summaryrefslogtreecommitdiffstats
path: root/kernel/capability.c
Commit message (Expand)AuthorAgeFilesLines
* capability: just use a 'u64' instead of a 'u32[2]' arrayLinus Torvalds2023-03-011-59/+45
* fs: port i_{g,u}id_into_vfs{g,u}id() to mnt_idmapChristian Brauner2023-01-191-4/+2
* fs: port privilege checking helpers to mnt_idmapChristian Brauner2023-01-191-3/+5
* caps: use type safe idmapping helpersChristian Brauner2022-10-261-2/+2
* xfs: don't generate selinux audit messages for capability testingDarrick J. Wong2022-03-091-0/+1
* capability: handle idmapped mountsChristian Brauner2021-01-241-5/+9
* LSM: Signal to SafeSetID when setting group IDsThomas Cedeno2020-10-131-1/+1
* treewide: Use fallthrough pseudo-keywordGustavo A. R. Silva2020-08-231-1/+1
* LSM: add SafeSetID module that gates setid callsMicah Morton2019-01-251-0/+19
* capabilities:: annotate implicit fall throughMathieu Malaterre2019-01-221-3/+1
* LSM: generalize flag passing to security_capableMicah Morton2019-01-101-9/+13
* License cleanup: add SPDX GPL-2.0 license identifier to files with no licenseGreg Kroah-Hartman2017-11-021-0/+1
* capability: export has_capabilityJike Song2017-01-121-0/+1
* Replace <asm/uaccess.h> with <linux/uaccess.h> globallyLinus Torvalds2016-12-241-1/+1
* exec: Ensure mm->user_ns contains the execed filesEric W. Biederman2016-11-221-2/+14
* ptrace: Capture the ptracer's creds not PT_PTRACE_CAPEric W. Biederman2016-11-221-0/+20
* kernel: Add noaudit variant of ns_capable()Tyler Hicks2016-06-061-10/+36
* kernel: conditionally support non-root users, groups and capabilitiesIulia Manda2015-04-151-16/+19
* CAPABILITIES: remove undefined caps from all processesEric Paris2014-07-241-0/+4
* fs,userns: Change inode_capable to capable_wrt_inode_uidgidAndy Lutomirski2014-06-101-12/+8
* kernel/capability.c: code clean-upFabian Frederick2014-06-041-3/+3
* Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/jmo...Linus Torvalds2014-04-031-19/+10
|\
| * capability: Use current logging stylesJoe Perches2014-02-241-19/+10
* | audit: Simplify and correct audit_log_capsetEric W. Biederman2014-01-131-1/+1
|/
* Merge tag 'xfs-for-linus-v3.12-rc1' of git://oss.sgi.com/xfs/xfsLinus Torvalds2013-09-091-0/+1
|\
| * xfs: ioctl check for capabilities in the current user namespaceDwight Engen2013-08-151-0/+1
* | userns: Kill nsown_capable it makes the wrong thing easyEric W. Biederman2013-08-301-12/+0
|/
* Add file_ns_capable() helper function for open-time capability checkingLinus Torvalds2013-04-141-0/+24
* userns: Teach inode_capable to understand inodes whose uids map to other name...Eric W. Biederman2012-05-151-2/+4
* userns: Replace the hard to write inode_userns with inode_capable.Eric W. Biederman2012-04-071-0/+19
* Revert "capabitlies: ns_capable can use the cap helpers rather than lsm call"Linus Torvalds2012-01-171-1/+1
* Merge branch 'for-linus' of git://selinuxproject.org/~jmorris/linux-securityLinus Torvalds2012-01-141-34/+46
|\
| * capabilities: remove task_ns_* functionsEric Paris2012-01-051-14/+0
| * capabitlies: ns_capable can use the cap helpers rather than lsm callEric Paris2012-01-051-1/+1
| * capabilities: style only - move capable below ns_capableEric Paris2012-01-051-16/+16
| * capabilites: introduce new has_ns_capabilities_noauditEric Paris2012-01-051-5/+25
| * capabilities: call has_ns_capability from has_capabilityEric Paris2012-01-051-16/+10
| * capabilities: remove all _real_ interfacesEric Paris2012-01-051-3/+15
| * capabilities: reverse arguments to security_capableEric Paris2012-01-051-1/+1
* | kernel: Map most files to use export.h instead of module.hPaul Gortmaker2011-10-311-1/+1
|/
* Merge branch 'master' into nextJames Morris2011-05-191-0/+12
|\
| * Cache user_ns in struct credSerge E. Hallyn2011-05-131-0/+12
* | capabilities: delete unused cap_set_fullEric Paris2011-04-041-2/+0
* | capabilities: do not drop CAP_SETPCAP from the initial taskEric Paris2011-04-041-2/+0
|/
* userns: make has_capability* into real functionsSerge E. Hallyn2011-03-231-0/+54
* userns: security: make capabilities relative to the user namespaceSerge E. Hallyn2011-03-231-5/+37
* security: add cred argument to security_capable()Chris Wright2011-02-111-1/+1
* sched: Remove remaining USER_SCHED codeLi Zefan2010-04-021-1/+0
* capabilities: Use RCU to protect task lookup in sys_capgetThomas Gleixner2009-12-101-2/+2
* remove CONFIG_SECURITY_FILE_CAPABILITIES compile optionSerge E. Hallyn2009-11-241-2/+0