Commit Graph

33 Commits (df1c7baba1b7b3053950f3845a6575aca47ba9ce)

Author SHA1 Message Date
Eric Paris f1c84dae0e capabilities: remove task_ns_* functions 13 years ago
Linus Torvalds 638a843909 cred: use 'const' in get_current_{user,groups} 14 years ago
David Howells 27e4e43627 CRED: Restore const to current_cred() 14 years ago
Al Viro 3295514841 fix rcu annotations noise in cred.h 14 years ago
Arun Sharma 60063497a9 atomic: use <linux/atomic.h> 14 years ago
Michal Hocko d8bf4ca9ca rcu: treewide: Do not use rcu_read_lock_held when calling rcu_dereference_check 14 years ago
Randy Dunlap d410fa4ef9 Create Documentation/security/, 14 years ago
Serge E. Hallyn 47a150edc2 Cache user_ns in struct cred 14 years ago
Serge E. Hallyn 3486740a4f userns: security: make capabilities relative to the user namespace 14 years ago
Arnd Bergmann e63ba744a6 keys: __rcu annotations 15 years ago
David Howells 8f92054e7c CRED: Fix __task_cred()'s lockdep check and banner comment 15 years ago
David Howells de09a9771a CRED: Fix get_task_cred() and task_state() to not resurrect dead credentials 15 years ago
Oleg Nesterov c70a626d3e umh: creds: kill subprocess_info->cred logic 15 years ago
Paul E. McKenney db1466b3e1 rcu: Use wrapper function instead of exporting tasklist_lock 15 years ago
Paul E. McKenney d11c563dd2 sched: Use lockdep-based checking on rcu_dereference() 15 years ago
Andrew Morton 74908a0009 include/linux/cred.h: fix build 16 years ago
Eric Paris ed868a5698 Creds: creds->security can be NULL is selinux is disabled 16 years ago
David Howells ee18d64c1f KEYS: Add a keyctl to install a process's session keyring on its parent [try #6] 16 years ago
David Howells e0e817392b CRED: Add some configurable debugging [try #6] 16 years ago
Paul Menage 1c388ad054 include/linux/cred.h: work around gcc-4.2.4 warning in get_cred() 16 years ago
Alexey Dobriyan b2e1feaf0a cred: #include init.h in cred.h 16 years ago
Serge Hallyn 18b6e0414e User namespaces: set of cleanups (v2) 16 years ago
David Howells 3a3b7ce933 CRED: Allow kernel services to override LSM settings for task actions 16 years ago
David Howells 3b11a1dece CRED: Differentiate objective and effective subjective credentials on a task 16 years ago
David Howells 98870ab0a5 CRED: Documentation 16 years ago
David Howells a6f76f23d2 CRED: Make execve() take advantage of copy-on-write credentials 16 years ago
David Howells d84f4f992c CRED: Inaugurate COW credentials 16 years ago
David Howells bb952bb98a CRED: Separate per-task-group keyrings from signal_struct 16 years ago
David Howells c69e8d9c01 CRED: Use RCU to access another task's creds and to release a task's own creds 16 years ago
David Howells 86a264abe5 CRED: Wrap current->cred and a few other accessors 16 years ago
David Howells f1752eec61 CRED: Detach the credentials from task_struct 16 years ago
David Howells b6dff3ec5e CRED: Separate task security context from task_struct 16 years ago
David Howells 9e2b2dc413 CRED: Introduce credential access wrappers 17 years ago