1. ed868a5 Creds: creds->security can be NULL is selinux is disabled by Eric Paris · 15 years ago
  2. ee18d64 KEYS: Add a keyctl to install a process's session keyring on its parent [try #6] by David Howells · 15 years ago
  3. e0e8173 CRED: Add some configurable debugging [try #6] by David Howells · 15 years ago
  4. 1c388ad include/linux/cred.h: work around gcc-4.2.4 warning in get_cred() by Paul Menage · 15 years ago
  5. b2e1fea cred: #include init.h in cred.h by Alexey Dobriyan · 16 years ago
  6. 18b6e04 User namespaces: set of cleanups (v2) by Serge Hallyn · 16 years ago
  7. 3a3b7ce CRED: Allow kernel services to override LSM settings for task actions by David Howells · 16 years ago
  8. 3b11a1d CRED: Differentiate objective and effective subjective credentials on a task by David Howells · 16 years ago
  9. 98870ab CRED: Documentation by David Howells · 16 years ago
  10. a6f76f2 CRED: Make execve() take advantage of copy-on-write credentials by David Howells · 16 years ago
  11. d84f4f9 CRED: Inaugurate COW credentials by David Howells · 16 years ago
  12. bb952bb CRED: Separate per-task-group keyrings from signal_struct by David Howells · 16 years ago
  13. c69e8d9 CRED: Use RCU to access another task's creds and to release a task's own creds by David Howells · 16 years ago
  14. 86a264a CRED: Wrap current->cred and a few other accessors by David Howells · 16 years ago
  15. f1752ee CRED: Detach the credentials from task_struct by David Howells · 16 years ago
  16. b6dff3e CRED: Separate task security context from task_struct by David Howells · 16 years ago
  17. 9e2b2dc CRED: Introduce credential access wrappers by David Howells · 16 years ago