path: root/kernel/capability.c
AgeCommit message (Expand)AuthorLines
2014-07-24CAPABILITIES: remove undefined caps from all processesEric Paris-0/+4
2014-06-10fs,userns: Change inode_capable to capable_wrt_inode_uidgidAndy Lutomirski-12/+8
2014-06-04kernel/capability.c: code clean-upFabian Frederick-3/+3
2014-04-03Merge branch 'for-linus' of git:// Torvalds-19/+10
2014-02-24capability: Use current logging stylesJoe Perches-19/+10
2014-01-13audit: Simplify and correct audit_log_capsetEric W. Biederman-1/+1
2013-09-09Merge tag 'xfs-for-linus-v3.12-rc1' of git:// Torvalds-0/+1
2013-08-30userns: Kill nsown_capable it makes the wrong thing easyEric W. Biederman-12/+0
2013-08-15xfs: ioctl check for capabilities in the current user namespaceDwight Engen-0/+1
2013-04-14Add file_ns_capable() helper function for open-time capability checkingLinus Torvalds-0/+24
2012-05-15userns: Teach inode_capable to understand inodes whose uids map to other name...Eric W. Biederman-2/+4
2012-04-07userns: Replace the hard to write inode_userns with inode_capable.Eric W. Biederman-0/+19
2012-01-17Revert "capabitlies: ns_capable can use the cap helpers rather than lsm call"Linus Torvalds-1/+1
2012-01-14Merge branch 'for-linus' of git:// Torvalds-34/+46
2012-01-05capabilities: remove task_ns_* functionsEric Paris-14/+0
2012-01-05capabitlies: ns_capable can use the cap helpers rather than lsm callEric Paris-1/+1
2012-01-05capabilities: style only - move capable below ns_capableEric Paris-16/+16
2012-01-05capabilites: introduce new has_ns_capabilities_noauditEric Paris-5/+25
2012-01-05capabilities: call has_ns_capability from has_capabilityEric Paris-16/+10
2012-01-05capabilities: remove all _real_ interfacesEric Paris-3/+15
2012-01-05capabilities: reverse arguments to security_capableEric Paris-1/+1
2011-10-31kernel: Map most files to use export.h instead of module.hPaul Gortmaker-1/+1
2011-05-19Merge branch 'master' into nextJames Morris-0/+12
2011-05-13Cache user_ns in struct credSerge E. Hallyn-0/+12
2011-04-04capabilities: delete unused cap_set_fullEric Paris-2/+0
2011-04-04capabilities: do not drop CAP_SETPCAP from the initial taskEric Paris-2/+0
2011-03-23userns: make has_capability* into real functionsSerge E. Hallyn-0/+54
2011-03-23userns: security: make capabilities relative to the user namespaceSerge E. Hallyn-5/+37
2011-02-11security: add cred argument to security_capable()Chris Wright-1/+1
2010-04-02sched: Remove remaining USER_SCHED codeLi Zefan-1/+0
2009-12-10capabilities: Use RCU to protect task lookup in sys_capgetThomas Gleixner-2/+2
2009-11-24remove CONFIG_SECURITY_FILE_CAPABILITIES compile optionSerge E. Hallyn-2/+0
2009-11-24Silence the existing API for capability version compatibility check.Andrew G. Morgan-2/+2
2009-10-14capabilities: simplify bound checks for copy_from_user()Arjan van de Ven-3/+6
2009-01-14[CVE-2009-0029] System call wrappers part 04Heiko Carstens-2/+2
2009-01-07Merge branch 'next' into for-linusJames Morris-1/+1
2009-01-07CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #3]David Howells-1/+1
2009-01-07Revert "CRED: Fix regression in cap_capable() as shown up by sys_faccessat() ...James Morris-1/+1
2009-01-05CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #2]David Howells-1/+1
2009-01-04sanitize audit_log_capset()Al Viro-3/+1
2008-11-14CRED: Inaugurate COW credentialsDavid Howells-54/+24
2008-11-14CRED: Separate task security context from task_structDavid Howells-2/+2
2008-11-14CRED: Neuter sys_capset()David Howells-204/+23
2008-11-11Capabilities: BUG when an invalid capability is requestedEric Paris-0/+5
2008-11-11When the capset syscall is used it is not possible for audit to record theEric Paris-0/+5
2008-11-06file capabilities: add no_file_caps switch (v4)Serge E. Hallyn-0/+11
2008-08-14security: Fix setting of PF_SUPERPRIV by __capable()David Howells-8/+13
2008-07-24security: filesystem capabilities refactor kernel codeAndrew G. Morgan-117/+221
2008-07-04security: filesystem capabilities: fix fragile setuid fixup codeAndrew G. Morgan-0/+21
2008-05-31capabilities: remain source compatible with 32-bit raw legacy capability supp...Andrew G. Morgan-38/+73