First  |  Prev |  Next  |  Last
Pages: 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851 852 853 854
[PATCH] acer-wmi: set permissions on interface file to S_IRUGO
The interface file is not writable, thus set permissions to S_IRUGO. Signed-off-by: Axel Lin <axel.lin(a)gmail.com> --- drivers/platform/x86/acer-wmi.c | 3 +-- 1 files changed, 1 insertions(+), 2 deletions(-) diff --git a/drivers/platform/x86/acer-wmi.c b/drivers/platform/x86/acer-wmi.c index 1415d97..fe7c... 29 Jun 2010 22:54
HID: picolcd: fix deferred_io init/cleanup to (un)register_framebuffer ordering
On Tue, Jun 29, 2010 at 4:29 AM, Bruno Pr�mont <bonbons(a)linux-vserver.org> wrote: We need to call fb_deferred_io_init() before we register_framebuffer() as otherwise, in case fbcon uses our framebuffer, we will get a BUG() because in picolcd_fb_imageblit() we schedule defio which has not been initialized y... 29 Jun 2010 22:54
Add a pair of system calls to make extended file stats available [ver #2]
On Wed, 2010-06-30 at 02:17 +0100, David Howells wrote: Add a pair of system calls to make extended file stats available, including file creation time, inode version and data version where available through the underlying filesystem: struct xstat_dev { unsigned int major; unsigned int minor; ... 29 Jun 2010 22:54
[PATCH 0/3] Extended file stat functions [ver #2]
Implement a pair of new system calls to provide extended and further extensible stat functions. The third of the associated patches provides these new system calls: struct xstat_dev { unsigned int major; unsigned int minor; }; struct xstat_time { unsigned long long tv_sec; unsigned long long t... 29 Jun 2010 21:48
[PATCH 2/3] AFS: Use i_generation not i_version for the vnode uniquifier [ver #2]
Store the AFS vnode uniquifier in the i_generation field, not the i_version field of the inode struct. i_version can then be given the AFS data version number. Signed-off-by: David Howells <dhowells(a)redhat.com> --- fs/afs/dir.c | 8 ++++---- fs/afs/fsclient.c | 3 ++- fs/afs/inode.c | 10 ++... 29 Jun 2010 21:48
Yama: add PTRACE exception tracking
Kees Cook wrote: +static spinlock_t ptracer_relations_lock; static DEFINE_SPINLOCK(ptracer_relations_lock); +static int yama_ptracer_add(struct task_struct *tracer, + struct task_struct *tracee) +{ + struct ptrace_relation *relation; + + relation = kzalloc(sizeof(*relation), GFP_KERNEL); ... 1 Jul 2010 16:42
x86: enlightenment for ticket spin locks - eliminate NOPs introduced by first patch
On 06/29/2010 07:33 AM, Jan Beulich wrote: Under the assumption that the nop-s added by the base ticket spinlock enlightenment patch might be considered undesirable (or worse), here is an optional patch to eliminate these nop-s again. This is done through extending the memory operands of the inc instruction... 30 Jun 2010 14:15
[PATCH 2/2] Yama: add PTRACE exception tracking
Some application suites have external crash handlers that depend on being able to use PTRACE to generate crash reports (KDE, Chromium, etc). Since the inferior process generally knows the PID of the debugger, it can use PR_SET_PTRACER to allow a specific PID and its descendants to perform the PTRACE instead of only... 29 Jun 2010 21:48
[PATCH 0/2] Yama: add PTRACE exception tracking
The primary exception to Yama's descendant-based PTRACE restrictions is when an application has a predefined crash handler that is spawned in parallel with the crashed application (e.g. KDE, Chromium). These applications want to bypass the common RLIMIT_CORE=0, and gather state information from the process for ups... 29 Jun 2010 20:43
[PATCH 1/2] security: create task_free security callback
The current LSM interface to cred_free is not sufficient for allowing an LSM to track the life and death of a task. This patch adds the task_free hook so that an LSM can clean up resources on task death. Signed-off-by: Kees Cook <kees.cook(a)canonical.com> --- include/linux/security.h | 8 ++++++++ kernel/fo... 29 Jun 2010 20:43
First  |  Prev |  Next  |  Last
Pages: 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851 852 853 854