index
:
platform/kernel/linux-exynos
accepted/tizen_3.0.2015.q2_common
accepted/tizen_3.0.m2_mobile
accepted/tizen_3.0.m2_tv
accepted/tizen_3.0.m2_wearable
accepted/tizen_3.0_common
accepted/tizen_3.0_ivi
accepted/tizen_3.0_mobile
accepted/tizen_3.0_tv
accepted/tizen_3.0_wearable
accepted/tizen_4.0_unified
accepted/tizen_5.0_unified
accepted/tizen_5.5_unified
accepted/tizen_5.5_unified_mobile_hotfix
accepted/tizen_5.5_unified_wearable_hotfix
accepted/tizen_6.0_unified
accepted/tizen_6.0_unified_hotfix
accepted/tizen_6.5_unified
accepted/tizen_7.0_unified
accepted/tizen_7.0_unified_hotfix
accepted/tizen_common
accepted/tizen_ivi
accepted/tizen_mobile
accepted/tizen_tv
accepted/tizen_unified
accepted/tizen_wearable
kdbus-integration
klewandowski/sandbox/kdbus-perf
master
old/tizen_20160405
old/tizen_20160810
old/tizen_20161215
old/tizen_20190328
sandbox/adrians/kdbus-perf
sandbox/ahajda/dev/exynos-drm-local-path
sandbox/akazmin/hwasan_build
sandbox/klewandowski/kdbus-legacy-for-4.14-wip
sandbox/lluba/eas/20171211_0913/v4.14_tizen
sandbox/lluba/eas/20180817/v4.18-rc6
sandbox/lluba/thermal/v4.19/schedpower
sandbox/m.szyprowski/dev/tizen-ipipe
sandbox/m.szyprowski/dev/tizen-next-bluetooth
sandbox/m.szyprowski/tizen-next-ipipe
sandbox/mszyprowski/v4.14-odroid-kvm
sandbox/nmerinov/llvm
tizen
tizen_3.0
tizen_3.0.2015.q2_common
tizen_3.0.m1_mobile
tizen_3.0.m1_tv
tizen_3.0.m2
tizen_3.0_tv
tizen_4.0
tizen_5.0
tizen_5.5
tizen_5.5_mobile_hotfix
tizen_5.5_tv
tizen_5.5_wearable_hotfix
tizen_6.0
tizen_6.0_hotfix
tizen_6.5
tizen_7.0
tizen_7.0_hotfix
upstream/linux-4.1.y
upstream/linux-4.14.y
upstream/mainline
Domain: System / Kernel; Licenses: GPL-2.0;
Inki Dae <inki.dae@samsung.com>
summary
refs
log
tree
commit
diff
log msg
author
committer
range
path:
root
/
security
/
commoncap.c
Age
Commit message (
Expand
)
Author
Files
Lines
2015-04-15
VFS: security/: d_backing_inode() annotations
David Howells
1
-3
/
+3
2015-01-25
file->f_path.dentry is pinned down for as long as the file is open...
Al Viro
1
-5
/
+1
2014-11-19
kill f_dentry uses
Al Viro
1
-1
/
+1
2014-07-24
CAPABILITIES: remove undefined caps from all processes
Eric Paris
1
-0
/
+3
2014-07-24
commoncap: don't alloc the credential unless needed in cap_task_prctl
Tetsuo Handa
1
-42
/
+30
2013-08-30
capabilities: allow nice if we are privileged
Serge Hallyn
1
-4
/
+4
2013-08-30
userns: Allow PR_CAPBSET_DROP in a user namespace.
Eric W. Biederman
1
-1
/
+1
2013-02-26
kill f_vfsmnt
Al Viro
1
-1
/
+1
2012-12-14
Fix cap_capable to only allow owners in the parent user namespace to have caps.
Eric W. Biederman
1
-8
/
+17
2012-05-31
split ->file_mmap() into ->mmap_addr()/->mmap_file()
Al Viro
1
-18
/
+3
2012-05-31
split cap_mmap_addr() out of cap_file_mmap()
Al Viro
1
-9
/
+23
2012-05-23
Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/ebi...
