index
:
litmus-rt-imx6.git
chengyangfu
master
wip-mc2
wip-mc2-lvc
wip-mc2-new
wip-mc2-ver2
LITMUS^RT and MC^2 V1 support for the i.MX6 processor family.
Namhoon Kim
about
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
security
/
commoncap.c
Commit message (
Expand
)
Author
Age
*
Merge branch 'next' into for-linus
James Morris
2009-01-06
|
\
|
*
CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #3]
David Howells
2009-01-06
|
*
Revert "CRED: Fix regression in cap_capable() as shown up by sys_faccessat() ...
James Morris
2009-01-06
|
*
CRED: Fix regression in cap_capable() as shown up by sys_faccessat() [ver #2]
David Howells
2009-01-04
*
|
inode->i_op is never NULL
Al Viro
2009-01-05
|
/
*
capabilities: define get_vfs_caps_from_disk when file caps are not enabled
Eric Paris
2008-11-14
*
CRED: Prettify commoncap.c
David Howells
2008-11-13
*
CRED: Make execve() take advantage of copy-on-write credentials
David Howells
2008-11-13
*
CRED: Inaugurate COW credentials
David Howells
2008-11-13
*
CRED: Use RCU to access another task's creds and to release a task's own creds
David Howells
2008-11-13
*
CRED: Wrap current->cred and a few other accessors
David Howells
2008-11-13
*
CRED: Separate task security context from task_struct
David Howells
2008-11-13
*
CRED: Constify the kernel_cap_t arguments to the capset LSM hooks
David Howells
2008-11-13
*
CRED: Neuter sys_capset()
David Howells
2008-11-13
*
CRED: Wrap task credential accesses in the capabilities code
David Howells
2008-11-13
*
Add a new capable interface that will be used by systems that use audit to
Eric Paris
2008-11-11
*
Any time fcaps or a setuid app under SECURE_NOROOT is used to result in a
Eric Paris
2008-11-11
*
This patch add a generic cpu endian caps structure and externally available
Eric Paris
2008-11-11
*
file capabilities: add no_file_caps switch (v4)
Serge E. Hallyn
2008-11-05
*
file caps: always start with clear bprm->caps_*
Serge Hallyn
2008-11-01
*
file capabilities: uninline cap_safe_nice
Serge E. Hallyn
2008-09-27
*
security: Fix setting of PF_SUPERPRIV by __capable()
David Howells
2008-08-14
*
security: protect legacy applications from executing with insufficient privilege
Andrew G. Morgan
2008-07-24
*
Security: split proc ptrace checking into read vs. attach
Stephen Smalley
2008-07-14
*
security: filesystem capabilities: fix CAP_SETPCAP handling
Andrew G. Morgan
2008-07-04
*
xattr: add missing consts to function arguments
David Howells
2008-04-29
*
capabilities: implement per-process securebits
Andrew G. Morgan
2008-04-28
*
security: replace remaining __FUNCTION__ occurrences
Harvey Harrison
2008-04-18
*
file capabilities: remove cap_task_kill()
Serge Hallyn
2008-03-20
*
file capabilities: simplify signal check
Serge E. Hallyn
2008-02-23
*
capabilities: introduce per-process capability bounding set
Serge E. Hallyn
2008-02-05
*
Add 64-bit capability support to the kernel
Andrew Morgan
2008-02-05
*
revert "capabilities: clean up file capability reading"
Andrew Morton
2008-02-05
*
Fix filesystem capability support
Andrew G. Morgan
2008-01-21
*
file capabilities: don't prevent signaling setuid root programs
Serge E. Hallyn
2007-11-29
*
file capabilities: allow sigcont within session
Serge E. Hallyn
2007-11-14
*
capabilities: clean up file capability reading
Serge E. Hallyn
2007-10-22
*
pid namespaces: define is_global_init() and is_container_init()
Serge E. Hallyn
2007-10-19
*
V3 file capabilities: alter behavior of cap_setpcap
Andrew Morgan
2007-10-18
*
security/ cleanups
Adrian Bunk
2007-10-17
*
Implement file posix capabilities
Serge E. Hallyn
2007-10-17
*
security: Convert LSM into a static interface
James Morris
2007-10-17
*
fix NULL pointer dereference in __vm_enough_memory()
Alan Cox
2007-08-22
*
coredump masking: reimplementation of dumpable using two flags
Kawai, Hidehiro
2007-07-19
*
header cleaning: don't include smp_lock.h when not used
Randy Dunlap
2007-05-08
*
[PATCH] pidspace: is_init()
Sukadev Bhattiprolu
2006-09-29
*
Remove obsolete #include <linux/config.h>
Jörn Engel
2006-06-30
*
[NETLINK]: Encapsulate eff_cap usage within security framework.
Darrel Goeddel
2006-06-29
*
[PATCH] make cap_ptrace enforce PTRACE_TRACME checks
Chris Wright
2006-03-25
*
[PATCH] move capable() to capability.h
Randy.Dunlap
2006-01-11
[next]