summaryrefslogtreecommitdiff
path: root/security/commoncap.c
AgeCommit message (Expand)AuthorFilesLines
2011-03-24userns: allow ptrace from non-init user namespacesSerge E. Hallyn1-8/+32
2011-03-24userns: security: make capabilities relative to the user namespaceSerge E. Hallyn1-7/+31
2011-03-17Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next-2.6Linus Torvalds1-2/+1
2011-03-04netlink: kill eff_cap from struct netlink_skb_parmsPatrick McHardy1-2/+1
2011-02-02time: Correct the *settime* parametersRichard Cochran1-1/+1
2010-11-16capabilities/syslog: open code cap_syslog logic to fix build failureEric Paris1-21/+0
2010-11-12Restrict unprivileged access to kernel syslogDan Rosenberg1-0/+2
2010-10-21security: remove unused parameter from security_task_setscheduler()KOSAKI Motohiro1-4/+1
2010-08-18Make do_execve() take a const filename pointerDavid Howells1-1/+1
2010-04-23security: whitespace coding style fixesJustin P. Mattock1-2/+2
2010-04-20Security: Fix the comment of cap_file_mmap()wzt.wzt@gmail.com1-1/+1
2010-02-05syslog: clean up needless commentKees Cook1-1/+0
2010-02-04syslog: use defined constants instead of raw numbersKees Cook1-2/+3
2010-02-04syslog: distinguish between /proc/kmsg and syscallsKees Cook1-1/+6
2009-11-24remove CONFIG_SECURITY_FILE_CAPABILITIES compile optionSerge E. Hallyn1-70/+2
2009-10-20security: remove root_plugJames Morris1-1/+1
2009-08-06Security/SELinux: seperate lsm specific mmap_min_addrEric Paris1-1/+1
2009-08-06Capabilities: move cap_file_mmap to commoncap.cEric Paris1-0/+30
2009-06-24security: rename ptrace_may_access => ptrace_access_checkIngo Molnar1-2/+2
2009-05-08Merge branch 'master' into nextJames Morris1-1/+0
2009-04-09cap_prctl: don't set error to 0 at 'no_change'Serge E. Hallyn1-1/+0
2009-04-03don't raise all privs on setuid-root file with fE set (v2)Serge E. Hallyn1-0/+32
2009-01-07Merge branch 'next' into for-linusJames Morris1-15/+14
2009-01-07CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #3]David Howells1-15/+14
2009-01-07Revert "CRED: Fix regression in cap_capable() as shown up by sys_faccessat() ...James Morris1-29/+13
2009-01-05inode->i_op is never NULLAl Viro1-3/+3
2009-01-05CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #2]David Howells1-13/+29
2008-11-15capabilities: define get_vfs_caps_from_disk when file caps are not enabledEric Paris1-0/+6
2008-11-14CRED: Prettify commoncap.cDavid Howells1-52/+248
2008-11-14CRED: Make execve() take advantage of copy-on-write credentialsDavid Howells1-76/+76
2008-11-14CRED: Inaugurate COW credentialsDavid Howells1-140/+125
2008-11-14CRED: Use RCU to access another task's creds and to release a task's own credsDavid Howells1-24/+40
2008-11-14CRED: Wrap current->cred and a few other accessorsDavid Howells1-1/+1
2008-11-14CRED: Separate task security context from task_structDavid Howells1-76/+85
2008-11-14CRED: Constify the kernel_cap_t arguments to the capset LSM hooksDavid Howells1-4/+6
2008-11-14CRED: Neuter sys_capset()David Howells1-21/+8
2008-11-14CRED: Wrap task credential accesses in the capabilities codeDavid Howells1-12/+18
2008-11-11Add a new capable interface that will be used by systems that use audit toEric Paris1-4/+4
2008-11-11Any time fcaps or a setuid app under SECURE_NOROOT is used to result in aEric Paris1-1/+22
2008-11-11This patch add a generic cpu endian caps structure and externally availableEric Paris1-58/+71
2008-11-06file capabilities: add no_file_caps switch (v4)Serge E. Hallyn1-0/+3
2008-11-01file caps: always start with clear bprm->caps_*Serge Hallyn1-3/+3
2008-09-27file capabilities: uninline cap_safe_niceSerge E. Hallyn1-1/+1
2008-08-14security: Fix setting of PF_SUPERPRIV by __capable()David Howells1-7/+17
2008-07-24security: protect legacy applications from executing with insufficient privilegeAndrew G. Morgan1-49/+59
2008-07-14Security: split proc ptrace checking into read vs. attachStephen Smalley1-1/+2
2008-07-04security: filesystem capabilities: fix CAP_SETPCAP handlingAndrew G. Morgan1-3/+10
2008-04-29xattr: add missing consts to function argumentsDavid Howells1-3/+3
2008-04-28capabilities: implement per-process securebitsAndrew G. Morgan1-9/+94
2008-04-18security: replace remaining __FUNCTION__ occurrencesHarvey Harrison1-2/+2