| Commit message (Expand) | Author | Age |
* | capabilities: remove task_ns_* functions | Eric Paris | 2012-01-05 |
* | cred: use 'const' in get_current_{user,groups} | Linus Torvalds | 2011-08-08 |
* | CRED: Restore const to current_cred() | David Howells | 2011-08-08 |
* | fix rcu annotations noise in cred.h | Al Viro | 2011-08-07 |
* | atomic: use <linux/atomic.h> | Arun Sharma | 2011-07-26 |
* | rcu: treewide: Do not use rcu_read_lock_held when calling rcu_dereference_check | Michal Hocko | 2011-07-08 |
* | Create Documentation/security/, | Randy Dunlap | 2011-05-19 |
* | Cache user_ns in struct cred | Serge E. Hallyn | 2011-05-13 |
* | userns: security: make capabilities relative to the user namespace | Serge E. Hallyn | 2011-03-23 |
* | keys: __rcu annotations | Arnd Bergmann | 2010-08-19 |
* | CRED: Fix __task_cred()'s lockdep check and banner comment | David Howells | 2010-07-29 |
* | CRED: Fix get_task_cred() and task_state() to not resurrect dead credentials | David Howells | 2010-07-29 |
* | umh: creds: kill subprocess_info->cred logic | Oleg Nesterov | 2010-05-27 |
* | rcu: Use wrapper function instead of exporting tasklist_lock | Paul E. McKenney | 2010-03-04 |
* | sched: Use lockdep-based checking on rcu_dereference() | Paul E. McKenney | 2010-02-25 |
* | include/linux/cred.h: fix build | Andrew Morton | 2009-09-23 |
* | Creds: creds->security can be NULL is selinux is disabled | Eric Paris | 2009-09-13 |
* | KEYS: Add a keyctl to install a process's session keyring on its parent [try #6] | David Howells | 2009-09-02 |
* | CRED: Add some configurable debugging [try #6] | David Howells | 2009-09-02 |
* | include/linux/cred.h: work around gcc-4.2.4 warning in get_cred() | Paul Menage | 2009-07-19 |
* | cred: #include init.h in cred.h | Alexey Dobriyan | 2009-05-29 |
* | User namespaces: set of cleanups (v2) | Serge Hallyn | 2008-11-24 |
* | CRED: Allow kernel services to override LSM settings for task actions | David Howells | 2008-11-13 |
* | CRED: Differentiate objective and effective subjective credentials on a task | David Howells | 2008-11-13 |
* | CRED: Documentation | David Howells | 2008-11-13 |
* | CRED: Make execve() take advantage of copy-on-write credentials | David Howells | 2008-11-13 |
* | CRED: Inaugurate COW credentials | David Howells | 2008-11-13 |
* | CRED: Separate per-task-group keyrings from signal_struct | David Howells | 2008-11-13 |
* | CRED: Use RCU to access another task's creds and to release a task's own creds | David Howells | 2008-11-13 |
* | CRED: Wrap current->cred and a few other accessors | David Howells | 2008-11-13 |
* | CRED: Detach the credentials from task_struct | David Howells | 2008-11-13 |
* | CRED: Separate task security context from task_struct | David Howells | 2008-11-13 |
* | CRED: Introduce credential access wrappers | David Howells | 2008-08-13 |