summaryrefslogtreecommitdiffstats
path: root/security/commoncap.c
Commit message (Expand)AuthorAgeFilesLines
...
* syslog: use defined constants instead of raw numbersKees Cook2010-02-041-2/+3
* syslog: distinguish between /proc/kmsg and syscallsKees Cook2010-02-041-1/+6
* remove CONFIG_SECURITY_FILE_CAPABILITIES compile optionSerge E. Hallyn2009-11-241-70/+2
* security: remove root_plugJames Morris2009-10-201-1/+1
* Security/SELinux: seperate lsm specific mmap_min_addrEric Paris2009-08-061-1/+1
* Capabilities: move cap_file_mmap to commoncap.cEric Paris2009-08-061-0/+30
* security: rename ptrace_may_access => ptrace_access_checkIngo Molnar2009-06-251-2/+2
* Merge branch 'master' into nextJames Morris2009-05-081-1/+0
|\
| * cap_prctl: don't set error to 0 at 'no_change'Serge E. Hallyn2009-04-091-1/+0
* | don't raise all privs on setuid-root file with fE set (v2)Serge E. Hallyn2009-04-031-0/+32
|/
* Merge branch 'next' into for-linusJames Morris2009-01-071-15/+14
|\
| * CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #3]David Howells2009-01-071-15/+14
| * Revert "CRED: Fix regression in cap_capable() as shown up by sys_faccessat() ...James Morris2009-01-071-29/+13
| * CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #2]David Howells2009-01-051-13/+29
* | inode->i_op is never NULLAl Viro2009-01-051-3/+3
|/
* capabilities: define get_vfs_caps_from_disk when file caps are not enabledEric Paris2008-11-151-0/+6
* CRED: Prettify commoncap.cDavid Howells2008-11-141-52/+248
* CRED: Make execve() take advantage of copy-on-write credentialsDavid Howells2008-11-141-76/+76
* CRED: Inaugurate COW credentialsDavid Howells2008-11-141-140/+125
* CRED: Use RCU to access another task's creds and to release a task's own credsDavid Howells2008-11-141-24/+40
* CRED: Wrap current->cred and a few other accessorsDavid Howells2008-11-141-1/+1
* CRED: Separate task security context from task_structDavid Howells2008-11-141-76/+85
* CRED: Constify the kernel_cap_t arguments to the capset LSM hooksDavid Howells2008-11-141-4/+6
* CRED: Neuter sys_capset()David Howells2008-11-141-21/+8
* CRED: Wrap task credential accesses in the capabilities codeDavid Howells2008-11-141-12/+18
* Add a new capable interface that will be used by systems that use audit toEric Paris2008-11-111-4/+4
* Any time fcaps or a setuid app under SECURE_NOROOT is used to result in aEric Paris2008-11-111-1/+22
* This patch add a generic cpu endian caps structure and externally availableEric Paris2008-11-111-58/+71
* file capabilities: add no_file_caps switch (v4)Serge E. Hallyn2008-11-061-0/+3
* file caps: always start with clear bprm->caps_*Serge Hallyn2008-11-011-3/+3
* file capabilities: uninline cap_safe_niceSerge E. Hallyn2008-09-271-1/+1
* security: Fix setting of PF_SUPERPRIV by __capable()David Howells2008-08-141-7/+17
* security: protect legacy applications from executing with insufficient privilegeAndrew G. Morgan2008-07-241-49/+59
* Security: split proc ptrace checking into read vs. attachStephen Smalley2008-07-141-1/+2
* security: filesystem capabilities: fix CAP_SETPCAP handlingAndrew G. Morgan2008-07-041-3/+10
* xattr: add missing consts to function argumentsDavid Howells2008-04-291-3/+3
* capabilities: implement per-process securebitsAndrew G. Morgan2008-04-281-9/+94
* security: replace remaining __FUNCTION__ occurrencesHarvey Harrison2008-04-181-2/+2
* file capabilities: remove cap_task_kill()Serge Hallyn2008-03-201-40/+0
* file capabilities: simplify signal checkSerge E. Hallyn2008-02-231-1/+1
* capabilities: introduce per-process capability bounding setSerge E. Hallyn2008-02-051-17/+27
* Add 64-bit capability support to the kernelAndrew Morgan2008-02-051-30/+57
* revert "capabilities: clean up file capability reading"Andrew Morton2008-02-051-15/+8
* Fix filesystem capability supportAndrew G. Morgan2008-01-211-3/+10
* file capabilities: don't prevent signaling setuid root programsSerge E. Hallyn2007-11-291-0/+9
* file capabilities: allow sigcont within sessionSerge E. Hallyn2007-11-141-0/+4
* capabilities: clean up file capability readingSerge E. Hallyn2007-10-221-8/+15
* pid namespaces: define is_global_init() and is_container_init()Serge E. Hallyn2007-10-191-1/+2
* V3 file capabilities: alter behavior of cap_setpcapAndrew Morgan2007-10-181-5/+54
* security/ cleanupsAdrian Bunk2007-10-171-21/+0