aboutsummaryrefslogtreecommitdiffstats
path: root/include/linux/cred.h
Commit message (Expand)AuthorAgeFilesLines
* capabilities: remove task_ns_* functionsEric Paris2012-01-051-2/+4
* cred: use 'const' in get_current_{user,groups}Linus Torvalds2011-08-081-2/+2
* CRED: Restore const to current_cred()David Howells2011-08-081-1/+1
* fix rcu annotations noise in cred.hAl Viro2011-08-071-5/+6
* atomic: use <linux/atomic.h>Arun Sharma2011-07-261-1/+1
* rcu: treewide: Do not use rcu_read_lock_held when calling rcu_dereference_checkMichal Hocko2011-07-081-1/+0
* Create Documentation/security/,Randy Dunlap2011-05-191-1/+1
* Cache user_ns in struct credSerge E. Hallyn2011-05-131-2/+8
* userns: security: make capabilities relative to the user namespaceSerge E. Hallyn2011-03-231-1/+3
* keys: __rcu annotationsArnd Bergmann2010-08-191-1/+1
* CRED: Fix __task_cred()'s lockdep check and banner commentDavid Howells2010-07-291-5/+10
* CRED: Fix get_task_cred() and task_state() to not resurrect dead credentialsDavid Howells2010-07-291-20/+1
* umh: creds: kill subprocess_info->cred logicOleg Nesterov2010-05-271-1/+0
* rcu: Use wrapper function instead of exporting tasklist_lockPaul E. McKenney2010-03-041-1/+1
* sched: Use lockdep-based checking on rcu_dereference()Paul E. McKenney2010-02-251-1/+1
* include/linux/cred.h: fix buildAndrew Morton2009-09-231-17/+1
* Creds: creds->security can be NULL is selinux is disabledEric Paris2009-09-141-5/+8
* KEYS: Add a keyctl to install a process's session keyring on its parent [try #6]David Howells2009-09-021-0/+1
* CRED: Add some configurable debugging [try #6]David Howells2009-09-021-1/+64
* include/linux/cred.h: work around gcc-4.2.4 warning in get_cred()Paul Menage2009-07-201-1/+2
* cred: #include init.h in cred.hAlexey Dobriyan2009-05-291-0/+1
* User namespaces: set of cleanups (v2)Serge Hallyn2008-11-241-0/+2
* CRED: Allow kernel services to override LSM settings for task actionsDavid Howells2008-11-141-0/+6
* CRED: Differentiate objective and effective subjective credentials on a taskDavid Howells2008-11-141-14/+15
* CRED: DocumentationDavid Howells2008-11-141-1/+11
* CRED: Make execve() take advantage of copy-on-write credentialsDavid Howells2008-11-141-2/+1
* CRED: Inaugurate COW credentialsDavid Howells2008-11-141-11/+33
* CRED: Separate per-task-group keyrings from signal_structDavid Howells2008-11-141-0/+16
* CRED: Use RCU to access another task's creds and to release a task's own credsDavid Howells2008-11-141-1/+2
* CRED: Wrap current->cred and a few other accessorsDavid Howells2008-11-141-44/+143
* CRED: Detach the credentials from task_structDavid Howells2008-11-141-0/+29
* CRED: Separate task security context from task_structDavid Howells2008-11-141-22/+133
* CRED: Introduce credential access wrappersDavid Howells2008-08-141-0/+50