summaryrefslogtreecommitdiffstats
path: root/security/commoncap.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* security: fix compile error in commoncap.cJonghwan Choi2012-04-191-0/+1
* fcaps: clear the same personality flags as suid when fcaps are usedEric Paris2012-04-181-0/+5
* security: trim security.hAl Viro2012-02-141-0/+1
* Merge branch 'for-linus' of git://selinuxproject.org/~jmorris/linux-securityLinus Torvalds2012-01-151-17/+7
|\
| * security: remove the security_netlink_recv hook as it is equivalent to capable()Eric Paris2012-01-061-8/+0
| * capabilities: remove the task from capable LSM hook entirelyEric Paris2012-01-061-9/+7
* | capabilities: initialize has_capSerge Hallyn2011-08-161-1/+1
* | capabilities: do not grant full privs for setuid w/ file caps + no effective ...Zhi Li2011-08-121-6/+10
|/
* capabilities: do not special case exec of initEric Paris2011-04-041-9/+4
* userns: allow ptrace from non-init user namespacesSerge E. Hallyn2011-03-241-8/+32
* userns: security: make capabilities relative to the user namespaceSerge E. Hallyn2011-03-241-7/+31
* Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next-2.6Linus Torvalds2011-03-171-2/+1
|\
| * netlink: kill eff_cap from struct netlink_skb_parmsPatrick McHardy2011-03-031-2/+1
* | time: Correct the *settime* parametersRichard Cochran2011-02-021-1/+1
|/
* capabilities/syslog: open code cap_syslog logic to fix build failureEric Paris2010-11-161-21/+0
* Restrict unprivileged access to kernel syslogDan Rosenberg2010-11-121-0/+2
* security: remove unused parameter from security_task_setscheduler()KOSAKI Motohiro2010-10-211-4/+1
* Make do_execve() take a const filename pointerDavid Howells2010-08-181-1/+1
* security: whitespace coding style fixesJustin P. Mattock2010-04-231-2/+2
* Security: Fix the comment of cap_file_mmap()wzt.wzt@gmail.com2010-04-201-1/+1
* syslog: clean up needless commentKees Cook2010-02-051-1/+0
* syslog: use defined constants instead of raw numbersKees Cook2010-02-041-2/+3
* syslog: distinguish between /proc/kmsg and syscallsKees Cook2010-02-041-1/+6
* remove CONFIG_SECURITY_FILE_CAPABILITIES compile optionSerge E. Hallyn2009-11-241-70/+2
* security: remove root_plugJames Morris2009-10-201-1/+1
* Security/SELinux: seperate lsm specific mmap_min_addrEric Paris2009-08-061-1/+1
* Capabilities: move cap_file_mmap to commoncap.cEric Paris2009-08-061-0/+30
* security: rename ptrace_may_access => ptrace_access_checkIngo Molnar2009-06-241-2/+2
* Merge branch 'master' into nextJames Morris2009-05-081-1/+0
|\
| * cap_prctl: don't set error to 0 at 'no_change'Serge E. Hallyn2009-04-091-1/+0
* | don't raise all privs on setuid-root file with fE set (v2)Serge E. Hallyn2009-04-031-0/+32
|/
* Merge branch 'next' into for-linusJames Morris2009-01-061-15/+14
|\
| * CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #3]David Howells2009-01-061-15/+14
| * Revert "CRED: Fix regression in cap_capable() as shown up by sys_faccessat() ...James Morris2009-01-061-29/+13
| * CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #2]David Howells2009-01-051-13/+29
* | inode->i_op is never NULLAl Viro2009-01-051-3/+3
|/
* capabilities: define get_vfs_caps_from_disk when file caps are not enabledEric Paris2008-11-141-0/+6
* CRED: Prettify commoncap.cDavid Howells2008-11-141-52/+248
* CRED: Make execve() take advantage of copy-on-write credentialsDavid Howells2008-11-141-76/+76
* CRED: Inaugurate COW credentialsDavid Howells2008-11-141-140/+125
* CRED: Use RCU to access another task's creds and to release a task's own credsDavid Howells2008-11-141-24/+40
* CRED: Wrap current->cred and a few other accessorsDavid Howells2008-11-141-1/+1
* CRED: Separate task security context from task_structDavid Howells2008-11-141-76/+85
* CRED: Constify the kernel_cap_t arguments to the capset LSM hooksDavid Howells2008-11-141-4/+6
* CRED: Neuter sys_capset()David Howells2008-11-141-21/+8
* CRED: Wrap task credential accesses in the capabilities codeDavid Howells2008-11-141-12/+18
* Add a new capable interface that will be used by systems that use audit toEric Paris2008-11-111-4/+4
* Any time fcaps or a setuid app under SECURE_NOROOT is used to result in aEric Paris2008-11-111-1/+22
* This patch add a generic cpu endian caps structure and externally availableEric Paris2008-11-111-58/+71
* file capabilities: add no_file_caps switch (v4)Serge E. Hallyn2008-11-061-0/+3