summaryrefslogtreecommitdiffstats
path: root/security/commoncap.c
Commit message (Expand)AuthorAgeFilesLines
...
* CRED: Make execve() take advantage of copy-on-write credentialsDavid Howells2008-11-141-76/+76
* CRED: Inaugurate COW credentialsDavid Howells2008-11-141-140/+125
* CRED: Use RCU to access another task's creds and to release a task's own credsDavid Howells2008-11-141-24/+40
* CRED: Wrap current->cred and a few other accessorsDavid Howells2008-11-141-1/+1
* CRED: Separate task security context from task_structDavid Howells2008-11-141-76/+85
* CRED: Constify the kernel_cap_t arguments to the capset LSM hooksDavid Howells2008-11-141-4/+6
* CRED: Neuter sys_capset()David Howells2008-11-141-21/+8
* CRED: Wrap task credential accesses in the capabilities codeDavid Howells2008-11-141-12/+18
* Add a new capable interface that will be used by systems that use audit toEric Paris2008-11-111-4/+4
* Any time fcaps or a setuid app under SECURE_NOROOT is used to result in aEric Paris2008-11-111-1/+22
* This patch add a generic cpu endian caps structure and externally availableEric Paris2008-11-111-58/+71
* file capabilities: add no_file_caps switch (v4)Serge E. Hallyn2008-11-061-0/+3
* file caps: always start with clear bprm->caps_*Serge Hallyn2008-11-011-3/+3
* file capabilities: uninline cap_safe_niceSerge E. Hallyn2008-09-271-1/+1
* security: Fix setting of PF_SUPERPRIV by __capable()David Howells2008-08-141-7/+17
* security: protect legacy applications from executing with insufficient privilegeAndrew G. Morgan2008-07-241-49/+59
* Security: split proc ptrace checking into read vs. attachStephen Smalley2008-07-141-1/+2
* security: filesystem capabilities: fix CAP_SETPCAP handlingAndrew G. Morgan2008-07-041-3/+10
* xattr: add missing consts to function argumentsDavid Howells2008-04-291-3/+3
* capabilities: implement per-process securebitsAndrew G. Morgan2008-04-281-9/+94
* security: replace remaining __FUNCTION__ occurrencesHarvey Harrison2008-04-181-2/+2
* file capabilities: remove cap_task_kill()Serge Hallyn2008-03-201-40/+0
* file capabilities: simplify signal checkSerge E. Hallyn2008-02-231-1/+1
* capabilities: introduce per-process capability bounding setSerge E. Hallyn2008-02-051-17/+27
* Add 64-bit capability support to the kernelAndrew Morgan2008-02-051-30/+57
* revert "capabilities: clean up file capability reading"Andrew Morton2008-02-051-15/+8
* Fix filesystem capability supportAndrew G. Morgan2008-01-211-3/+10
* file capabilities: don't prevent signaling setuid root programsSerge E. Hallyn2007-11-291-0/+9
* file capabilities: allow sigcont within sessionSerge E. Hallyn2007-11-141-0/+4
* capabilities: clean up file capability readingSerge E. Hallyn2007-10-221-8/+15
* pid namespaces: define is_global_init() and is_container_init()Serge E. Hallyn2007-10-191-1/+2
* V3 file capabilities: alter behavior of cap_setpcapAndrew Morgan2007-10-181-5/+54
* security/ cleanupsAdrian Bunk2007-10-171-21/+0
* Implement file posix capabilitiesSerge E. Hallyn2007-10-171-16/+228
* security: Convert LSM into a static interfaceJames Morris2007-10-171-3/+0
* fix NULL pointer dereference in __vm_enough_memory()Alan Cox2007-08-221-2/+2
* coredump masking: reimplementation of dumpable using two flagsKawai, Hidehiro2007-07-191-1/+1
* header cleaning: don't include smp_lock.h when not usedRandy Dunlap2007-05-081-1/+0
* [PATCH] pidspace: is_init()Sukadev Bhattiprolu2006-09-291-1/+1
* Remove obsolete #include <linux/config.h>Jörn Engel2006-06-301-1/+0
* [NETLINK]: Encapsulate eff_cap usage within security framework.Darrel Goeddel2006-06-291-2/+2
* [PATCH] make cap_ptrace enforce PTRACE_TRACME checksChris Wright2006-03-251-2/+2
* [PATCH] move capable() to capability.hRandy.Dunlap2006-01-111-0/+1
* [PATCH] setuid core dumpAlan Cox2005-06-231-1/+1
* Linux-2.6.12-rc2v2.6.12-rc2Linus Torvalds2005-04-161-0/+345