summaryrefslogtreecommitdiff
path: root/include/linux/cred.h
AgeCommit message (Expand)AuthorFilesLines
2010-08-20keys: __rcu annotationsArnd Bergmann1-1/+1
2010-07-30CRED: Fix __task_cred()'s lockdep check and banner commentDavid Howells1-5/+10
2010-07-30CRED: Fix get_task_cred() and task_state() to not resurrect dead credentialsDavid Howells1-20/+1
2010-05-27umh: creds: kill subprocess_info->cred logicOleg Nesterov1-1/+0
2010-03-04rcu: Use wrapper function instead of exporting tasklist_lockPaul E. McKenney1-1/+1
2010-02-25sched: Use lockdep-based checking on rcu_dereference()Paul E. McKenney1-1/+1
2009-09-23include/linux/cred.h: fix buildAndrew Morton1-17/+1
2009-09-14Creds: creds->security can be NULL is selinux is disabledEric Paris1-5/+8
2009-09-02KEYS: Add a keyctl to install a process's session keyring on its parent [try #6]David Howells1-0/+1
2009-09-02CRED: Add some configurable debugging [try #6]David Howells1-1/+64
2009-07-20include/linux/cred.h: work around gcc-4.2.4 warning in get_cred()Paul Menage1-1/+2
2009-05-29cred: #include init.h in cred.hAlexey Dobriyan1-0/+1
2008-11-25User namespaces: set of cleanups (v2)Serge Hallyn1-0/+2
2008-11-14CRED: Allow kernel services to override LSM settings for task actionsDavid Howells1-0/+6
2008-11-14CRED: Differentiate objective and effective subjective credentials on a taskDavid Howells1-14/+15
2008-11-14CRED: DocumentationDavid Howells1-1/+11
2008-11-14CRED: Make execve() take advantage of copy-on-write credentialsDavid Howells1-2/+1
2008-11-14CRED: Inaugurate COW credentialsDavid Howells1-11/+33
2008-11-14CRED: Separate per-task-group keyrings from signal_structDavid Howells1-0/+16
2008-11-14CRED: Use RCU to access another task's creds and to release a task's own credsDavid Howells1-1/+2
2008-11-14CRED: Wrap current->cred and a few other accessorsDavid Howells1-44/+143
2008-11-14CRED: Detach the credentials from task_structDavid Howells1-0/+29
2008-11-14CRED: Separate task security context from task_structDavid Howells1-22/+133
2008-08-14CRED: Introduce credential access wrappersDavid Howells1-0/+50