summaryrefslogtreecommitdiff
path: root/security/commoncap.c
AgeCommit message (Expand)AuthorFilesLines
2009-04-09cap_prctl: don't set error to 0 at 'no_change'Serge E. Hallyn1-1/+0
2009-01-07Merge branch 'next' into for-linusJames Morris1-15/+14
2009-01-07CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #3]David Howells1-15/+14
2009-01-07Revert "CRED: Fix regression in cap_capable() as shown up by sys_faccessat() ...James Morris1-29/+13
2009-01-05inode->i_op is never NULLAl Viro1-3/+3
2009-01-05CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #2]David Howells1-13/+29
2008-11-15capabilities: define get_vfs_caps_from_disk when file caps are not enabledEric Paris1-0/+6
2008-11-14CRED: Prettify commoncap.cDavid Howells1-52/+248
2008-11-14CRED: Make execve() take advantage of copy-on-write credentialsDavid Howells1-76/+76
2008-11-14CRED: Inaugurate COW credentialsDavid Howells1-140/+125
2008-11-14CRED: Use RCU to access another task's creds and to release a task's own credsDavid Howells1-24/+40
2008-11-14CRED: Wrap current->cred and a few other accessorsDavid Howells1-1/+1
2008-11-14CRED: Separate task security context from task_structDavid Howells1-76/+85
2008-11-14CRED: Constify the kernel_cap_t arguments to the capset LSM hooksDavid Howells1-4/+6
2008-11-14CRED: Neuter sys_capset()David Howells1-21/+8
2008-11-14CRED: Wrap task credential accesses in the capabilities codeDavid Howells1-12/+18
2008-11-11Add a new capable interface that will be used by systems that use audit toEric Paris1-4/+4
2008-11-11Any time fcaps or a setuid app under SECURE_NOROOT is used to result in aEric Paris1-1/+22
2008-11-11This patch add a generic cpu endian caps structure and externally availableEric Paris1-58/+71
2008-11-06file capabilities: add no_file_caps switch (v4)Serge E. Hallyn1-0/+3
2008-11-01file caps: always start with clear bprm->caps_*Serge Hallyn1-3/+3
2008-09-27file capabilities: uninline cap_safe_niceSerge E. Hallyn1-1/+1
2008-08-14security: Fix setting of PF_SUPERPRIV by __capable()David Howells1-7/+17
2008-07-24security: protect legacy applications from executing with insufficient privilegeAndrew G. Morgan1-49/+59
2008-07-14Security: split proc ptrace checking into read vs. attachStephen Smalley1-1/+2
2008-07-04security: filesystem capabilities: fix CAP_SETPCAP handlingAndrew G. Morgan1-3/+10
2008-04-29xattr: add missing consts to function argumentsDavid Howells1-3/+3
2008-04-28capabilities: implement per-process securebitsAndrew G. Morgan1-9/+94
2008-04-18security: replace remaining __FUNCTION__ occurrencesHarvey Harrison1-2/+2
2008-03-20file capabilities: remove cap_task_kill()Serge Hallyn1-40/+0
2008-02-24file capabilities: simplify signal checkSerge E. Hallyn1-1/+1
2008-02-05capabilities: introduce per-process capability bounding setSerge E. Hallyn1-17/+27
2008-02-05Add 64-bit capability support to the kernelAndrew Morgan1-30/+57
2008-02-05revert "capabilities: clean up file capability reading"Andrew Morton1-15/+8
2008-01-22Fix filesystem capability supportAndrew G. Morgan1-3/+10
2007-11-29file capabilities: don't prevent signaling setuid root programsSerge E. Hallyn1-0/+9
2007-11-15file capabilities: allow sigcont within sessionSerge E. Hallyn1-0/+4
2007-10-22capabilities: clean up file capability readingSerge E. Hallyn1-8/+15
2007-10-19pid namespaces: define is_global_init() and is_container_init()Serge E. Hallyn1-1/+2
2007-10-19V3 file capabilities: alter behavior of cap_setpcapAndrew Morgan1-5/+54
2007-10-17security/ cleanupsAdrian Bunk1-21/+0
2007-10-17Implement file posix capabilitiesSerge E. Hallyn1-16/+228
2007-10-17security: Convert LSM into a static interfaceJames Morris1-3/+0
2007-08-23fix NULL pointer dereference in __vm_enough_memory()Alan Cox1-2/+2
2007-07-19coredump masking: reimplementation of dumpable using two flagsKawai, Hidehiro1-1/+1
2007-05-08header cleaning: don't include smp_lock.h when not usedRandy Dunlap1-1/+0
2006-09-29[PATCH] pidspace: is_init()Sukadev Bhattiprolu1-1/+1
2006-06-30Remove obsolete #include <linux/config.h>Jörn Engel1-1/+0
2006-06-30[NETLINK]: Encapsulate eff_cap usage within security framework.Darrel Goeddel1-2/+2
2006-03-25[PATCH] make cap_ptrace enforce PTRACE_TRACME checksChris Wright1-2/+2