summaryrefslogtreecommitdiffstats
Commit message (Expand)AuthorAgeFilesLines
* CRED: Wrap task credential accesses in the SYSV filesystemDavid Howells2008-11-141-2/+2
* CRED: Wrap task credential accesses in the SMBFS filesystemDavid Howells2008-11-143-4/+4
* CRED: Wrap task credential accesses in the ReiserFS filesystemDavid Howells2008-11-141-2/+2
* CRED: Wrap task credential accesses in the RAMFS filesystemDavid Howells2008-11-141-2/+2
* CRED: Wrap task credential accesses in the OMFS filesystemDavid Howells2008-11-141-4/+4
* CRED: Wrap task credential accesses in the OCFS2 filesystemDavid Howells2008-11-142-6/+6
* CRED: Wrap task credential accesses in the NFS daemonDavid Howells2008-11-141-3/+3
* CRED: Wrap task credential accesses in the NCPFS filesystemDavid Howells2008-11-141-47/+44
* CRED: Wrap task credential accesses in the Minix filesystemDavid Howells2008-11-141-2/+2
* CRED: Wrap task credential accesses in the JFS filesystemDavid Howells2008-11-141-2/+2
* CRED: Wrap task credential accesses in the hugetlbfs filesystemDavid Howells2008-11-141-8/+8
* CRED: Wrap task credential accesses in the HPFS filesystemDavid Howells2008-11-142-14/+14
* CRED: Wrap task credential accesses in the HFSplus filesystemDavid Howells2008-11-142-4/+4
* CRED: Wrap task credential accesses in the HFS filesystemDavid Howells2008-11-142-4/+4
* CRED: Wrap task credential accesses in the GFS2 filesystemDavid Howells2008-11-141-5/+5
* CRED: Wrap task credential accesses in the FUSE filesystemDavid Howells2008-11-141-2/+2
* CRED: Wrap task credential accesses in the FAT filesystemDavid Howells2008-11-142-3/+3
* CRED: Wrap task credential accesses in the Ext4 filesystemDavid Howells2008-11-142-3/+3
* CRED: Wrap task credential accesses in the Ext3 filesystemDavid Howells2008-11-142-3/+3
* CRED: Wrap task credential accesses in the Ext2 filesystemDavid Howells2008-11-142-3/+3
* CRED: Wrap task credential accesses in the eCryptFS filesystemDavid Howells2008-11-142-16/+22
* CRED: Wrap task credential accesses in the devpts filesystemDavid Howells2008-11-141-2/+2
* CRED: Wrap task credential accesses in the Coda filesystemDavid Howells2008-11-142-4/+4
* CRED: Wrap task credential accesses in the CIFS filesystemDavid Howells2008-11-147-17/+17
* CRED: Wrap task credential accesses in the BFS filesystemDavid Howells2008-11-141-2/+2
* CRED: Wrap task credential accesses in the autofs4 filesystemDavid Howells2008-11-142-4/+4
* CRED: Wrap task credential accesses in the autofs filesystemDavid Howells2008-11-141-2/+2
* CRED: Wrap task credential accesses in the AFFS filesystemDavid Howells2008-11-142-4/+4
* CRED: Wrap task credential accesses in 9P2000 filesystemDavid Howells2008-11-144-6/+6
* CRED: Wrap task credential accesses in the USB driverDavid Howells2008-11-142-6/+6
* CRED: Wrap task credential accesses in the network device driversDavid Howells2008-11-141-2/+2
* CRED: Wrap task credential accesses in the ISDN driversDavid Howells2008-11-141-2/+2
* CRED: Wrap task credential accesses in the tty driverDavid Howells2008-11-141-2/+4
* CRED: Wrap task credential accesses in the block loopback driverDavid Howells2008-11-141-2/+4
* CRED: Wrap task credential accesses in the x86 archDavid Howells2008-11-141-1/+1
* CRED: Wrap task credential accesses in the S390 archDavid Howells2008-11-141-2/+2
* CRED: Wrap task credential accesses in the PowerPC archDavid Howells2008-11-142-3/+3
* CRED: Wrap task credential accesses in the PA-RISC archDavid Howells2008-11-141-1/+1
* CRED: Wrap task credential accesses in the MIPS archDavid Howells2008-11-141-2/+3
* CRED: Wrap task credential accesses in the IA64 archDavid Howells2008-11-143-13/+16
* security: remove broken and useless declarationsJames Morris2008-11-121-2/+0
* Currently SELinux jumps through some ugly hoops to not audit a capbilityEric Paris2008-11-111-17/+2
* The oomkiller calculations make decisions based on capabilities. SinceEric Paris2008-11-111-3/+3
* Add a new capable interface that will be used by systems that use audit toEric Paris2008-11-115-15/+39
* Capabilities: BUG when an invalid capability is requestedEric Paris2008-11-111-0/+5
* When the capset syscall is used it is not possible for audit to record theEric Paris2008-11-113-0/+63
* Any time fcaps or a setuid app under SECURE_NOROOT is used to result in aEric Paris2008-11-113-1/+116
* This patch will print cap_permitted and cap_inheritable data in the PATHEric Paris2008-11-112-5/+82
* This patch add a generic cpu endian caps structure and externally availableEric Paris2008-11-112-58/+78
* Document the order of arguments for cap_issubset. It's not instantly clearEric Paris2008-11-111-0/+7