summaryrefslogtreecommitdiffstats
path: root/include/linux/cred.h
Commit message (Expand)AuthorAgeFilesLines
* capabilities: ambient capabilitiesAndy Lutomirski2015-09-041-0/+8
* kernel: conditionally support non-root users, groups and capabilitiesIulia Manda2015-04-151-4/+19
* groups: Consolidate the setgroups permission checksEric W. Biederman2014-12-051-0/+1
* nfsd: silence sparse warning about accessing credentialsJeff Layton2014-07-171-0/+9
* kernel/groups.c: remove return value of set_groupsWang YanQing2014-04-031-1/+1
* cred: Remove tgcred pointer from struct credMarc Dionne2013-01-091-1/+0
* Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/ebi...Linus Torvalds2012-12-171-2/+0
|\
| * userns: Kill task_user_nsEric W. Biederman2012-11-201-2/+0
* | KEYS: Make the session and process keyrings per-threadDavid Howells2012-10-021-15/+2
|/
* cred: remove task_is_dead() from __task_cred() validationOleg Nesterov2012-05-311-7/+3
* userns: Convert in_group_p and in_egroup_p to use kgid_tEric W. Biederman2012-05-031-2/+2
* userns: Store uid and gid values in struct cred with kuid_t and kgid_t typesEric W. Biederman2012-05-031-8/+8
* userns: Convert group_info values from gid_t to kgid_t.Eric W. Biederman2012-05-031-4/+5
* cred: Refcount the user_ns pointed to by the cred.Eric W. Biederman2012-04-071-1/+1
* cred: Add forward declaration of init_user_ns in all cases.Eric W. Biederman2012-04-071-1/+1
* capabilities: remove task_ns_* functionsEric Paris2012-01-051-2/+4
* cred: use 'const' in get_current_{user,groups}Linus Torvalds2011-08-081-2/+2
* CRED: Restore const to current_cred()David Howells2011-08-081-1/+1
* fix rcu annotations noise in cred.hAl Viro2011-08-071-5/+6
* atomic: use <linux/atomic.h>Arun Sharma2011-07-261-1/+1
* rcu: treewide: Do not use rcu_read_lock_held when calling rcu_dereference_checkMichal Hocko2011-07-081-1/+0
* Create Documentation/security/,Randy Dunlap2011-05-191-1/+1
* Cache user_ns in struct credSerge E. Hallyn2011-05-131-2/+8
* userns: security: make capabilities relative to the user namespaceSerge E. Hallyn2011-03-231-1/+3
* keys: __rcu annotationsArnd Bergmann2010-08-191-1/+1
* CRED: Fix __task_cred()'s lockdep check and banner commentDavid Howells2010-07-291-5/+10
* CRED: Fix get_task_cred() and task_state() to not resurrect dead credentialsDavid Howells2010-07-291-20/+1
* umh: creds: kill subprocess_info->cred logicOleg Nesterov2010-05-271-1/+0
* rcu: Use wrapper function instead of exporting tasklist_lockPaul E. McKenney2010-03-041-1/+1
* sched: Use lockdep-based checking on rcu_dereference()Paul E. McKenney2010-02-251-1/+1
* include/linux/cred.h: fix buildAndrew Morton2009-09-231-17/+1
* Creds: creds->security can be NULL is selinux is disabledEric Paris2009-09-141-5/+8
* KEYS: Add a keyctl to install a process's session keyring on its parent [try #6]David Howells2009-09-021-0/+1
* CRED: Add some configurable debugging [try #6]David Howells2009-09-021-1/+64
* include/linux/cred.h: work around gcc-4.2.4 warning in get_cred()Paul Menage2009-07-201-1/+2
* cred: #include init.h in cred.hAlexey Dobriyan2009-05-291-0/+1
* User namespaces: set of cleanups (v2)Serge Hallyn2008-11-241-0/+2
* CRED: Allow kernel services to override LSM settings for task actionsDavid Howells2008-11-141-0/+6
* CRED: Differentiate objective and effective subjective credentials on a taskDavid Howells2008-11-141-14/+15
* CRED: DocumentationDavid Howells2008-11-141-1/+11
* CRED: Make execve() take advantage of copy-on-write credentialsDavid Howells2008-11-141-2/+1
* CRED: Inaugurate COW credentialsDavid Howells2008-11-141-11/+33
* CRED: Separate per-task-group keyrings from signal_structDavid Howells2008-11-141-0/+16
* CRED: Use RCU to access another task's creds and to release a task's own credsDavid Howells2008-11-141-1/+2
* CRED: Wrap current->cred and a few other accessorsDavid Howells2008-11-141-44/+143
* CRED: Detach the credentials from task_structDavid Howells2008-11-141-0/+29
* CRED: Separate task security context from task_structDavid Howells2008-11-141-22/+133
* CRED: Introduce credential access wrappersDavid Howells2008-08-141-0/+50