| Commit message (Expand) | Author | Age | Files | Lines |
* | include/linux/cred.h: fix build | Andrew Morton | 2009-09-23 | 1 | -17/+1 |
* | Creds: creds->security can be NULL is selinux is disabled | Eric Paris | 2009-09-14 | 1 | -5/+8 |
* | KEYS: Add a keyctl to install a process's session keyring on its parent [try #6] | David Howells | 2009-09-02 | 1 | -0/+1 |
* | CRED: Add some configurable debugging [try #6] | David Howells | 2009-09-02 | 1 | -1/+64 |
* | include/linux/cred.h: work around gcc-4.2.4 warning in get_cred() | Paul Menage | 2009-07-20 | 1 | -1/+2 |
* | cred: #include init.h in cred.h | Alexey Dobriyan | 2009-05-29 | 1 | -0/+1 |
* | User namespaces: set of cleanups (v2) | Serge Hallyn | 2008-11-24 | 1 | -0/+2 |
* | CRED: Allow kernel services to override LSM settings for task actions | David Howells | 2008-11-14 | 1 | -0/+6 |
* | CRED: Differentiate objective and effective subjective credentials on a task | David Howells | 2008-11-14 | 1 | -14/+15 |
* | CRED: Documentation | David Howells | 2008-11-14 | 1 | -1/+11 |
* | CRED: Make execve() take advantage of copy-on-write credentials | David Howells | 2008-11-14 | 1 | -2/+1 |
* | CRED: Inaugurate COW credentials | David Howells | 2008-11-14 | 1 | -11/+33 |
* | CRED: Separate per-task-group keyrings from signal_struct | David Howells | 2008-11-14 | 1 | -0/+16 |
* | CRED: Use RCU to access another task's creds and to release a task's own creds | David Howells | 2008-11-14 | 1 | -1/+2 |
* | CRED: Wrap current->cred and a few other accessors | David Howells | 2008-11-14 | 1 | -44/+143 |
* | CRED: Detach the credentials from task_struct | David Howells | 2008-11-14 | 1 | -0/+29 |
* | CRED: Separate task security context from task_struct | David Howells | 2008-11-14 | 1 | -22/+133 |
* | CRED: Introduce credential access wrappers | David Howells | 2008-08-14 | 1 | -0/+50 |