aboutsummaryrefslogtreecommitdiffstats
path: root/kernel/capability.c
Commit message (Expand)AuthorAge
* kernel: conditionally support non-root users, groups and capabilitiesIulia Manda2015-04-15
* CAPABILITIES: remove undefined caps from all processesEric Paris2014-07-24
* fs,userns: Change inode_capable to capable_wrt_inode_uidgidAndy Lutomirski2014-06-10
* kernel/capability.c: code clean-upFabian Frederick2014-06-04
* Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/jmo...Linus Torvalds2014-04-03
|\
| * capability: Use current logging stylesJoe Perches2014-02-23
* | audit: Simplify and correct audit_log_capsetEric W. Biederman2014-01-13
|/
* Merge tag 'xfs-for-linus-v3.12-rc1' of git://oss.sgi.com/xfs/xfsLinus Torvalds2013-09-09
|\
| * xfs: ioctl check for capabilities in the current user namespaceDwight Engen2013-08-15
* | userns: Kill nsown_capable it makes the wrong thing easyEric W. Biederman2013-08-31
|/
* Add file_ns_capable() helper function for open-time capability checkingLinus Torvalds2013-04-14
* userns: Teach inode_capable to understand inodes whose uids map to other name...Eric W. Biederman2012-05-15
* userns: Replace the hard to write inode_userns with inode_capable.Eric W. Biederman2012-04-07
* Revert "capabitlies: ns_capable can use the cap helpers rather than lsm call"Linus Torvalds2012-01-17
* Merge branch 'for-linus' of git://selinuxproject.org/~jmorris/linux-securityLinus Torvalds2012-01-14
|\
| * capabilities: remove task_ns_* functionsEric Paris2012-01-05
| * capabitlies: ns_capable can use the cap helpers rather than lsm callEric Paris2012-01-05
| * capabilities: style only - move capable below ns_capableEric Paris2012-01-05
| * capabilites: introduce new has_ns_capabilities_noauditEric Paris2012-01-05
| * capabilities: call has_ns_capability from has_capabilityEric Paris2012-01-05
| * capabilities: remove all _real_ interfacesEric Paris2012-01-05
| * capabilities: reverse arguments to security_capableEric Paris2012-01-05
* | kernel: Map most files to use export.h instead of module.hPaul Gortmaker2011-10-31
|/
* Merge branch 'master' into nextJames Morris2011-05-19
|\
| * Cache user_ns in struct credSerge E. Hallyn2011-05-13
* | capabilities: delete unused cap_set_fullEric Paris2011-04-03
* | capabilities: do not drop CAP_SETPCAP from the initial taskEric Paris2011-04-03
|/
* userns: make has_capability* into real functionsSerge E. Hallyn2011-03-23
* userns: security: make capabilities relative to the user namespaceSerge E. Hallyn2011-03-23
* security: add cred argument to security_capable()Chris Wright2011-02-11
* sched: Remove remaining USER_SCHED codeLi Zefan2010-04-02
* capabilities: Use RCU to protect task lookup in sys_capgetThomas Gleixner2009-12-09
* remove CONFIG_SECURITY_FILE_CAPABILITIES compile optionSerge E. Hallyn2009-11-23
* Silence the existing API for capability version compatibility check.Andrew G. Morgan2009-11-23
* capabilities: simplify bound checks for copy_from_user()Arjan van de Ven2009-10-13
* [CVE-2009-0029] System call wrappers part 04Heiko Carstens2009-01-14
* Merge branch 'next' into for-linusJames Morris2009-01-06
|\
| * CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #3]David Howells2009-01-06
| * Revert "CRED: Fix regression in cap_capable() as shown up by sys_faccessat() ...James Morris2009-01-06
| * CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #2]David Howells2009-01-04
* | sanitize audit_log_capset()Al Viro2009-01-04
|/
* CRED: Inaugurate COW credentialsDavid Howells2008-11-13
* CRED: Separate task security context from task_structDavid Howells2008-11-13
* CRED: Neuter sys_capset()David Howells2008-11-13
* Capabilities: BUG when an invalid capability is requestedEric Paris2008-11-11
* When the capset syscall is used it is not possible for audit to record theEric Paris2008-11-11
* file capabilities: add no_file_caps switch (v4)Serge E. Hallyn2008-11-05
* security: Fix setting of PF_SUPERPRIV by __capable()David Howells2008-08-14
* security: filesystem capabilities refactor kernel codeAndrew G. Morgan2008-07-24
* security: filesystem capabilities: fix fragile setuid fixup codeAndrew G. Morgan2008-07-04