summaryrefslogtreecommitdiffstats
path: root/include/linux/capability.h
Commit message (Expand)AuthorAgeFilesLines
* Merge branch 'next' into for-linusJames Morris2011-05-241-5/+0
|\
| * Merge branch 'master' into nextJames Morris2011-05-191-14/+1
| |\
| * | capabilities: delete all CAP_INIT macrosEric Paris2011-04-041-3/+0
| * | capabilities: delete unused cap_set_fullEric Paris2011-04-041-2/+0
| * | capabilities: do not drop CAP_SETPCAP from the initial taskEric Paris2011-04-041-2/+4
* | | Merge branch 'timers-core-for-linus' of git://git.kernel.org/pub/scm/linux/ke...Linus Torvalds2011-05-191-1/+6
|\ \ \ | |_|/ |/| |
| * | timers: Posix interface for alarm-timersJohn Stultz2011-04-261-1/+6
| |/
* / Cache user_ns in struct credSerge E. Hallyn2011-05-131-12/+1
|/
* userns: make has_capability* into real functionsSerge E. Hallyn2011-03-231-30/+4
* userns: allow ptrace from non-init user namespacesSerge E. Hallyn2011-03-231-0/+2
* userns: security: make capabilities relative to the user namespaceSerge E. Hallyn2011-03-231-8/+28
* security: Define CAP_SYSLOGSerge E. Hallyn2010-11-291-2/+5
* security: move LSM xattrnames to xattr.hMimi Zohar2010-08-021-3/+0
* remove CONFIG_SECURITY_FILE_CAPABILITIES compile optionSerge E. Hallyn2009-11-241-2/+0
* trivial: change address of the libcap source.GeunSik Lim2009-09-211-1/+1
* add some long-missing capabilities to fs_maskSerge E. Hallyn2009-04-131-4/+19
* nfsd: nfsd should drop CAP_MKNOD for non-rootJ. Bruce Fields2009-03-171-2/+4
* headers_check fix: linux/capability.hJaswinder Singh Rajput2009-01-301-4/+4
* CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #3]David Howells2009-01-071-2/+15
* Revert "CRED: Fix regression in cap_capable() as shown up by sys_faccessat() ...James Morris2009-01-071-15/+2
* CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #2]David Howells2009-01-051-2/+15
* CRED: Inaugurate COW credentialsDavid Howells2008-11-141-2/+0
* security: remove broken and useless declarationsJames Morris2008-11-121-2/+0
* Add a new capable interface that will be used by systems that use audit toEric Paris2008-11-111-0/+3
* This patch will print cap_permitted and cap_inheritable data in the PATHEric Paris2008-11-111-0/+5
* This patch add a generic cpu endian caps structure and externally availableEric Paris2008-11-111-0/+7
* Document the order of arguments for cap_issubset. It's not instantly clearEric Paris2008-11-111-0/+7
* file capabilities: add no_file_caps switch (v4)Serge E. Hallyn2008-11-061-0/+3
* security: Fix setting of PF_SUPERPRIV by __capable()David Howells2008-08-141-2/+13
* security: filesystem capabilities: fix fragile setuid fixup codeAndrew G. Morgan2008-07-041-0/+2
* capabilities: remain source compatible with 32-bit raw legacy capability supp...Andrew G. Morgan2008-05-311-8/+21
* Security: Typecast CAP_*_SET macrosDavid Howells2008-04-291-6/+6
* capabilities: implement per-process securebitsAndrew G. Morgan2008-04-281-2/+1
* Smack: Simplified Mandatory Access Control KernelCasey Schaufler2008-02-051-3/+23
* capabilities: introduce per-process capability bounding setSerge E. Hallyn2008-02-051-2/+9
* Remove unnecessary include from include/linux/capability.hAndrew Morgan2008-02-051-1/+0
* Add 64-bit capability support to the kernelAndrew Morgan2008-02-051-66/+155
* revert "capabilities: clean up file capability reading"Andrew Morton2008-02-051-2/+4
* capabilities: clean up file capability readingSerge E. Hallyn2007-10-221-4/+2
* V3 file capabilities: alter behavior of cap_setpcapAndrew Morgan2007-10-181-4/+0
* Implement file posix capabilitiesSerge E. Hallyn2007-10-171-14/+34
* Remove unnecessary includes of spinlock.h under include/linuxRobert P. J. Day2007-07-161-1/+0
* capability.h warning fixAndrew Morton2007-05-231-0/+2
* [PATCH] refactor capable() to one implementation, add __capable() helperChris Wright2006-03-251-1/+2
* [PATCH] move capable() to capability.hRandy.Dunlap2006-01-111-0/+3
* [PATCH] VM: add capabilites check to set_zone_reclaimMartin Hicks2005-09-051-0/+1
* Linux-2.6.12-rc2v2.6.12-rc2Linus Torvalds2005-04-161-0/+360