1. 638a843 cred: use 'const' in get_current_{user,groups} by Linus Torvalds · 13 years ago
  2. 27e4e43 CRED: Restore const to current_cred() by David Howells · 13 years ago
  3. 3295514 fix rcu annotations noise in cred.h by Al Viro · 13 years ago
  4. 60063497 atomic: use <linux/atomic.h> by Arun Sharma · 13 years ago
  5. d8bf4ca rcu: treewide: Do not use rcu_read_lock_held when calling rcu_dereference_check by Michal Hocko · 13 years ago
  6. d410fa4 Create Documentation/security/, by Randy Dunlap · 14 years ago
  7. 47a150e Cache user_ns in struct cred by Serge E. Hallyn · 14 years ago
  8. 3486740 userns: security: make capabilities relative to the user namespace by Serge E. Hallyn · 14 years ago
  9. e63ba74 keys: __rcu annotations by Arnd Bergmann · 15 years ago
  10. 8f92054 CRED: Fix __task_cred()'s lockdep check and banner comment by David Howells · 14 years ago
  11. de09a97 CRED: Fix get_task_cred() and task_state() to not resurrect dead credentials by David Howells · 14 years ago
  12. c70a626 umh: creds: kill subprocess_info->cred logic by Oleg Nesterov · 15 years ago
  13. db1466b rcu: Use wrapper function instead of exporting tasklist_lock by Paul E. McKenney · 15 years ago
  14. d11c563 sched: Use lockdep-based checking on rcu_dereference() by Paul E. McKenney · 15 years ago
  15. 74908a0 include/linux/cred.h: fix build by Andrew Morton · 15 years ago
  16. ed868a5 Creds: creds->security can be NULL is selinux is disabled by Eric Paris · 15 years ago
  17. ee18d64 KEYS: Add a keyctl to install a process's session keyring on its parent [try #6] by David Howells · 15 years ago
  18. e0e8173 CRED: Add some configurable debugging [try #6] by David Howells · 15 years ago
  19. 1c388ad include/linux/cred.h: work around gcc-4.2.4 warning in get_cred() by Paul Menage · 15 years ago
  20. b2e1fea cred: #include init.h in cred.h by Alexey Dobriyan · 16 years ago
  21. 18b6e04 User namespaces: set of cleanups (v2) by Serge Hallyn · 16 years ago
  22. 3a3b7ce CRED: Allow kernel services to override LSM settings for task actions by David Howells · 16 years ago
  23. 3b11a1d CRED: Differentiate objective and effective subjective credentials on a task by David Howells · 16 years ago
  24. 98870ab CRED: Documentation by David Howells · 16 years ago
  25. a6f76f2 CRED: Make execve() take advantage of copy-on-write credentials by David Howells · 16 years ago
  26. d84f4f9 CRED: Inaugurate COW credentials by David Howells · 16 years ago
  27. bb952bb CRED: Separate per-task-group keyrings from signal_struct by David Howells · 16 years ago
  28. c69e8d9 CRED: Use RCU to access another task's creds and to release a task's own creds by David Howells · 16 years ago
  29. 86a264a CRED: Wrap current->cred and a few other accessors by David Howells · 16 years ago
  30. f1752ee CRED: Detach the credentials from task_struct by David Howells · 16 years ago
  31. b6dff3e CRED: Separate task security context from task_struct by David Howells · 16 years ago
  32. 9e2b2dc CRED: Introduce credential access wrappers by David Howells · 16 years ago