index
:
linux.git
arm64-uaccess
link_path_walk
linus
master
mmu_gather-race-fix
proc-cmdline
runtime-constants
tty-splice
word-at-a-time
x86-rep-insns
x86-uaccess-cleanup
Linux kernel mainline tree
Linus Torvalds
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
security
/
keys
Commit message (
Expand
)
Author
Age
Files
Lines
*
KEYS: call_sbin_request_key() must write lock keyrings before modifying them
David Howells
2010-05-05
1
-1
/
+1
*
KEYS: Use RCU dereference wrappers in keyring key type code
David Howells
2010-05-05
1
-10
/
+13
*
KEYS: find_keyring_by_name() can gain access to a freed keyring
Toshiyuki Okajima
2010-05-05
1
-9
/
+9
*
KEYS: Fix RCU handling in key_gc_keyring()
David Howells
2010-05-05
1
-3
/
+6
*
KEYS: Fix an RCU warning in the reading of user keys
David Howells
2010-05-05
1
-1
/
+2
*
Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/jmo...
Linus Torvalds
2010-04-27
1
-1
/
+1
|
\
|
*
keys: don't need to use RCU in keyring_read() as semaphore is held
David Howells
2010-04-28
1
-1
/
+1
*
|
keys: the request_key() syscall should link an existing key to the dest keyring
David Howells
2010-04-27
1
-1
/
+8
|
/
*
keys: fix an RCU warning
David Howells
2010-04-24
1
-5
/
+8
*
include cleanup: Update gfp.h and slab.h includes to prepare for breaking imp...
Tejun Heo
2010-03-30
2
-2
/
+0
*
security: Apply lockdep-based checking to rcu_dereference() uses
Paul E. McKenney
2010-02-25
2
-2
/
+5
*
Keys: KEYCTL_SESSION_TO_PARENT needs TIF_NOTIFY_RESUME architecture support
Geert Uytterhoeven
2009-12-17
1
-0
/
+10
*
keys: PTR_ERR return of wrong pointer in keyctl_get_security()
Roel Kluin
2009-12-17
1
-1
/
+1
*
sysctl: Drop & in front of every proc_handler.
Eric W. Biederman
2009-11-18
1
-5
/
+5
*
sysctl security/keys: Remove dead binary sysctl support
Eric W. Biederman
2009-11-12
1
-6
/
+1
*
KEYS: get_instantiation_keyring() should inc the keyring refcount in all cases
David Howells
2009-10-15
1
-1
/
+1
*
KEYS: Have the garbage collector set its timer for live expired keys
David Howells
2009-09-23
1
-2
/
+2
*
KEYS: Fix garbage collector
David Howells
2009-09-15
4
-35
/
+73
*
KEYS: Unlock tasklist when exiting early from keyctl_session_to_parent
Marc Dionne
2009-09-15
1
-0
/
+1
*
KEYS: Add a keyctl to install a process's session keyring on its parent [try #6]
David Howells
2009-09-02
5
-0
/
+156
*
KEYS: Do some whitespace cleanups [try #6]
David Howells
2009-09-02
1
-9
/
+3
*
KEYS: Make /proc/keys use keyid not numread as file position [try #6]
Serge E. Hallyn
2009-09-02
1
-22
/
+55
*
KEYS: Add garbage collection for dead, revoked and expired keys. [try #6]
David Howells
2009-09-02
7
-4
/
+322
*
KEYS: Flag dead keys to induce EKEYREVOKED [try #6]
David Howells
2009-09-02
1
-1
/
+3
*
KEYS: Allow keyctl_revoke() on keys that have SETATTR but not WRITE perm [try...
David Howells
2009-09-02
1
-1
/
+7
*
KEYS: Deal with dead-type keys appropriately [try #6]
David Howells
2009-09-02
4
-31
/
+48
*
kernel: rename is_single_threaded(task) to current_is_single_threaded(void)
Oleg Nesterov
2009-07-17
1
-1
/
+1
*
keys: annotate seqfile ops with __releases and __acquires
James Morris
2009-06-25
1
-0
/
+4
*
keys: Handle there being no fallback destination keyring for request_key()
David Howells
2009-04-09
1
-3
/
+6
*
keys: make procfiles per-user-namespace
Serge E. Hallyn
2009-02-27
1
-6
/
+49
*
keys: skip keys from another user namespace
Serge E. Hallyn
2009-02-27
1
-0
/
+3
*
keys: consider user namespace in key_permission
Serge E. Hallyn
2009-02-27
1
-0
/
+5
*
keys: distinguish per-uid keys in different namespaces
Serge E. Hallyn
2009-02-27
5
-5
/
+16
*
security: introduce missing kfree
Vegard Nossum
2009-01-17
1
-0
/
+1
*
[CVE-2009-0029] System call wrappers part 28
Heiko Carstens
2009-01-14
1
-2
/
+2
*
[CVE-2009-0029] System call wrappers part 27
Heiko Carstens
2009-01-14
1
-9
/
+9
*
keys: fix sparse warning by adding __user annotation to cast
James Morris
2009-01-01
1
-1
/
+1
*
KEYS: Fix variable uninitialisation warnings
David Howells
2008-12-29
1
-3
/
+3
*
CRED: Make execve() take advantage of copy-on-write credentials
David Howells
2008-11-14
1
-42
/
+0
*
CRED: Inaugurate COW credentials
David Howells
2008-11-14
9
-269
/
+317
*
CRED: Separate per-task-group keyrings from signal_struct
David Howells
2008-11-14
2
-80
/
+54
*
CRED: Use RCU to access another task's creds and to release a task's own creds
David Howells
2008-11-14
2
-14
/
+20
*
CRED: Wrap current->cred and a few other accessors
David Howells
2008-11-14
2
-6
/
+7
*
CRED: Separate task security context from task_struct
David Howells
2008-11-14
5
-78
/
+86
*
KEYS: Alter use of key instantiation link-to-keyring argument
David Howells
2008-11-14
5
-111
/
+187
*
KEYS: Disperse linux/key_ui.h
David Howells
2008-11-14
3
-1
/
+33
*
CRED: Wrap task credential accesses in the key management code
David Howells
2008-11-14
4
-8
/
+8
*
keys: remove unused key_alloc_sem
Daniel Walker
2008-06-06
1
-1
/
+0
*
keys: explicitly include required slab.h header file.
Robert P. J. Day
2008-04-29
2
-0
/
+2
*
keys: make the keyring quotas controllable through /proc/sys
David Howells
2008-04-29
6
-15
/
+94
[next]