summaryrefslogtreecommitdiff
path: root/include/linux/cred.h
AgeCommit message (Expand)AuthorFilesLines
2016-03-23cred/userns: define current_user_ns() as a functionArnd Bergmann1-1/+4
2015-09-05capabilities: ambient capabilitiesAndy Lutomirski1-0/+8
2015-04-16kernel: conditionally support non-root users, groups and capabilitiesIulia Manda1-4/+19
2014-12-06groups: Consolidate the setgroups permission checksEric W. Biederman1-0/+1
2014-07-18nfsd: silence sparse warning about accessing credentialsJeff Layton1-0/+9
2014-04-04kernel/groups.c: remove return value of set_groupsWang YanQing1-1/+1
2013-01-09cred: Remove tgcred pointer from struct credMarc Dionne1-1/+0
2012-12-18Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/ebi...Linus Torvalds1-2/+0
2012-11-20userns: Kill task_user_nsEric W. Biederman1-2/+0
2012-10-02KEYS: Make the session and process keyrings per-threadDavid Howells1-15/+2
2012-06-01cred: remove task_is_dead() from __task_cred() validationOleg Nesterov1-7/+3
2012-05-03userns: Convert in_group_p and in_egroup_p to use kgid_tEric W. Biederman1-2/+2
2012-05-03userns: Store uid and gid values in struct cred with kuid_t and kgid_t typesEric W. Biederman1-8/+8
2012-05-03userns: Convert group_info values from gid_t to kgid_t.Eric W. Biederman1-4/+5
2012-04-08cred: Refcount the user_ns pointed to by the cred.Eric W. Biederman1-1/+1
2012-04-08cred: Add forward declaration of init_user_ns in all cases.Eric W. Biederman1-1/+1
2012-01-06capabilities: remove task_ns_* functionsEric Paris1-2/+4
2011-08-08cred: use 'const' in get_current_{user,groups}Linus Torvalds1-2/+2
2011-08-08CRED: Restore const to current_cred()David Howells1-1/+1
2011-08-08fix rcu annotations noise in cred.hAl Viro1-5/+6
2011-07-27atomic: use <linux/atomic.h>Arun Sharma1-1/+1
2011-07-09rcu: treewide: Do not use rcu_read_lock_held when calling rcu_dereference_checkMichal Hocko1-1/+0
2011-05-20Create Documentation/security/,Randy Dunlap1-1/+1
2011-05-13Cache user_ns in struct credSerge E. Hallyn1-2/+8
2011-03-24userns: security: make capabilities relative to the user namespaceSerge E. Hallyn1-1/+3
2010-08-20keys: __rcu annotationsArnd Bergmann1-1/+1
2010-07-30CRED: Fix __task_cred()'s lockdep check and banner commentDavid Howells1-5/+10
2010-07-30CRED: Fix get_task_cred() and task_state() to not resurrect dead credentialsDavid Howells1-20/+1
2010-05-27umh: creds: kill subprocess_info->cred logicOleg Nesterov1-1/+0
2010-03-04rcu: Use wrapper function instead of exporting tasklist_lockPaul E. McKenney1-1/+1
2010-02-25sched: Use lockdep-based checking on rcu_dereference()Paul E. McKenney1-1/+1
2009-09-23include/linux/cred.h: fix buildAndrew Morton1-17/+1
2009-09-14Creds: creds->security can be NULL is selinux is disabledEric Paris1-5/+8
2009-09-02KEYS: Add a keyctl to install a process's session keyring on its parent [try #6]David Howells1-0/+1
2009-09-02CRED: Add some configurable debugging [try #6]David Howells1-1/+64
2009-07-20include/linux/cred.h: work around gcc-4.2.4 warning in get_cred()Paul Menage1-1/+2
2009-05-29cred: #include init.h in cred.hAlexey Dobriyan1-0/+1
2008-11-25User namespaces: set of cleanups (v2)Serge Hallyn1-0/+2
2008-11-14CRED: Allow kernel services to override LSM settings for task actionsDavid Howells1-0/+6
2008-11-14CRED: Differentiate objective and effective subjective credentials on a taskDavid Howells1-14/+15
2008-11-14CRED: DocumentationDavid Howells1-1/+11
2008-11-14CRED: Make execve() take advantage of copy-on-write credentialsDavid Howells1-2/+1
2008-11-14CRED: Inaugurate COW credentialsDavid Howells1-11/+33
2008-11-14CRED: Separate per-task-group keyrings from signal_structDavid Howells1-0/+16
2008-11-14CRED: Use RCU to access another task's creds and to release a task's own credsDavid Howells1-1/+2
2008-11-14CRED: Wrap current->cred and a few other accessorsDavid Howells1-44/+143
2008-11-14CRED: Detach the credentials from task_structDavid Howells1-0/+29
2008-11-14CRED: Separate task security context from task_structDavid Howells1-22/+133
2008-08-14CRED: Introduce credential access wrappersDavid Howells1-0/+50