Commit Graph

69 Commits (2dd59c26e9336db676956589320f1bc71dc1b2e7)

Author SHA1 Message Date
Eric Paris 12b3052c3e capabilities/syslog: open code cap_syslog logic to fix build failure 14 years ago
Dan Rosenberg eaf06b241b Restrict unprivileged access to kernel syslog 14 years ago
KOSAKI Motohiro b0ae198113 security: remove unused parameter from security_task_setscheduler() 15 years ago
David Howells d7627467b7 Make do_execve() take a const filename pointer 15 years ago
Justin P. Mattock c5b60b5e67 security: whitespace coding style fixes 15 years ago
wzt.wzt@gmail.com 6f262d8e1a Security: Fix the comment of cap_file_mmap() 15 years ago
Kees Cook f40a70861a syslog: clean up needless comment 15 years ago
Kees Cook d78ca3cd73 syslog: use defined constants instead of raw numbers 15 years ago
Kees Cook 002345925e syslog: distinguish between /proc/kmsg and syscalls 15 years ago
Serge E. Hallyn b3a222e52e remove CONFIG_SECURITY_FILE_CAPABILITIES compile option 15 years ago
James Morris 3e1c2515ac security: remove root_plug 16 years ago
Eric Paris 788084aba2 Security/SELinux: seperate lsm specific mmap_min_addr 16 years ago
Eric Paris 9c0d90103c Capabilities: move cap_file_mmap to commoncap.c 16 years ago
Eric Paris a2551df7ec Security/SELinux: seperate lsm specific mmap_min_addr 16 years ago
Eric Paris 7c73875e7d Capabilities: move cap_file_mmap to commoncap.c 16 years ago
Ingo Molnar 9e48858f7d security: rename ptrace_may_access => ptrace_access_check 16 years ago
Serge E. Hallyn 5bf37ec3e0 cap_prctl: don't set error to 0 at 'no_change' 16 years ago
Serge E. Hallyn b5f22a59c0 don't raise all privs on setuid-root file with fE set (v2) 16 years ago
David Howells 3699c53c48 CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #3] 16 years ago
James Morris 29881c4502 Revert "CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #2]" 16 years ago
Al Viro acfa4380ef inode->i_op is never NULL 16 years ago
David Howells 14eaddc967 CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #2] 16 years ago
Eric Paris e50a906e02 capabilities: define get_vfs_caps_from_disk when file caps are not enabled 16 years ago
David Howells 1d045980e1 CRED: Prettify commoncap.c 16 years ago
David Howells a6f76f23d2 CRED: Make execve() take advantage of copy-on-write credentials 16 years ago
David Howells d84f4f992c CRED: Inaugurate COW credentials 16 years ago
David Howells c69e8d9c01 CRED: Use RCU to access another task's creds and to release a task's own creds 16 years ago
David Howells 86a264abe5 CRED: Wrap current->cred and a few other accessors 16 years ago
David Howells b6dff3ec5e CRED: Separate task security context from task_struct 16 years ago
David Howells 15a2460ed0 CRED: Constify the kernel_cap_t arguments to the capset LSM hooks 16 years ago
David Howells 1cdcbec1a3 CRED: Neuter sys_capset() 16 years ago
David Howells b103c59883 CRED: Wrap task credential accesses in the capabilities code 16 years ago
Eric Paris 06112163f5 Add a new capable interface that will be used by systems that use audit to 16 years ago
Eric Paris 3fc689e96c Any time fcaps or a setuid app under SECURE_NOROOT is used to result in a 16 years ago
Eric Paris c0b004413a This patch add a generic cpu endian caps structure and externally available 16 years ago
Serge E. Hallyn 1f29fae297 file capabilities: add no_file_caps switch (v4) 16 years ago
Serge Hallyn 3318a386e4 file caps: always start with clear bprm->caps_* 16 years ago
Serge E. Hallyn de45e806a8 file capabilities: uninline cap_safe_nice 17 years ago
David Howells 5cd9c58fbe security: Fix setting of PF_SUPERPRIV by __capable() 17 years ago
Andrew G. Morgan 5459c164f0 security: protect legacy applications from executing with insufficient privilege 17 years ago
Stephen Smalley 006ebb40d3 Security: split proc ptrace checking into read vs. attach 17 years ago
Andrew G. Morgan 1209726ce9 security: filesystem capabilities: fix CAP_SETPCAP handling 17 years ago
David Howells 8f0cfa52a1 xattr: add missing consts to function arguments 17 years ago
Andrew G. Morgan 3898b1b4eb capabilities: implement per-process securebits 17 years ago
Harvey Harrison dd6f953adb security: replace remaining __FUNCTION__ occurrences 17 years ago
Serge Hallyn aedb60a67c file capabilities: remove cap_task_kill() 17 years ago
Serge E. Hallyn 094972840f file capabilities: simplify signal check 17 years ago
Serge E. Hallyn 3b7391de67 capabilities: introduce per-process capability bounding set 17 years ago
Andrew Morgan e338d263a7 Add 64-bit capability support to the kernel 17 years ago
Andrew Morton 8f6936f4d2 revert "capabilities: clean up file capability reading" 17 years ago