summaryrefslogtreecommitdiff
path: root/kernel/capability.c
AgeCommit message (Expand)AuthorFilesLines
2016-12-24Replace <asm/uaccess.h> with <linux/uaccess.h> globallyLinus Torvalds1-1/+1
2016-11-22exec: Ensure mm->user_ns contains the execed filesEric W. Biederman1-2/+14
2016-11-22ptrace: Capture the ptracer's creds not PT_PTRACE_CAPEric W. Biederman1-0/+20
2016-06-06kernel: Add noaudit variant of ns_capable()Tyler Hicks1-10/+36
2015-04-15kernel: conditionally support non-root users, groups and capabilitiesIulia Manda1-16/+19
2014-07-24CAPABILITIES: remove undefined caps from all processesEric Paris1-0/+4
2014-06-10fs,userns: Change inode_capable to capable_wrt_inode_uidgidAndy Lutomirski1-12/+8
2014-06-04kernel/capability.c: code clean-upFabian Frederick1-3/+3
2014-04-03Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/jmo...Linus Torvalds1-19/+10
2014-02-24capability: Use current logging stylesJoe Perches1-19/+10
2014-01-13audit: Simplify and correct audit_log_capsetEric W. Biederman1-1/+1
2013-09-09Merge tag 'xfs-for-linus-v3.12-rc1' of git://oss.sgi.com/xfs/xfsLinus Torvalds1-0/+1
2013-08-30userns: Kill nsown_capable it makes the wrong thing easyEric W. Biederman1-12/+0
2013-08-15xfs: ioctl check for capabilities in the current user namespaceDwight Engen1-0/+1
2013-04-14Add file_ns_capable() helper function for open-time capability checkingLinus Torvalds1-0/+24
2012-05-15userns: Teach inode_capable to understand inodes whose uids map to other name...Eric W. Biederman1-2/+4
2012-04-07userns: Replace the hard to write inode_userns with inode_capable.Eric W. Biederman1-0/+19
2012-01-17Revert "capabitlies: ns_capable can use the cap helpers rather than lsm call"Linus Torvalds1-1/+1
2012-01-14Merge branch 'for-linus' of git://selinuxproject.org/~jmorris/linux-securityLinus Torvalds1-34/+46
2012-01-05capabilities: remove task_ns_* functionsEric Paris1-14/+0
2012-01-05capabitlies: ns_capable can use the cap helpers rather than lsm callEric Paris1-1/+1
2012-01-05capabilities: style only - move capable below ns_capableEric Paris1-16/+16
2012-01-05capabilites: introduce new has_ns_capabilities_noauditEric Paris1-5/+25
2012-01-05capabilities: call has_ns_capability from has_capabilityEric Paris1-16/+10
2012-01-05capabilities: remove all _real_ interfacesEric Paris1-3/+15
2012-01-05capabilities: reverse arguments to security_capableEric Paris1-1/+1
2011-10-31kernel: Map most files to use export.h instead of module.hPaul Gortmaker1-1/+1
2011-05-19Merge branch 'master' into nextJames Morris1-0/+12
2011-05-13Cache user_ns in struct credSerge E. Hallyn1-0/+12
2011-04-04capabilities: delete unused cap_set_fullEric Paris1-2/+0
2011-04-04capabilities: do not drop CAP_SETPCAP from the initial taskEric Paris1-2/+0
2011-03-23userns: make has_capability* into real functionsSerge E. Hallyn1-0/+54
2011-03-23userns: security: make capabilities relative to the user namespaceSerge E. Hallyn1-5/+37
2011-02-11security: add cred argument to security_capable()Chris Wright1-1/+1
2010-04-02sched: Remove remaining USER_SCHED codeLi Zefan1-1/+0
2009-12-10capabilities: Use RCU to protect task lookup in sys_capgetThomas Gleixner1-2/+2
2009-11-24remove CONFIG_SECURITY_FILE_CAPABILITIES compile optionSerge E. Hallyn1-2/+0
2009-11-24Silence the existing API for capability version compatibility check.Andrew G. Morgan1-2/+2
2009-10-14capabilities: simplify bound checks for copy_from_user()Arjan van de Ven1-3/+6
2009-01-14[CVE-2009-0029] System call wrappers part 04Heiko Carstens1-2/+2
2009-01-07Merge branch 'next' into for-linusJames Morris1-1/+1
2009-01-07CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #3]David Howells1-1/+1
2009-01-07Revert "CRED: Fix regression in cap_capable() as shown up by sys_faccessat() ...James Morris1-1/+1
2009-01-05CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #2]David Howells1-1/+1
2009-01-04sanitize audit_log_capset()Al Viro1-3/+1
2008-11-14CRED: Inaugurate COW credentialsDavid Howells1-54/+24
2008-11-14CRED: Separate task security context from task_structDavid Howells1-2/+2
2008-11-14CRED: Neuter sys_capset()David Howells1-204/+23
2008-11-11Capabilities: BUG when an invalid capability is requestedEric Paris1-0/+5
2008-11-11When the capset syscall is used it is not possible for audit to record theEric Paris1-0/+5