linux_dsm_epyc7002/security/smack
Casey Schaufler f28e783ff6 Smack: Use cap_capable in privilege check
Use cap_capable() rather than capable() in the Smack privilege
check as the former does not invoke other security module
privilege check, while the later does. This becomes important
when stacking. It may be a problem even with minor modules.

Signed-off-by: Casey Schaufler <casey@schaufler-ca.com>
2017-06-01 09:27:21 -07:00
..
Kconfig Smack: Signal delivery as an append operation 2016-09-08 13:22:56 -07:00
Makefile Smack: Repair netfilter dependency 2015-01-23 10:08:19 -08:00
smack_access.c Smack: Use cap_capable in privilege check 2017-06-01 09:27:21 -07:00
smack_lsm.c Smack: Safer check for a socket in file_receive 2017-06-01 09:27:12 -07:00
smack_netfilter.c smack: use pernet operations for hook registration 2017-06-01 09:26:43 -07:00
smack.h Smack: Use cap_capable in privilege check 2017-06-01 09:27:21 -07:00
smackfs.c fs: constify tree_descr arrays passed to simple_fill_super() 2017-04-26 23:54:06 -04:00