summaryrefslogtreecommitdiffstats
path: root/security/keys/process_keys.c
Commit message (Expand)AuthorAgeFilesLines
* KEYS: Merge the type-specific data with the payload dataDavid Howells2015-10-211-2/+2
* capabilities: ambient capabilitiesAndy Lutomirski2015-09-041-0/+1
* KEYS: Make the key matching functions return boolDavid Howells2014-09-161-2/+2
* KEYS: Preparse match dataDavid Howells2014-09-161-6/+7
* KEYS: initialize root uid and session keyrings earlyMimi Zohar2013-09-251-0/+10
* KEYS: Define a __key_get() wrapper to use rather than atomic_inc()David Howells2013-09-241-8/+8
* KEYS: Introduce a search context structureDavid Howells2013-09-241-59/+58
* KEYS: Skip key state checks when checking for possessionDavid Howells2013-09-241-3/+5
* keys: fix race with concurrent install_user_keyrings()David Howells2013-03-121-1/+1
* userns: Stop oopsing in key_change_session_keyringEric W. Biederman2013-03-031-1/+1
* KEYS: Revert one application of "Fix unreachable code" patchDavid Howells2013-02-211-0/+2
* keys: fix unreachable codeAlan Cox2012-12-201-2/+0
* Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/jmo...Linus Torvalds2012-12-161-53/+39
|\
| * KEYS: Reduce initial permissions on keysDavid Howells2012-10-021-9/+17
| * KEYS: Make the session and process keyrings per-threadDavid Howells2012-10-021-44/+22
| * keys: Fix unreachable codeAlan Cox2012-09-281-2/+0
* | Merge branch 'master' into for-nextJiri Kosina2012-10-281-7/+8
|\ \
| * | userns: Convert security/keys to the new userns infrastructureEric W. Biederman2012-09-131-7/+8
| |/
* | keys: Fix unreachable codeAlan Cox2012-10-251-2/+0
|/
* merge task_work and rcu_head, get rid of separate allocation for keyring caseAl Viro2012-07-221-4/+2
* trimming task_work: kill ->dataAl Viro2012-07-221-2/+3
* keys: change keyctl_session_to_parent() to use task_work_add()Oleg Nesterov2012-05-231-13/+7
* Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/ebi...Linus Torvalds2012-05-231-1/+1
|\
| * cred: Refcount the user_ns pointed to by the cred.Eric W. Biederman2012-04-071-1/+1
| * userns: Use cred->user_ns instead of cred->user->user_nsEric W. Biederman2012-04-071-1/+1
* | KEYS: Do LRU discard in full keyringsDavid Howells2012-05-111-0/+2
|/
* KEYS: testing wrong bit for KEY_FLAG_REVOKEDDan Carpenter2012-03-071-1/+2
* KEYS: keyctl_get_keyring_ID() should create a session keyring if create flag setDavid Howells2011-08-231-2/+12
* KEYS: If install_session_keyring() is given a keyring, it should install itDavid Howells2011-08-231-1/+1
* Set cred->user_ns in key_replace_session_keyringSerge E. Hallyn2011-05-261-0/+1
* KEYS: Improve /proc/keysDavid Howells2011-03-171-5/+7
* KEYS: Fix up comments in key management codeDavid Howells2011-01-211-37/+75
* KEYS: Do some style cleanup in the key management code.David Howells2011-01-211-18/+5
* Fix install_process_keyring error handlingAndi Kleen2010-10-281-1/+1
* KEYS: Make /proc/keys check to see if a key is possessed before security checkDavid Howells2010-08-021-21/+43
* umh: creds: convert call_usermodehelper_keys() to use subprocess_info->init()Oleg Nesterov2010-05-271-2/+1
* KEYS: Return more accurate error codesDan Carpenter2010-05-181-3/+3
* include cleanup: Update gfp.h and slab.h includes to prepare for breaking imp...Tejun Heo2010-03-301-1/+0
* KEYS: Add a keyctl to install a process's session keyring on its parent [try #6]David Howells2009-09-021-0/+49
* KEYS: Deal with dead-type keys appropriately [try #6]David Howells2009-09-021-5/+13
* kernel: rename is_single_threaded(task) to current_is_single_threaded(void)Oleg Nesterov2009-07-171-1/+1
* keys: distinguish per-uid keys in different namespacesSerge E. Hallyn2009-02-271-0/+2
* CRED: Make execve() take advantage of copy-on-write credentialsDavid Howells2008-11-141-42/+0
* CRED: Inaugurate COW credentialsDavid Howells2008-11-141-169/+164
* CRED: Separate per-task-group keyrings from signal_structDavid Howells2008-11-141-60/+40
* CRED: Use RCU to access another task's creds and to release a task's own credsDavid Howells2008-11-141-10/+14
* CRED: Wrap current->cred and a few other accessorsDavid Howells2008-11-141-1/+1
* CRED: Separate task security context from task_structDavid Howells2008-11-141-47/+51
* KEYS: Alter use of key instantiation link-to-keyring argumentDavid Howells2008-11-141-34/+54
* keys: don't generate user and user session keyrings unless they're accessedDavid Howells2008-04-291-59/+83
OpenPOWER on IntegriCloud