index
:
op-kernel-dev
raptor-dma-dev-4.18-pre
raptor-dma-dev-current
Development kernel branch for OpenPOWER systems
Raptor Engineering, LLC
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
net
/
core
/
scm.c
Commit message (
Expand
)
Author
Age
Files
Lines
*
net: introduce helper macro for_each_cmsghdr
Gu Zheng
2014-12-10
1
-2
/
+1
*
Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/ebi...
Linus Torvalds
2013-09-07
1
-2
/
+2
|
\
|
*
userns: Kill nsown_capable it makes the wrong thing easy
Eric W. Biederman
2013-08-30
1
-2
/
+2
*
|
net: Check the correct namespace when spoofing pid over SCM_RIGHTS
Andy Lutomirski
2013-08-27
1
-1
/
+1
|
/
*
netprio_cgroup: remove task_struct parameter from sock_update_netprio()
Zefan Li
2013-04-09
1
-1
/
+1
*
cls_cgroup: remove task_struct parameter from sock_update_classid()
Zefan Li
2013-04-09
1
-1
/
+1
*
scm: Stop passing struct cred
Eric W. Biederman
2013-04-07
1
-16
/
+0
*
scm: Require CAP_SYS_ADMIN over the current pidns to spoof pids.
Eric W. Biederman
2013-03-17
1
-1
/
+3
*
net: net_cls: fd passed in SCM_RIGHTS datagram not set correctly
Daniel Wagner
2013-01-22
1
-1
/
+4
*
net: Allow userns root to force the scm creds
Eric W. Biederman
2012-11-18
1
-3
/
+3
*
Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/vir...
Linus Torvalds
2012-10-02
1
-2
/
+1
|
\
|
*
make get_file() return its argument
Al Viro
2012-09-26
1
-2
/
+1
*
|
scm: Don't use struct ucred in NETLINK_CB and struct scm_cookie.
Eric W. Biederman
2012-09-07
1
-6
/
+11
*
|
Merge branch 'for-next' of git://git.kernel.org/pub/scm/linux/kernel/git/ebie...
David S. Miller
2012-08-24
1
-8
/
+23
|
\
\
|
|
/
|
/
|
|
*
userns: Convert net/core/scm.c to use kuids and kgids
Eric W. Biederman
2012-08-14
1
-8
/
+23
*
|
net: netprio: fd passed in SCM_RIGHTS datagram not set correctly
John Fastabend
2012-08-16
1
-0
/
+4
|
/
*
get rid of ->scm_work_list
Al Viro
2012-07-22
1
-19
/
+3
*
Remove all #inclusions of asm/system.h
David Howells
2012-03-28
1
-1
/
+0
*
af_unix: dont send SCM_CREDENTIALS by default
Eric Dumazet
2011-09-28
1
-4
/
+6
*
scm: Capture the full credentials of the scm sender
Tim Chen
2011-08-11
1
-1
/
+1
*
Allow passing O_PATH descriptors via SCM_RIGHTS datagrams
Al Viro
2011-03-15
1
-1
/
+1
*
scm: lower SCM_MAX_FD
Eric Dumazet
2010-11-24
1
-4
/
+6
*
net/core: EXPORT_SYMBOL cleanups
Eric Dumazet
2010-07-12
1
-5
/
+4
*
scm: Capture the full credentials of the scm sender.
Eric W. Biederman
2010-06-16
1
-0
/
+24
*
include cleanup: Update gfp.h and slab.h includes to prepare for breaking imp...
Tejun Heo
2010-03-30
1
-0
/
+1
*
scm: Only support SCM_RIGHTS on unix domain sockets.
Eric W. Biederman
2010-02-28
1
-0
/
+2
*
Merge branch 'master' into next
James Morris
2008-11-18
1
-2
/
+0
|
\
|
*
scm: fix scm_fp_list->list initialization made in wrong place
Pavel Emelyanov
2008-11-14
1
-2
/
+0
*
|
Merge branch 'master' into next
James Morris
2008-11-14
1
-3
/
+21
|
\
\
|
|
/
|
*
net: Fix recursive descent in __scm_destroy().
David Miller
2008-11-06
1
-3
/
+21
*
|
CRED: Wrap current->cred and a few other accessors
David Howells
2008-11-14
1
-1
/
+1
*
|
CRED: Separate task security context from task_struct
David Howells
2008-11-14
1
-4
/
+6
*
|
CRED: Wrap task credential accesses in the networking subsystem
David Howells
2008-11-14
1
-4
/
+4
|
/
*
[NET]: Fix function put_cmsg() which may cause usr application memory overflow
Wei Yongjun
2007-12-20
1
-0
/
+2
*
pid namespaces: changes to show virtual ids to user
Pavel Emelyanov
2007-10-19
1
-1
/
+3
*
[NET]: sparse warning fixes
Stephen Hemminger
2007-10-10
1
-3
/
+6
*
O_CLOEXEC for SCM_RIGHTS
Ulrich Drepper
2007-07-16
1
-1
/
+2
*
[NET] CORE: Fix whitespace errors.
YOSHIFUJI Hideaki
2007-02-10
1
-6
/
+6
*
[NET]: File descriptor loss while receiving SCM_RIGHTS
Miklos Szeredi
2006-10-11
1
-2
/
+1
*
[PATCH] capable/capability.h (net/)
Randy Dunlap
2006-01-11
1
-0
/
+1
*
[PATCH] kill gratitious includes of major.h under net/*
Al Viro
2005-04-25
1
-1
/
+0
*
Linux-2.6.12-rc2
v2.6.12-rc2
Linus Torvalds
2005-04-16
1
-0
/
+291