summaryrefslogtreecommitdiffstats
path: root/include/linux/capability.h
Commit message (Expand)AuthorAgeFilesLines
* kernel: conditionally support non-root users, groups and capabilitiesIulia Manda2015-04-151-0/+29
* CAPABILITIES: remove undefined caps from all processesEric Paris2014-07-241-1/+4
* fs,userns: Change inode_capable to capable_wrt_inode_uidgidAndy Lutomirski2014-06-101-1/+1
* userns: Kill nsown_capable it makes the wrong thing easyEric W. Biederman2013-08-301-1/+0
* Add file_ns_capable() helper function for open-time capability checkingLinus Torvalds2013-04-141-0/+2
* UAPI: (Scripted) Disintegrate include/linuxDavid Howells2012-10-131-345/+1
* PM: Rename CAP_EPOLLWAKEUP to CAP_BLOCK_SUSPENDMichael Kerrisk2012-07-171-3/+3
* Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/ebi...Linus Torvalds2012-05-231-0/+2
|\
| * userns: Replace the hard to write inode_userns with inode_capable.Eric W. Biederman2012-04-071-0/+2
* | epoll: Add a flag, EPOLLWAKEUP, to prevent suspend while epoll events are readyArve Hjønnevåg2012-05-051-1/+4
|/
* Merge branch 'for-linus' of git://selinuxproject.org/~jmorris/linux-securityLinus Torvalds2012-01-141-2/+2
|\
| * capabilities: remove __cap_full_set definitionEric Paris2012-01-051-1/+0
| * capabilities: remove task_ns_* functionsEric Paris2012-01-051-1/+0
| * capabilites: introduce new has_ns_capabilities_noauditEric Paris2012-01-051-0/+2
* | net: allow CAP_NET_RAW to set socket options IP{,V6}_TRANSPARENTMaciej Żenczykowski2011-10-201-1/+2
|/
* Merge branch 'next' into for-linusJames Morris2011-05-241-5/+0
|\
| * Merge branch 'master' into nextJames Morris2011-05-191-14/+1
| |\
| * | capabilities: delete all CAP_INIT macrosEric Paris2011-04-041-3/+0
| * | capabilities: delete unused cap_set_fullEric Paris2011-04-041-2/+0
| * | capabilities: do not drop CAP_SETPCAP from the initial taskEric Paris2011-04-041-2/+4
* | | Merge branch 'timers-core-for-linus' of git://git.kernel.org/pub/scm/linux/ke...Linus Torvalds2011-05-191-1/+6
|\ \ \ | |_|/ |/| |
| * | timers: Posix interface for alarm-timersJohn Stultz2011-04-261-1/+6
| |/
* / Cache user_ns in struct credSerge E. Hallyn2011-05-131-12/+1
|/
* userns: make has_capability* into real functionsSerge E. Hallyn2011-03-231-30/+4
* userns: allow ptrace from non-init user namespacesSerge E. Hallyn2011-03-231-0/+2
* userns: security: make capabilities relative to the user namespaceSerge E. Hallyn2011-03-231-8/+28
* security: Define CAP_SYSLOGSerge E. Hallyn2010-11-291-2/+5
* security: move LSM xattrnames to xattr.hMimi Zohar2010-08-021-3/+0
* remove CONFIG_SECURITY_FILE_CAPABILITIES compile optionSerge E. Hallyn2009-11-241-2/+0
* trivial: change address of the libcap source.GeunSik Lim2009-09-211-1/+1
* add some long-missing capabilities to fs_maskSerge E. Hallyn2009-04-131-4/+19
* nfsd: nfsd should drop CAP_MKNOD for non-rootJ. Bruce Fields2009-03-171-2/+4
* headers_check fix: linux/capability.hJaswinder Singh Rajput2009-01-301-4/+4
* CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #3]David Howells2009-01-071-2/+15
* Revert "CRED: Fix regression in cap_capable() as shown up by sys_faccessat() ...James Morris2009-01-071-15/+2
* CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #2]David Howells2009-01-051-2/+15
* CRED: Inaugurate COW credentialsDavid Howells2008-11-141-2/+0
* security: remove broken and useless declarationsJames Morris2008-11-121-2/+0
* Add a new capable interface that will be used by systems that use audit toEric Paris2008-11-111-0/+3
* This patch will print cap_permitted and cap_inheritable data in the PATHEric Paris2008-11-111-0/+5
* This patch add a generic cpu endian caps structure and externally availableEric Paris2008-11-111-0/+7
* Document the order of arguments for cap_issubset. It's not instantly clearEric Paris2008-11-111-0/+7
* file capabilities: add no_file_caps switch (v4)Serge E. Hallyn2008-11-061-0/+3
* security: Fix setting of PF_SUPERPRIV by __capable()David Howells2008-08-141-2/+13
* security: filesystem capabilities: fix fragile setuid fixup codeAndrew G. Morgan2008-07-041-0/+2
* capabilities: remain source compatible with 32-bit raw legacy capability supp...Andrew G. Morgan2008-05-311-8/+21
* Security: Typecast CAP_*_SET macrosDavid Howells2008-04-291-6/+6
* capabilities: implement per-process securebitsAndrew G. Morgan2008-04-281-2/+1
* Smack: Simplified Mandatory Access Control KernelCasey Schaufler2008-02-051-3/+23
* capabilities: introduce per-process capability bounding setSerge E. Hallyn2008-02-051-2/+9