Linus Torvalds
1
-25
/
+36
2012-05-04
Merge tag 'v3.4-rc5' into next
James Morris
1
-0
/
+6
2012-05-03
userns: Convert capabilities related permsion checks
Eric W. Biederman
1
-15
/
+26
2012-05-03
userns: Store uid and gid values in struct cred with kuid_t and kgid_t types
Eric W. Biederman
1
-2
/
+1
2012-04-26
userns: Simplify the user_namespace by making userns->creator a kuid.
Eric W. Biederman
1
-2
/
+3
2012-04-19
security: fix compile error in commoncap.c
Jonghwan Choi
1
-0
/
+1
2012-04-18
fcaps: clear the same personality flags as suid when fcaps are used
Eric Paris
1
-0
/
+5
2012-04-14
Add PR_{GET,SET}_NO_NEW_PRIVS to prevent execve from granting privs
Andy Lutomirski
1
-2
/
+5
2012-04-07
userns: Add an explicit reference to the parent user namespace
Eric W. Biederman
1
-1
/
+1
2012-04-07
userns: Use cred->user_ns instead of cred->user->user_ns
Eric W. Biederman
1
-7
/
+7
2012-02-14
security: trim security.h
Al Viro
1
-0
/
+1
2012-01-14
Merge branch 'for-linus' of git://selinuxproject.org/~jmorris/linux-security
Linus Torvalds
1
-17
/
+7
2012-01-05
security: remove the security_netlink_recv hook as it is equivalent to capable()
Eric Paris
1
-8
/
+0
2012-01-05
capabilities: remove the task from capable LSM hook entirely
Eric Paris
1
-9
/
+7
2011-08-16
capabilities: initialize has_cap
Serge Hallyn
1
-1
/
+1
2011-08-12
capabilities: do not grant full privs for setuid w/ file caps + no effective ...
Zhi Li
1
-6
/
+10
2011-04-04
capabilities: do not special case exec of init
Eric Paris
1
-9
/
+4
2011-03-23
userns: allow ptrace from non-init user namespaces
Serge E. Hallyn
1
-8
/
+32
2011-03-23
userns: security: make capabilities relative to the user namespace
Serge E. Hallyn
1
-7
/
+31
2011-03-16
Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next-2.6
Linus Torvalds
1
-2
/
+1
2011-03-03
netlink: kill eff_cap from struct netlink_skb_parms
Patrick McHardy
1
-2
/
+1
2011-02-02
time: Correct the *settime* parameters
Richard Cochran
1
-1
/
+1
2010-11-15
capabilities/syslog: open code cap_syslog logic to fix build failure
Eric Paris
1
-21
/
+0
2010-11-12
Restrict unprivileged access to kernel syslog
Dan Rosenberg
1
-0
/
+2
2010-10-21
security: remove unused parameter from security_task_setscheduler()
KOSAKI Motohiro
1
-4
/
+1
2010-08-17
Make do_execve() take a const filename pointer
David Howells
1
-1
/
+1
2010-04-23
security: whitespace coding style fixes
Justin P. Mattock
1
-2
/
+2
2010-04-20
Security: Fix the comment of cap_file_mmap()
wzt.wzt@gmail.com
1
-1
/
+1
2010-02-05
syslog: clean up needless comment
Kees Cook
1
-1
/
+0
2010-02-04
syslog: use defined constants instead of raw numbers
Kees Cook
1
-2
/
+3
2010-02-04
syslog: distinguish between /proc/kmsg and syscalls
Kees Cook
1
-1
/
+6
2009-11-24
remove CONFIG_SECURITY_FILE_CAPABILITIES compile option
Serge E. Hallyn
1
-70
/
+2
2009-10-20
security: remove root_plug
James Morris
1
-1
/
+1
2009-08-06
Security/SELinux: seperate lsm specific mmap_min_addr
Eric Paris
1
-1
/
+1
2009-08-06
Capabilities: move cap_file_mmap to commoncap.c
Eric Paris
1
-0
/
+30
2009-06-25
security: rename ptrace_may_access => ptrace_access_check
Ingo Molnar
1
-2
/
+2
2009-05-08
Merge branch 'master' into next
James Morris
1
-1
/
+0
2009-04-09
cap_prctl: don't set error to 0 at 'no_change'
Serge E. Hallyn
1
-1
/
+0
2009-04-03
don't raise all privs on setuid-root file with fE set (v2)
Serge E. Hallyn
1
-0
/
+32
[next]