summaryrefslogtreecommitdiff
AgeCommit messageAuthorFilesLines
2017-01-06ptrace: Capture the ptracer's creds not PT_PTRACE_CAPEric W. Biederman6-7/+30
2017-01-06exec: Ensure mm->user_ns contains the execed filesEric W. Biederman3-4/+32
2016-06-06kernel: Add noaudit variant of ns_capable()Tyler Hicks2-10/+41
2015-04-15kernel: conditionally support non-root users, groups and capabilitiesIulia Manda16-26/+126
2014-07-24CAPABILITIES: remove undefined caps from all processesEric Paris5-12/+13
2014-06-10fs,userns: Change inode_capable to capable_wrt_inode_uidgidAndy Lutomirski6-26/+27
2014-06-04kernel/capability.c: code clean-upFabian Frederick1-3/+3
2014-04-03Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/jmo...Linus Torvalds30-207/+235
2014-02-24capability: Use current logging stylesJoe Perches1-19/+10
2014-01-14audit: Simplify and correct audit_log_capsetEric W. Biederman3-10/+8
2013-09-09Merge tag 'xfs-for-linus-v3.12-rc1' of git://oss.sgi.com/xfs/xfsLinus Torvalds116-11909/+13611
2013-08-31userns: Kill nsown_capable it makes the wrong thing easyEric W. Biederman12-34/+21
2013-08-15xfs: ioctl check for capabilities in the current user namespaceDwight Engen2-2/+10
2013-04-14Add file_ns_capable() helper function for open-time capability checkingLinus Torvalds2-0/+26
2012-05-15userns: Teach inode_capable to understand inodes whose uids map to other name...Eric W. Biederman1-2/+4
2012-04-08userns: Replace the hard to write inode_userns with inode_capable.Eric W. Biederman5-23/+28
2012-01-17Revert "capabitlies: ns_capable can use the cap helpers rather than lsm call"Linus Torvalds1-1/+1
2012-01-15Merge branch 'for-linus' of git://selinuxproject.org/~jmorris/linux-securityLinus Torvalds24-189/+120
2012-01-05capabilities: remove task_ns_* functionsEric Paris5-20/+7
2012-01-05capabitlies: ns_capable can use the cap helpers rather than lsm callEric Paris1-1/+1
2012-01-05capabilities: style only - move capable below ns_capableEric Paris1-16/+16
2012-01-05capabilites: introduce new has_ns_capabilities_noauditEric Paris2-5/+27
2012-01-05capabilities: call has_ns_capability from has_capabilityEric Paris1-16/+10
2012-01-05capabilities: remove all _real_ interfacesEric Paris3-52/+15
2012-01-05capabilities: reverse arguments to security_capableEric Paris4-6/+6
2011-10-31kernel: Map most files to use export.h instead of module.hPaul Gortmaker61-61/+61
2011-05-19Merge branch 'master' into nextJames Morris809-4481/+8481
2011-05-13Cache user_ns in struct credSerge E. Hallyn4-20/+27
2011-04-04capabilities: delete unused cap_set_fullEric Paris2-4/+0
2011-04-04capabilities: do not drop CAP_SETPCAP from the initial taskEric Paris2-4/+4
2011-03-24userns: make has_capability* into real functionsSerge E. Hallyn2-30/+58
2011-03-24userns: security: make capabilities relative to the user namespaceSerge E. Hallyn10-46/+144
2011-02-11security: add cred argument to security_capable()Chris Wright3-7/+6
2010-04-02sched: Remove remaining USER_SCHED codeLi Zefan7-42/+2
2009-12-09capabilities: Use RCU to protect task lookup in sys_capgetThomas Gleixner1-2/+2
2009-11-24remove CONFIG_SECURITY_FILE_CAPABILITIES compile optionSerge E. Hallyn5-87/+2
2009-11-23Silence the existing API for capability version compatibility check.Andrew G. Morgan1-2/+2
2009-10-13capabilities: simplify bound checks for copy_from_user()Arjan van de Ven1-3/+6
2009-01-14[CVE-2009-0029] System call wrappers part 04Heiko Carstens6-13/+11
2009-01-06Merge branch 'next' into for-linusJames Morris26-423/+1229
2009-01-06CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #3]David Howells6-37/+94
2009-01-06Revert "CRED: Fix regression in cap_capable() as shown up by sys_faccessat() ...James Morris9-129/+35
2009-01-05CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #2]David Howells9-35/+129
2009-01-04sanitize audit_log_capset()Al Viro3-36/+21
2008-11-13CRED: Inaugurate COW credentialsDavid Howells41-1239/+1603
2008-11-13CRED: Separate task security context from task_structDavid Howells63-677/+832
2008-11-13CRED: Neuter sys_capset()David Howells6-283/+61
2008-11-11Capabilities: BUG when an invalid capability is requestedEric Paris1-0/+5
2008-11-11When the capset syscall is used it is not possible for audit to record theEric Paris3-0/+63
2008-11-05file capabilities: add no_file_caps switch (v4)Serge E. Hallyn4-0/+21
[next]