David Howells
|
27e4e43627
CRED: Restore const to current_cred()
|
14 years ago |
Al Viro
|
3295514841
fix rcu annotations noise in cred.h
|
14 years ago |
Arun Sharma
|
60063497a9
atomic: use <linux/atomic.h>
|
14 years ago |
Michal Hocko
|
d8bf4ca9ca
rcu: treewide: Do not use rcu_read_lock_held when calling rcu_dereference_check
|
14 years ago |
Randy Dunlap
|
d410fa4ef9
Create Documentation/security/,
|
14 years ago |
Serge E. Hallyn
|
47a150edc2
Cache user_ns in struct cred
|
14 years ago |
Serge E. Hallyn
|
3486740a4f
userns: security: make capabilities relative to the user namespace
|
14 years ago |
Arnd Bergmann
|
e63ba744a6
keys: __rcu annotations
|
15 years ago |
David Howells
|
8f92054e7c
CRED: Fix __task_cred()'s lockdep check and banner comment
|
15 years ago |
David Howells
|
de09a9771a
CRED: Fix get_task_cred() and task_state() to not resurrect dead credentials
|
15 years ago |
Oleg Nesterov
|
c70a626d3e
umh: creds: kill subprocess_info->cred logic
|
15 years ago |
Paul E. McKenney
|
db1466b3e1
rcu: Use wrapper function instead of exporting tasklist_lock
|
15 years ago |
Paul E. McKenney
|
d11c563dd2
sched: Use lockdep-based checking on rcu_dereference()
|
15 years ago |
Andrew Morton
|
74908a0009
include/linux/cred.h: fix build
|
16 years ago |
Eric Paris
|
ed868a5698
Creds: creds->security can be NULL is selinux is disabled
|
16 years ago |
David Howells
|
ee18d64c1f
KEYS: Add a keyctl to install a process's session keyring on its parent [try #6]
|
16 years ago |
David Howells
|
e0e817392b
CRED: Add some configurable debugging [try #6]
|
16 years ago |
Paul Menage
|
1c388ad054
include/linux/cred.h: work around gcc-4.2.4 warning in get_cred()
|
16 years ago |
Alexey Dobriyan
|
b2e1feaf0a
cred: #include init.h in cred.h
|
16 years ago |
Serge Hallyn
|
18b6e0414e
User namespaces: set of cleanups (v2)
|
17 years ago |
David Howells
|
3a3b7ce933
CRED: Allow kernel services to override LSM settings for task actions
|
16 years ago |
David Howells
|
3b11a1dece
CRED: Differentiate objective and effective subjective credentials on a task
|
16 years ago |
David Howells
|
98870ab0a5
CRED: Documentation
|
16 years ago |
David Howells
|
a6f76f23d2
CRED: Make execve() take advantage of copy-on-write credentials
|
16 years ago |
David Howells
|
d84f4f992c
CRED: Inaugurate COW credentials
|
16 years ago |
David Howells
|
bb952bb98a
CRED: Separate per-task-group keyrings from signal_struct
|
16 years ago |
David Howells
|
c69e8d9c01
CRED: Use RCU to access another task's creds and to release a task's own creds
|
16 years ago |
David Howells
|
86a264abe5
CRED: Wrap current->cred and a few other accessors
|
16 years ago |
David Howells
|
f1752eec61
CRED: Detach the credentials from task_struct
|
16 years ago |
David Howells
|
b6dff3ec5e
CRED: Separate task security context from task_struct
|
16 years ago |