index
:
~funfunctor/linux
SP4
amd-trivial-cleanup
amdgpu-ratelimit-vmfaults
amdkfd-hacking
amdkfd-next
amdkfd-next-4.9
amdkfd-next-4.9-revised
bug100058
master
nativeaux-bug100745
nativeaux-bug100745_v2
thrustmaster-tx
Unnamed repository; edit this file 'description' to name the repository.
UNKNOWN
summary
refs
log
tree
commit
diff
log msg
author
committer
range
path:
root
/
kernel
/
capability.c
Age
Commit message (
Expand
)
Author
Files
Lines
2015-04-15
kernel: conditionally support non-root users, groups and capabilities
Iulia Manda
1
-16
/
+19
2014-07-24
CAPABILITIES: remove undefined caps from all processes
Eric Paris
1
-0
/
+4
2014-06-10
fs,userns: Change inode_capable to capable_wrt_inode_uidgid
Andy Lutomirski
1
-12
/
+8
2014-06-04
kernel/capability.c: code clean-up
Fabian Frederick
1
-3
/
+3
2014-04-03
Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/jmo...
Linus Torvalds
1
-19
/
+10
2014-02-24
capability: Use current logging styles
Joe Perches
1
-19
/
+10
2014-01-13
audit: Simplify and correct audit_log_capset
Eric W. Biederman
1
-1
/
+1
2013-09-09
Merge tag 'xfs-for-linus-v3.12-rc1' of git://oss.sgi.com/xfs/xfs
Linus Torvalds
1
-0
/
+1
2013-08-30
userns: Kill nsown_capable it makes the wrong thing easy
Eric W. Biederman
1
-12
/
+0
2013-08-15
xfs: ioctl check for capabilities in the current user namespace
Dwight Engen
1
-0
/
+1
2013-04-14
Add file_ns_capable() helper function for open-time capability checking
Linus Torvalds
1
-0
/
+24
2012-05-15
userns: Teach inode_capable to understand inodes whose uids map to other name...
Eric W. Biederman
1
-2
/
+4
2012-04-07
userns: Replace the hard to write inode_userns with inode_capable.
Eric W. Biederman
1
-0
/
+19
2012-01-17
Revert "capabitlies: ns_capable can use the cap helpers rather than lsm call"
Linus Torvalds
1
-1
/
+1
2012-01-14
Merge branch 'for-linus' of git://selinuxproject.org/~jmorris/linux-security
Linus Torvalds
1
-34
/
+46
2012-01-05
capabilities: remove task_ns_* functions
Eric Paris
1
-14
/
+0
2012-01-05
capabitlies: ns_capable can use the cap helpers rather than lsm call
Eric Paris
1
-1
/
+1
2012-01-05
capabilities: style only - move capable below ns_capable
Eric Paris
1
-16
/
+16
2012-01-05
capabilites: introduce new has_ns_capabilities_noaudit
Eric Paris
1
-5
/
+25
2012-01-05
capabilities: call has_ns_capability from has_capability
Eric Paris
1
-16
/
+10
2012-01-05
capabilities: remove all _real_ interfaces
Eric Paris
1
-3
/
+15
2012-01-05
capabilities: reverse arguments to security_capable
Eric Paris
1
-1
/
+1
2011-10-31
kernel: Map most files to use export.h instead of module.h
Paul Gortmaker
1
-1
/
+1
2011-05-19
Merge branch 'master' into next
James Morris
1
-0
/
+12
2011-05-13
Cache user_ns in struct cred
Serge E. Hallyn
1
-0
/
+12
2011-04-04
capabilities: delete unused cap_set_full
Eric Paris
1
-2
/
+0
2011-04-04
capabilities: do not drop CAP_SETPCAP from the initial task
Eric Paris
1
-2
/
+0
2011-03-23
userns: make has_capability* into real functions
Serge E. Hallyn
1
-0
/
+54
2011-03-23
userns: security: make capabilities relative to the user namespace
Serge E. Hallyn
1
-5
/
+37
2011-02-11
security: add cred argument to security_capable()
Chris Wright
1
-1
/
+1
2010-04-02
sched: Remove remaining USER_SCHED code
Li Zefan
1
-1
/
+0
2009-12-10
capabilities: Use RCU to protect task lookup in sys_capget
Thomas Gleixner
1
-2
/
+2
2009-11-24
remove CONFIG_SECURITY_FILE_CAPABILITIES compile option
Serge E. Hallyn
1
-2
/
+0
2009-11-24
Silence the existing API for capability version compatibility check.
Andrew G. Morgan
1
-2
/
+2
2009-10-14
capabilities: simplify bound checks for copy_from_user()
Arjan van de Ven
1
-3
/
+6
2009-01-14
[CVE-2009-0029] System call wrappers part 04
Heiko Carstens
1
-2
/
+2
2009-01-07
Merge branch 'next' into for-linus
James Morris
1
-1
/
+1
2009-01-07
CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #3]
David Howells
1
-1
/
+1
2009-01-07
Revert "CRED: Fix regression in cap_capable() as shown up by sys_faccessat() ...
James Morris
1
-1
/
+1
2009-01-05
CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #2]
David Howells
1
-1
/
+1
2009-01-04
sanitize audit_log_capset()
Al Viro
1
-3
/
+1
2008-11-14
CRED: Inaugurate COW credentials
David Howells
1
-54
/
+24
2008-11-14
CRED: Separate task security context from task_struct
David Howells
1
-2
/
+2
2008-11-14
CRED: Neuter sys_capset()
David Howells
1
-204
/
+23
2008-11-11
Capabilities: BUG when an invalid capability is requested
Eric Paris
1
-0
/
+5
2008-11-11
When the capset syscall is used it is not possible for audit to record the
Eric Paris
1
-0
/
+5
2008-11-06
file capabilities: add no_file_caps switch (v4)
Serge E. Hallyn
1
-0
/
+11
2008-08-14
security: Fix setting of PF_SUPERPRIV by __capable()
David Howells
1
-8
/
+13
2008-07-24
security: filesystem capabilities refactor kernel code
Andrew G. Morgan
1
-117
/
+221
2008-07-04
security: filesystem capabilities: fix fragile setuid fixup code
Andrew G. Morgan
1
-0
/
+21
[next]