Gitiles
Code Review
Sign In
gerrit-public.fairphone.software
/
kernel
/
msm-4.19
/
8fd9e4883a2b08c52ec00f3c214b45d096fc697a
/
security
/
commoncap.c
746bf6d
capabilities: add a securebit to disable PR_CAP_AMBIENT_RAISE
by Andy Lutomirski
· 9 years ago
5831905
capabilities: ambient capabilities
by Andy Lutomirski
· 9 years ago
b1d9e6b
LSM: Switch to lists of hooks
by Casey Schaufler
· 10 years ago
c6f493d
VFS: security/: d_backing_inode() annotations
by David Howells
· 10 years ago
f4a4a8b
file->f_path.dentry is pinned down for as long as the file is open...
by Al Viro
· 10 years ago
b583043
kill f_dentry uses
by Al Viro
· 10 years ago
7d8b6c6
CAPABILITIES: remove undefined caps from all processes
by Eric Paris
· 10 years ago
6d6f332
commoncap: don't alloc the credential unless needed in cap_task_prctl
by Tetsuo Handa
· 10 years ago
f54fb86
capabilities: allow nice if we are privileged
by Serge Hallyn
· 11 years ago
160da84
userns: Allow PR_CAPBSET_DROP in a user namespace.
by Eric W. Biederman
· 11 years ago
182be68
kill f_vfsmnt
by Al Viro
· 12 years ago
520d9eab
Fix cap_capable to only allow owners in the parent user namespace to have caps.
by Eric W. Biederman
· 12 years ago
e546785
split ->file_mmap() into ->mmap_addr()/->mmap_file()
by Al Viro
· 12 years ago
d007794
split cap_mmap_addr() out of cap_file_mmap()
by Al Viro
· 12 years ago
644473e
Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/ebiederm/user-namespace
by Linus Torvalds
· 13 years ago
898bfc1
Merge tag 'v3.4-rc5' into next
by James Morris
· 13 years ago
18815a1
userns: Convert capabilities related permsion checks
by Eric W. Biederman
· 13 years ago
078de5f
userns: Store uid and gid values in struct cred with kuid_t and kgid_t types
by Eric W. Biederman
· 13 years ago
783291e
userns: Simplify the user_namespace by making userns->creator a kuid.
by Eric W. Biederman
· 13 years ago
51b79be
security: fix compile error in commoncap.c
by Jonghwan Choi
· 13 years ago
d52fc5d
fcaps: clear the same personality flags as suid when fcaps are used
by Eric Paris
· 13 years ago
259e5e6
Add PR_{GET,SET}_NO_NEW_PRIVS to prevent execve from granting privs
by Andy Lutomirski
· 13 years ago
aeb3ae9
userns: Add an explicit reference to the parent user namespace
by Eric W. Biederman
· 13 years ago
c4a4d60
userns: Use cred->user_ns instead of cred->user->user_ns
by Eric W. Biederman
· 13 years ago
4040153
security: trim security.h
by Al Viro
· 13 years ago
c49c41a
Merge branch 'for-linus' of git://selinuxproject.org/~jmorris/linux-security
by Linus Torvalds
· 13 years ago
fd77846
security: remove the security_netlink_recv hook as it is equivalent to capable()
by Eric Paris
· 13 years ago
6a9de49
capabilities: remove the task from capable LSM hook entirely
by Eric Paris
· 13 years ago
7d8db18
capabilities: initialize has_cap
by Serge Hallyn
· 13 years ago
4d49f67
capabilities: do not grant full privs for setuid w/ file caps + no effective caps
by Zhi Li
· 13 years ago
4bf2ea7
capabilities: do not special case exec of init
by Eric Paris
· 14 years ago
8409cca
userns: allow ptrace from non-init user namespaces
by Serge E. Hallyn
· 14 years ago
3486740
userns: security: make capabilities relative to the user namespace
by Serge E. Hallyn
· 14 years ago
7a63628
Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next-2.6
by Linus Torvalds
· 14 years ago
01a16b2
netlink: kill eff_cap from struct netlink_skb_parms
by Patrick McHardy
· 14 years ago
1e6d767
time: Correct the *settime* parameters
by Richard Cochran
· 14 years ago
12b3052
capabilities/syslog: open code cap_syslog logic to fix build failure
by Eric Paris
· 14 years ago
eaf06b2
Restrict unprivileged access to kernel syslog
by Dan Rosenberg
· 14 years ago
b0ae198
security: remove unused parameter from security_task_setscheduler()
by KOSAKI Motohiro
· 14 years ago
d762746
Make do_execve() take a const filename pointer
by David Howells
· 14 years ago
c5b60b5
security: whitespace coding style fixes
by Justin P. Mattock
· 15 years ago
6f262d8
Security: Fix the comment of cap_file_mmap()
by wzt.wzt@gmail.com
· 15 years ago
f40a708
syslog: clean up needless comment
by Kees Cook
· 15 years ago
d78ca3c
syslog: use defined constants instead of raw numbers
by Kees Cook
· 15 years ago
0023459
syslog: distinguish between /proc/kmsg and syscalls
by Kees Cook
· 15 years ago
b3a222e
remove CONFIG_SECURITY_FILE_CAPABILITIES compile option
by Serge E. Hallyn
· 15 years ago
3e1c251
security: remove root_plug
by James Morris
· 15 years ago
a2551df
Security/SELinux: seperate lsm specific mmap_min_addr
by Eric Paris
· 15 years ago
7c73875
Capabilities: move cap_file_mmap to commoncap.c
by Eric Paris
· 15 years ago
