summaryrefslogtreecommitdiffstats
path: root/security/keys/permission.c
Commit message (Expand)AuthorAgeFilesLines
* keys: Make the KEY_NEED_* perms an enum rather than a maskDavid Howells2020-05-191-7/+24
* Revert "Merge tag 'keys-acl-20190703' of git://git.kernel.org/pub/scm/linux/k...Linus Torvalds2019-07-101-325/+36
* Merge tag 'keys-acl-20190703' of git://git.kernel.org/pub/scm/linux/kernel/gi...Linus Torvalds2019-07-081-36/+325
|\
| * keys: Provide KEYCTL_GRANT_PERMISSIONDavid Howells2019-07-031-0/+119
| * keys: Replace uid/gid/perm permissions checking with an ACLDavid Howells2019-06-271-36/+206
* | treewide: Replace GPLv2 boilerplate/reference with SPDX - rule 152Thomas Gleixner2019-05-301-5/+1
|/
* security: audit and remove any unnecessary uses of module.hPaul Gortmaker2018-12-121-1/+1
* security: keys: Replace time_t/timespec with time64_tBaolin Wang2017-11-151-3/+2
* KEYS: load key flags and expiry time atomically in key_validate()Eric Biggers2017-10-181-3/+4
* KEYS: Move the flags representing required permission to linux/key.hDavid Howells2014-03-141-2/+2
* userns: Convert security/keys to the new userns infrastructureEric W. Biederman2012-09-131-10/+4
* Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/ebi...Linus Torvalds2012-05-231-2/+3
|\
| * userns: Convert group_info values from gid_t to kgid_t.Eric W. Biederman2012-05-031-1/+2
| * userns: Use cred->user_ns instead of cred->user->user_nsEric W. Biederman2012-04-071-1/+1
* | KEYS: Don't check for NULL key pointer in key_validate()David Howells2012-05-161-24/+16
* | KEYS: Add invalidation supportDavid Howells2012-05-111-5/+10
|/
* KEYS: Fix up comments in key management codeDavid Howells2011-01-211-10/+15
* KEYS: Do some style cleanup in the key management code.David Howells2011-01-211-6/+2
* security: whitespace coding style fixesJustin P. Mattock2010-04-231-1/+1
* keys: consider user namespace in key_permissionSerge E. Hallyn2009-02-271-0/+5
* CRED: Inaugurate COW credentialsDavid Howells2008-11-141-11/+13
* CRED: Use RCU to access another task's creds and to release a task's own credsDavid Howells2008-11-141-4/+6
* CRED: Separate task security context from task_structDavid Howells2008-11-141-5/+6
* [PATCH] keys: Permit running process to instantiate keysDavid Howells2006-01-081-0/+32
* [PATCH] Keys: Add LSM hooks for key management [try #3]David Howells2005-10-301-1/+6
* [PATCH] Keys: Possessor permissions should be additiveDavid Howells2005-10-081-6/+6
* [PATCH] Keys: Split key permissions checking into a .c fileDavid Howells2005-10-081-0/+70