summaryrefslogtreecommitdiffstats
path: root/security/keys
Commit message (Expand)AuthorAgeFilesLines
...
| * KEYS: find_keyring_by_name() can gain access to a freed keyringToshiyuki Okajima2010-05-051-9/+9
* | KEYS: Better handling of errors from construct_alloc_key()David Howells2010-05-061-2/+22
* | KEYS: keyring_serialise_link_sem is only needed for keyring->keyring linksDavid Howells2010-05-061-7/+9
* | Merge branch 'master' into nextJames Morris2010-05-066-13/+25
|\|
| * KEYS: Fix RCU handling in key_gc_keyring()David Howells2010-05-051-3/+6
| * KEYS: Fix an RCU warning in the reading of user keysDavid Howells2010-05-051-1/+2
| * Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/jmo...Linus Torvalds2010-04-271-1/+1
| |\
| | * keys: don't need to use RCU in keyring_read() as semaphore is heldDavid Howells2010-04-281-1/+1
| * | keys: the request_key() syscall should link an existing key to the dest keyringDavid Howells2010-04-271-1/+8
| |/
| * keys: fix an RCU warningDavid Howells2010-04-241-5/+8
| * include cleanup: Update gfp.h and slab.h includes to prepare for breaking imp...Tejun Heo2010-03-302-2/+0
* | security: whitespace coding style fixesJustin P. Mattock2010-04-235-42/+42
* | security: remove dead hook key_session_to_parentEric Paris2010-04-121-7/+0
* | Security: key: keyring: fix some code style issuesChihau Chau2010-03-101-4/+3
* | Security: Fix some coding styles in security/keys/keyring.cwzt.wzt@gmail.com2010-03-051-4/+2
|/
* security: Apply lockdep-based checking to rcu_dereference() usesPaul E. McKenney2010-02-252-2/+5
* Keys: KEYCTL_SESSION_TO_PARENT needs TIF_NOTIFY_RESUME architecture supportGeert Uytterhoeven2009-12-171-0/+10
* keys: PTR_ERR return of wrong pointer in keyctl_get_security()Roel Kluin2009-12-171-1/+1
* sysctl: Drop & in front of every proc_handler.Eric W. Biederman2009-11-181-5/+5
* sysctl security/keys: Remove dead binary sysctl supportEric W. Biederman2009-11-121-6/+1
* KEYS: get_instantiation_keyring() should inc the keyring refcount in all casesDavid Howells2009-10-151-1/+1
* KEYS: Have the garbage collector set its timer for live expired keysDavid Howells2009-09-231-2/+2
* KEYS: Fix garbage collectorDavid Howells2009-09-154-35/+73
* KEYS: Unlock tasklist when exiting early from keyctl_session_to_parentMarc Dionne2009-09-151-0/+1
* KEYS: Add a keyctl to install a process's session keyring on its parent [try #6]David Howells2009-09-025-0/+156
* KEYS: Do some whitespace cleanups [try #6]David Howells2009-09-021-9/+3
* KEYS: Make /proc/keys use keyid not numread as file position [try #6]Serge E. Hallyn2009-09-021-22/+55
* KEYS: Add garbage collection for dead, revoked and expired keys. [try #6]David Howells2009-09-027-4/+322
* KEYS: Flag dead keys to induce EKEYREVOKED [try #6]David Howells2009-09-021-1/+3
* KEYS: Allow keyctl_revoke() on keys that have SETATTR but not WRITE perm [try...David Howells2009-09-021-1/+7
* KEYS: Deal with dead-type keys appropriately [try #6]David Howells2009-09-024-31/+48
* kernel: rename is_single_threaded(task) to current_is_single_threaded(void)Oleg Nesterov2009-07-171-1/+1
* keys: annotate seqfile ops with __releases and __acquiresJames Morris2009-06-251-0/+4
* keys: Handle there being no fallback destination keyring for request_key()David Howells2009-04-091-3/+6
* keys: make procfiles per-user-namespaceSerge E. Hallyn2009-02-271-6/+49
* keys: skip keys from another user namespaceSerge E. Hallyn2009-02-271-0/+3
* keys: consider user namespace in key_permissionSerge E. Hallyn2009-02-271-0/+5
* keys: distinguish per-uid keys in different namespacesSerge E. Hallyn2009-02-275-5/+16
* security: introduce missing kfreeVegard Nossum2009-01-171-0/+1
* [CVE-2009-0029] System call wrappers part 28Heiko Carstens2009-01-141-2/+2
* [CVE-2009-0029] System call wrappers part 27Heiko Carstens2009-01-141-9/+9
* keys: fix sparse warning by adding __user annotation to castJames Morris2009-01-011-1/+1
* KEYS: Fix variable uninitialisation warningsDavid Howells2008-12-291-3/+3
* CRED: Make execve() take advantage of copy-on-write credentialsDavid Howells2008-11-141-42/+0
* CRED: Inaugurate COW credentialsDavid Howells2008-11-149-269/+317
* CRED: Separate per-task-group keyrings from signal_structDavid Howells2008-11-142-80/+54
* CRED: Use RCU to access another task's creds and to release a task's own credsDavid Howells2008-11-142-14/+20
* CRED: Wrap current->cred and a few other accessorsDavid Howells2008-11-142-6/+7
* CRED: Separate task security context from task_structDavid Howells2008-11-145-78/+86
* KEYS: Alter use of key instantiation link-to-keyring argumentDavid Howells2008-11-145-111/+187