are not enabled by Eric Paris · 16 years ago
  18. 1d04598 CRED: Prettify commoncap.c by David Howells · 16 years ago
  19. a6f76f2 CRED: Make execve() take advantage of copy-on-write credentials by David Howells · 16 years ago
  20. d84f4f9 CRED: Inaugurate COW credentials by David Howells · 16 years ago
  21. c69e8d9 CRED: Use RCU to access another task's creds and to release a task's own creds by David Howells · 16 years ago
  22. 86a264a CRED: Wrap current->cred and a few other accessors by David Howells · 16 years ago
  23. b6dff3e CRED: Separate task security context from task_struct by David Howells · 16 years ago
  24. 15a2460 CRED: Constify the kernel_cap_t arguments to the capset LSM hooks by David Howells · 16 years ago
  25. 1cdcbec CRED: Neuter sys_capset() by David Howells · 16 years ago
  26. b103c59 CRED: Wrap task credential accesses in the capabilities code by David Howells · 16 years ago
  27. 0611216 Add a new capable interface that will be used by systems that use audit to by Eric Paris · 16 years ago
  28. 3fc689e Any time fcaps or a setuid app under SECURE_NOROOT is used to result in a by Eric Paris · 16 years ago
  29. c0b0044 This patch add a generic cpu endian caps structure and externally available by Eric Paris · 16 years ago
  30. 1f29fae file capabilities: add no_file_caps switch (v4) by Serge E. Hallyn · 16 years ago
  31. 3318a38 file caps: always start with clear bprm->caps_* by Serge Hallyn · 16 years ago
  32. de45e80 file capabilities: uninline cap_safe_nice by Serge E. Hallyn · 16 years ago
  33. 5cd9c58 security: Fix setting of PF_SUPERPRIV by __capable() by David Howells · 16 years ago
  34. 5459c16 security: protect legacy applications from executing with insufficient privilege by Andrew G. Morgan · 16 years ago
  35. 006ebb4 Security: split proc ptrace checking into read vs. attach by Stephen Smalley · 17 years ago
  36. 1209726 security: filesystem capabilities: fix CAP_SETPCAP handling by Andrew G. Morgan · 16 years ago
  37. 8f0cfa5 xattr: add missing consts to function arguments by David Howells · 17 years ago
  38. 3898b1b capabilities: implement per-process securebits by Andrew G. Morgan · 17 years ago
  39. dd6f953 security: replace remaining __FUNCTION__ occurrences by Harvey Harrison · 17 years ago
  40. aedb60a file capabilities: remove cap_task_kill() by Serge Hallyn · 17 years ago
  41. 0949728 file capabilities: simplify signal check by Serge E. Hallyn · 17 years ago
  42. 3b7391d capabilities: introduce per-process capability bounding set by Serge E. Hallyn · 17 years ago
  43. e338d26 Add 64-bit capability support to the kernel by Andrew Morgan · 17 years ago
  44. 8f6936f revert "capabilities: clean up file capability reading" by Andrew Morton · 17 years ago
  45. a6dbb1e Fix filesystem capability support by Andrew G. Morgan · 17 years ago
  46. 8ec2328 file capabilities: don't prevent signaling setuid root programs by Serge E. Hallyn · 17 years ago
  47. 91ad997 file capabilities: allow sigcont within session by Serge E. Hallyn · 17 years ago
  48. b68680e capabilities: clean up file capability reading by Serge E. Hallyn · 17 years ago
  49. b460cbc pid namespaces: define is_global_init() and is_container_init() by Serge E. Hallyn · 17 years ago
  50. 72c2d58 V3 file capabilities: alter behavior of cap_setpcap by Andrew Morgan · 17 years ago
  51. cbfee34 security/ cleanups by Adrian Bunk · 17 years ago
  52. b537677 Implement file posix capabilities by Serge E. Hallyn · 17 years ago
  53. 20510f2 security: Convert LSM into a static interface by James Morris · 17 years ago
  54. 34b4e4a fix NULL pointer dereference in __vm_enough_memory() by Alan Cox · 17 years ago
  55. 6c5d523 coredump masking: reimplementation of dumpable using two flags by Kawai, Hidehiro · 17 years ago
  56. e63340a header cleaning: don't include smp_lock.h when not used by Randy Dunlap · 18 years ago
  57. f400e19 [PATCH] pidspace: is_init() by Sukadev Bhattiprolu · 18 years ago
  58. 6ab3d56 Remove obsolete #include <linux/config.h> by Jörn Engel · 18 years ago
  59. c7bdb54 [NETLINK]: Encapsulate eff_cap usage within security framework. by Darrel Goeddel · 18 years ago
  60. d4eb82c [PATCH] make cap_ptrace enforce PTRACE_TRACME checks by Chris Wright · 19 years ago
  61. c59ede7 [PATCH] move capable() to capability.h by Randy.Dunlap · 19 years ago
  62. d6e7114 [PATCH] setuid core dump by Alan Cox · 19 years ago
  63. 1da177e Linux-2.6.12-rc2 by Linus Torvalds · 20 years ago