<feed xmlns='http://www.w3.org/2005/Atom'>
<title>user/sven/linux.git/kernel/capability.c, branch v2.6.12.2</title>
<subtitle>Linux Kernel
</subtitle>
<id>https://git.stealer.net/cgit.cgi/user/sven/linux.git/atom?h=v2.6.12.2</id>
<link rel='self' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/atom?h=v2.6.12.2'/>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/'/>
<updated>2005-03-12T00:40:56Z</updated>
<entry>
<title>[PATCH] Make lots of things static</title>
<updated>2005-03-12T00:40:56Z</updated>
<author>
<name>Adrian Bunk</name>
<email>bunk@stusta.de</email>
</author>
<published>2005-03-12T00:40:56Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=9d340cb7c38e0872b742890d76190cc3ac3cfd50'/>
<id>urn:sha1:9d340cb7c38e0872b742890d76190cc3ac3cfd50</id>
<content type='text'>
This is a megarollup of ~60 patches which give various things static scope.

Signed-off-by: Adrian Bunk &lt;bunk@stusta.de&gt;
Signed-off-by: Andrew Morton &lt;akpm@osdl.org&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@osdl.org&gt;
</content>
</entry>
<entry>
<title>[PATCH] Lock initializer cleanup (Core)</title>
<updated>2005-01-08T06:09:06Z</updated>
<author>
<name>Thomas Gleixner</name>
<email>tglx@linutronix.de</email>
</author>
<published>2005-01-08T06:09:06Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=44b7f61e2868c2d4895c93b0d3382389a7a66f6b'/>
<id>urn:sha1:44b7f61e2868c2d4895c93b0d3382389a7a66f6b</id>
<content type='text'>
Kernel core files converted to use the new lock initializers.

Signed-off-by: Thomas Gleixner &lt;tglx@linutronix.de&gt;
Acked-by: Ingo Molnar &lt;mingo@elte.hu&gt;
Signed-off-by: Andrew Morton &lt;akpm@osdl.org&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@osdl.org&gt;
</content>
</entry>
<entry>
<title>[PATCH] capset returns -EPERM when pid==current-&gt;pid</title>
<updated>2005-01-04T13:10:06Z</updated>
<author>
<name>Serge Hallyn</name>
<email>serue@us.ibm.com</email>
</author>
<published>2005-01-04T13:10:06Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=5d4e51371c28ccdb531abc2b0e95f1cef03f19e9'/>
<id>urn:sha1:5d4e51371c28ccdb531abc2b0e95f1cef03f19e9</id>
<content type='text'>
In the current kernel/capability.c:sys_capset() code, permission is
denied if CAP_SETPCAP is not held and pid is positive.  pid=0 means use
the current process, and this is allowed.  But using the current
process' pid is not allowed.  The man page for capsetp simply says that
CAP_SETPCAP is required to use this function, and does not mention the
exception for pid=0. 

The current behavior seems inconsistent.  The attached patch also
allows a process to call capset() on itself.

Signed-off-by: Chris Wright &lt;chrisw@osdl.org&gt;
Signed-off-by: Andrew Morton &lt;akpm@osdl.org&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@osdl.org&gt;
</content>
</entry>
<entry>
<title>[PATCH] properly split capset_check+capset_set</title>
<updated>2005-01-04T13:09:53Z</updated>
<author>
<name>Serge Hallyn</name>
<email>serue@us.ibm.com</email>
</author>
<published>2005-01-04T13:09:53Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=2cf17bf6b5857ff2216931f4850cdd33ca2aab11'/>
<id>urn:sha1:2cf17bf6b5857ff2216931f4850cdd33ca2aab11</id>
<content type='text'>
The attached patch removes checks from kernel/capability.c which are
redundant with cap_capset_check() code, and moves the capset_check() calls
to immediately before the capset_set() calls.  This allows capset_check()
to accurately check the setter's permission to set caps on the target.
Please apply.