9e48858
security: rename ptrace_may_access => ptrace_access_check
by Ingo Molnar
· 16 years ago
d254117
Merge branch 'master' into next
by James Morris
· 16 years ago
5bf37ec
cap_prctl: don't set error to 0 at 'no_change'
by Serge E. Hallyn
· 16 years ago
b5f22a5
don't raise all privs on setuid-root file with fE set (v2)
by Serge E. Hallyn
· 16 years ago
ac8cc0f
Merge branch 'next' into for-linus
by James Morris
· 16 years ago
3699c53
CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #3]
by David Howells
· 16 years ago
29881c4
Revert "CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #2]"
by James Morris
· 16 years ago
acfa438
inode->i_op is never NULL
by Al Viro
· 16 years ago
14eaddc
CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #2]
by David Howells
· 16 years ago
e50a906
capabilities: define get_vfs_caps_from_disk when file caps are not enabled
by Eric Paris
· 16 years ago
1d04598
CRED: Prettify commoncap.c
by David Howells
· 16 years ago
a6f76f2
CRED: Make execve() take advantage of copy-on-write credentials
by David Howells
· 16 years ago
d84f4f9
CRED: Inaugurate COW credentials
by David Howells
· 16 years ago
c69e8d9
CRED: Use RCU to access another task's creds and to release a task's own creds
by David Howells
· 16 years ago
86a264a
CRED: Wrap current->cred and a few other accessors
by David Howells
· 16 years ago
b6dff3e
CRED: Separate task security context from task_struct
by David Howells
· 16 years ago
15a2460
CRED: Constify the kernel_cap_t arguments to the capset LSM hooks
by David Howells
· 16 years ago
1cdcbec
CRED: Neuter sys_capset()
by David Howells
· 16 years ago
b103c59
CRED: Wrap task credential accesses in the capabilities code
by David Howells
· 16 years ago
0611216
Add a new capable interface that will be used by systems that use audit to
by Eric Paris
· 16 years ago
3fc689e
Any time fcaps or a setuid app under SECURE_NOROOT is used to result in a
by Eric Paris
· 16 years ago
c0b0044
This patch add a generic cpu endian caps structure and externally available
by Eric Paris
· 16 years ago
1f29fae
file capabilities: add no_file_caps switch (v4)
by Serge E. Hallyn
· 16 years ago
3318a38
file caps: always start with clear bprm->caps_*
by Serge Hallyn
· 16 years ago
de45e80
file capabilities: uninline cap_safe_nice
by Serge E. Hallyn
· 16 years ago
5cd9c58
security: Fix setting of PF_SUPERPRIV by __capable()
by David Howells
· 16 years ago
5459c16
security: protect legacy applications from executing with insufficient privilege
by Andrew G. Morgan
· 16 years ago
006ebb4
Security: split proc ptrace checking into read vs. attach
by Stephen Smalley
· 17 years ago
1209726
security: filesystem capabilities: fix CAP_SETPCAP handling
by Andrew G. Morgan
· 16 years ago
8f0cfa5
xattr: add missing consts to function arguments
by David Howells
· 17 years ago
3898b1b
capabilities: implement per-process securebits
by Andrew G. Morgan
· 17 years ago
dd6f953
security: replace remaining __FUNCTION__ occurrences
by Harvey Harrison
· 17 years ago
aedb60a
file capabilities: remove cap_task_kill()
by Serge Hallyn
· 17 years ago
0949728
file capabilities: simplify signal check
by Serge E. Hallyn
· 17 years ago
3b7391d
capabilities: introduce per-process capability bounding set
by Serge E. Hallyn
· 17 years ago
e338d26
Add 64-bit capability support to the kernel
by Andrew Morgan
· 17 years ago
8f6936f
revert "capabilities: clean up file capability reading"
by Andrew Morton
· 17 years ago
a6dbb1e
Fix filesystem capability support
by Andrew G. Morgan
· 17 years ago
8ec2328
file capabilities: don't prevent signaling setuid root programs
by Serge E. Hallyn
· 17 years ago
91ad997
file capabilities: allow sigcont within session
by Serge E. Hallyn
· 17 years ago
b68680e
capabilities: clean up file capability reading
by Serge E. Hallyn
· 17 years ago
b460cbc
pid namespaces: define is_global_init() and is_container_init()
by Serge E. Hallyn
· 17 years ago
72c2d58
V3 file capabilities: alter behavior of cap_setpcap
by Andrew Morgan
· 17 years ago
cbfee34
security/ cleanups
by Adrian Bunk
· 17 years ago
b537677
Implement file posix capabilities
by Serge E. Hallyn
· 17 years ago
20510f2
security: Convert LSM into a static interface
by James Morris
· 17 years ago
34b4e4a
fix NULL pointer dereference in __vm_enough_memory()
by Alan Cox
· 17 years ago
6c5d523
coredump masking: reimplementation of dumpable using two flags
by Kawai, Hidehiro
· 17 years ago
e63340a
header cleaning: don't include smp_lock.h when not used
by Randy Dunlap
· 18 years ago
f400e19
[PATCH] pidspace: is_init()
by Sukadev Bhattiprolu
· 18 years ago
6ab3d56
Remove obsolete #include <linux/config.h>
by Jörn Engel
· 18 years ago
Next »