index
:
platform/kernel/linux-3.10
accepted/tizen_3.0.2014.q3_common
accepted/tizen_3.0.2015.q2_common
accepted/tizen_common
accepted/tizen_ivi
accepted/tizen_mobile
accepted/tizen_tv
accepted/tizen_wearable
devel/aarch64
devel/tizen
devel/v3.10-ltsi
dmafence
kdbus-integration
master
sandbox/cometzero/tizen
sandbox/cosmichobo/tizen
sandbox/daeinki/tizen
sandbox/hwhwang7/tizen
sandbox/mchehab/tizen-media-backports
sandbox/mwereski/kdbus-integration
sandbox/pawelo/kdbus-next-wip
sandbox/pawelo/kdbus-next-wip-next
sandbox/pawelo/kdbus-v4-backport
sandbox/pawelo/kernfs
sandbox/pawelo/kernfs_better
sandbox/pawelo/sysfs
sandbox/pcoval/tizen
tizen
tizen-rebase-20140515
tizen_3.0.2014.q3_common
tizen_3.0.2014.q4_common
tizen_3.0.2015.q1_common
tizen_3.0.2015.q2_common
tizen_3.0.m1_mobile
tizen_3.0.m1_tv
tizen_LPD
upstream
v3.10.51-integration
v3.10.52-integration
v3.10.60-rebase
Domain: System / Kernel;
Inki Dae <inki.dae@samsung.com>
summary
refs
log
tree
commit
diff
log msg
author
committer
range
path:
root
/
security
/
commoncap.c
Age
Commit message (
Expand
)
Author
Files
Lines
2008-11-15
capabilities: define get_vfs_caps_from_disk when file caps are not enabled
Eric Paris
1
-0
/
+6
2008-11-14
CRED: Prettify commoncap.c
David Howells
1
-52
/
+248
2008-11-14
CRED: Make execve() take advantage of copy-on-write credentials
David Howells
1
-76
/
+76
2008-11-14
CRED: Inaugurate COW credentials
David Howells
1
-140
/
+125
2008-11-14
CRED: Use RCU to access another task's creds and to release a task's own creds
David Howells
1
-24
/
+40
2008-11-14
CRED: Wrap current->cred and a few other accessors
David Howells
1
-1
/
+1
2008-11-14
CRED: Separate task security context from task_struct
David Howells
1
-76
/
+85
2008-11-14
CRED: Constify the kernel_cap_t arguments to the capset LSM hooks
David Howells
1
-4
/
+6
2008-11-14
CRED: Neuter sys_capset()
David Howells
1
-21
/
+8
2008-11-14
CRED: Wrap task credential accesses in the capabilities code
David Howells
1
-12
/
+18
2008-11-11
Add a new capable interface that will be used by systems that use audit to
Eric Paris
1
-4
/
+4
2008-11-11
Any time fcaps or a setuid app under SECURE_NOROOT is used to result in a
Eric Paris
1
-1
/
+22
2008-11-11
This patch add a generic cpu endian caps structure and externally available
Eric Paris
1
-58
/
+71
2008-11-06
file capabilities: add no_file_caps switch (v4)
Serge E. Hallyn
1
-0
/
+3
2008-11-01
file caps: always start with clear bprm->caps_*
Serge Hallyn
1
-3
/
+3
2008-09-27
file capabilities: uninline cap_safe_nice
Serge E. Hallyn
1
-1
/
+1
2008-08-14
security: Fix setting of PF_SUPERPRIV by __capable()
David Howells
1
-7
/
+17
2008-07-24
security: protect legacy applications from executing with insufficient privilege
Andrew G. Morgan
1
-49
/
+59
2008-07-14
Security: split proc ptrace checking into read vs. attach
Stephen Smalley
1
-1
/
+2
2008-07-04
security: filesystem capabilities: fix CAP_SETPCAP handling
Andrew G. Morgan
1
-3
/
+10
2008-04-29
xattr: add missing consts to function arguments
David Howells
1
-3
/
+3
2008-04-28
capabilities: implement per-process securebits
Andrew G. Morgan
1
-9
/
+94
2008-04-18
security: replace remaining __FUNCTION__ occurrences
Harvey Harrison
1
-2
/
+2
2008-03-20
file capabilities: remove cap_task_kill()
Serge Hallyn
1
-40
/
+0
2008-02-23
file capabilities: simplify signal check
Serge E. Hallyn
1
-1
/
+1
2008-02-05
capabilities: introduce per-process capability bounding set
Serge E. Hallyn
1
-17
/
+27
2008-02-05
Add 64-bit capability support to the kernel
Andrew Morgan
1
-30
/
+57
2008-02-05
revert "capabilities: clean up file capability reading"
Andrew Morton
1
-15
/
+8
2008-01-21
Fix filesystem capability support
Andrew G. Morgan
1
-3
/
+10
2007-11-29
file capabilities: don't prevent signaling setuid root programs
Serge E. Hallyn
1
-0
/
+9
2007-11-14
file capabilities: allow sigcont within session
Serge E. Hallyn
1
-0
/
+4
2007-10-22
capabilities: clean up file capability reading
Serge E. Hallyn
1
-8
/
+15
2007-10-19
pid namespaces: define is_global_init() and is_container_init()
Serge E. Hallyn
1
-1
/
+2
2007-10-18
V3 file capabilities: alter behavior of cap_setpcap
Andrew Morgan
1
-5
/
+54
2007-10-17
security/ cleanups
Adrian Bunk
1
-21
/
+0
2007-10-17
Implement file posix capabilities
Serge E. Hallyn
1
-16
/
+228
2007-10-17
security: Convert LSM into a static interface
James Morris
1
-3
/
+0
2007-08-22
fix NULL pointer dereference in __vm_enough_memory()
Alan Cox
1
-2
/
+2
2007-07-19
coredump masking: reimplementation of dumpable using two flags
Kawai, Hidehiro
1
-1
/
+1
2007-05-08
header cleaning: don't include smp_lock.h when not used
Randy Dunlap
1
-1
/
+0
2006-09-29
[PATCH] pidspace: is_init()
Sukadev Bhattiprolu
1
-1
/
+1
2006-06-30
Remove obsolete #include <linux/config.h>
Jörn Engel
1
-1
/
+0
2006-06-29
[NETLINK]: Encapsulate eff_cap usage within security framework.
Darrel Goeddel
1
-2
/
+2
2006-03-25
[PATCH] make cap_ptrace enforce PTRACE_TRACME checks
Chris Wright
1
-2
/
+2
2006-01-11
[PATCH] move capable() to capability.h
Randy.Dunlap
1
-0
/
+1
2005-06-23
[PATCH] setuid core dump
Alan Cox
1
-1
/
+1
2005-04-16
Linux-2.6.12-rc2
v2.6.12-rc2
Linus Torvalds
1
-0
/
+345