Signed-off-by: Serge Hallyn &lt;serue@us.ibm.com&gt;
Signed-off-by: Chris Wright &lt;chrisw@osdl.org&gt;
Signed-off-by:  Stephen Smalley &lt;sds@epoch.ncsc.mil&gt;
Signed-off-by: Andrew Morton &lt;akpm@osdl.org&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@osdl.org&gt;
</content>
</entry>
<entry>
<title>[PATCH] add missing linux/syscalls.h includes</title>
<updated>2004-10-18T15:54:02Z</updated>
<author>
<name>Arnd Bergmann</name>
<email>arnd@arndb.de</email>
</author>
<published>2004-10-18T15:54:02Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=09b9135c6e9950c0f12e3e6993ae52ab1baf0476'/>
<id>urn:sha1:09b9135c6e9950c0f12e3e6993ae52ab1baf0476</id>
<content type='text'>
I found that the prototypes for sys_waitid and sys_fcntl in
&lt;linux/syscalls.h&gt; don't match the implementation.  In order to keep all
prototypes in sync in the future, now include the header from each file
implementing any syscall.

Signed-off-by: Arnd Bergmann &lt;arnd@arndb.de&gt;
Signed-off-by: Andrew Morton &lt;akpm@osdl.org&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@osdl.org&gt;
</content>
</entry>
<entry>
<title>[PATCH] fixed pidhashing patch</title>
<updated>2004-09-02T07:42:48Z</updated>
<author>
<name>Kirill Korotaev</name>
<email>kksx@mail.ru</email>
</author>
<published>2004-09-02T07:42:48Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=37cbd41da09cb39c9896c04ed8baac7526bb9547'/>
<id>urn:sha1:37cbd41da09cb39c9896c04ed8baac7526bb9547</id>
<content type='text'>
This patch fixes strange and obscure pid implementation in current kernels:
- it removes calling of put_task_struct() from detach_pid()
  under tasklist_lock. This allows to use blocking calls
  in security_task_free() hooks (in __put_task_struct()).
- it saves some space = 5*5 ints = 100 bytes in task_struct
- it's smaller and tidy, more straigthforward and doesn't use
  any knowledge about pids using and assignment.
- it removes pid_links and pid_struct doesn't hold reference counters
  on task_struct. instead, new pid_structs and linked altogether and
  only one of them is inserted in hash_list.

Signed-off-by: Kirill Korotaev (kksx@mail.ru)
Signed-off-by: William Irwin &lt;wli@holomorphy.com&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@osdl.org&gt;
</content>
</entry>
<entry>
<title>o kernel/ksyms.c: move remaining EXPORT_SYMBOLs, remove this file from the tree</title>
<updated>2003-10-07T20:54:04Z</updated>
<author>
<name>Arnaldo Carvalho de Melo</name>
<email>acme@conectiva.com.br</email>
</author>
<published>2003-10-07T20:54:04Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=ff08f6fe935ff0854990421e80d04c39c7c2a15a'/>
<id>urn:sha1:ff08f6fe935ff0854990421e80d04c39c7c2a15a</id>
<content type='text'>
</content>
</entry>
<entry>
<title>[PATCH] converting cap_set_pg() to for_each_task_pid()</title>
<updated>2002-12-18T06:58:27Z</updated>
<author>
<name>William Lee Irwin III</name>
<email>wli@holomorphy.com</email>
</author>
<published>2002-12-18T06:58:27Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=36d03f0b762df2e9ab98e9b12d8880b3d8063719'/>
<id>urn:sha1:36d03f0b762df2e9ab98e9b12d8880b3d8063719</id>
<content type='text'>
cap_set_pg() wants to find all processes in a given process group. This
converts it to use for_each_task_pid().
</content>
</entry>
<entry>
<title>Merge</title>
<updated>2002-11-24T07:31:02Z</updated>
<author>
<name>Greg Kroah-Hartman</name>
<email>greg@kroah.com</email>
</author>
<published>2002-11-24T07:31:02Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=c0db5d6f9fc805f7d7e1d369b00eb130c1d2353e'/>
<id>urn:sha1:c0db5d6f9fc805f7d7e1d369b00eb130c1d2353e</id>
<content type='text'>
</content>
</entry>
<entry>
<title>[PATCH] remove duplicated assignment from sys_capget.</title>
<updated>2002-11-19T11:01:48Z</updated>
<author>
<name>Chris Wright</name>
<email>chris@wirex.com</email>
</author>
<published>2002-11-19T11:01:48Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=a879e2fdb6836ca3028b3ca8c11e397b0f8b688b'/>
<id>urn:sha1:a879e2fdb6836ca3028b3ca8c11e397b0f8b688b</id>
<content type='text'>
This removes the code from cap_sysget that fills out the capability set
being returned to userspace.  The module handles this in a policy
specific way.  This updates the dummy.c module to fill in return data
according to superuser policy, and also disables setting capabilities in
superuser policy.
</content>
</entry>
</feed>
