summaryrefslogtreecommitdiffstats
path: root/security/keys
Commit message (Expand)AuthorAgeFilesLines
...
| * keys: fix an RCU warningDavid Howells2010-04-241-5/+8
| * include cleanup: Update gfp.h and slab.h includes to prepare for breaking imp...Tejun Heo2010-03-302-2/+0
* | security: whitespace coding style fixesJustin P. Mattock2010-04-235-42/+42
* | security: remove dead hook key_session_to_parentEric Paris2010-04-121-7/+0
* | Security: key: keyring: fix some code style issuesChihau Chau2010-03-101-4/+3
* | Security: Fix some coding styles in security/keys/keyring.cwzt.wzt@gmail.com2010-03-051-4/+2
|/
* security: Apply lockdep-based checking to rcu_dereference() usesPaul E. McKenney2010-02-252-2/+5
* Keys: KEYCTL_SESSION_TO_PARENT needs TIF_NOTIFY_RESUME architecture supportGeert Uytterhoeven2009-12-171-0/+10
* keys: PTR_ERR return of wrong pointer in keyctl_get_security()Roel Kluin2009-12-171-1/+1
* sysctl: Drop & in front of every proc_handler.Eric W. Biederman2009-11-181-5/+5
* sysctl security/keys: Remove dead binary sysctl supportEric W. Biederman2009-11-121-6/+1
* KEYS: get_instantiation_keyring() should inc the keyring refcount in all casesDavid Howells2009-10-151-1/+1
* KEYS: Have the garbage collector set its timer for live expired keysDavid Howells2009-09-231-2/+2
* KEYS: Fix garbage collectorDavid Howells2009-09-154-35/+73
* KEYS: Unlock tasklist when exiting early from keyctl_session_to_parentMarc Dionne2009-09-151-0/+1
* KEYS: Add a keyctl to install a process's session keyring on its parent [try #6]David Howells2009-09-025-0/+156
* KEYS: Do some whitespace cleanups [try #6]David Howells2009-09-021-9/+3
* KEYS: Make /proc/keys use keyid not numread as file position [try #6]Serge E. Hallyn2009-09-021-22/+55
* KEYS: Add garbage collection for dead, revoked and expired keys. [try #6]David Howells2009-09-027-4/+322
* KEYS: Flag dead keys to induce EKEYREVOKED [try #6]David Howells2009-09-021-1/+3
* KEYS: Allow keyctl_revoke() on keys that have SETATTR but not WRITE perm [try...David Howells2009-09-021-1/+7
* KEYS: Deal with dead-type keys appropriately [try #6]David Howells2009-09-024-31/+48
* kernel: rename is_single_threaded(task) to current_is_single_threaded(void)Oleg Nesterov2009-07-171-1/+1
* keys: annotate seqfile ops with __releases and __acquiresJames Morris2009-06-251-0/+4
* keys: Handle there being no fallback destination keyring for request_key()David Howells2009-04-091-3/+6
* keys: make procfiles per-user-namespaceSerge E. Hallyn2009-02-271-6/+49
* keys: skip keys from another user namespaceSerge E. Hallyn2009-02-271-0/+3
* keys: consider user namespace in key_permissionSerge E. Hallyn2009-02-271-0/+5
* keys: distinguish per-uid keys in different namespacesSerge E. Hallyn2009-02-275-5/+16
* security: introduce missing kfreeVegard Nossum2009-01-171-0/+1
* [CVE-2009-0029] System call wrappers part 28Heiko Carstens2009-01-141-2/+2
* [CVE-2009-0029] System call wrappers part 27Heiko Carstens2009-01-141-9/+9
* keys: fix sparse warning by adding __user annotation to castJames Morris2009-01-011-1/+1
* KEYS: Fix variable uninitialisation warningsDavid Howells2008-12-291-3/+3
* CRED: Make execve() take advantage of copy-on-write credentialsDavid Howells2008-11-141-42/+0
* CRED: Inaugurate COW credentialsDavid Howells2008-11-149-269/+317
* CRED: Separate per-task-group keyrings from signal_structDavid Howells2008-11-142-80/+54
* CRED: Use RCU to access another task's creds and to release a task's own credsDavid Howells2008-11-142-14/+20
* CRED: Wrap current->cred and a few other accessorsDavid Howells2008-11-142-6/+7
* CRED: Separate task security context from task_structDavid Howells2008-11-145-78/+86
* KEYS: Alter use of key instantiation link-to-keyring argumentDavid Howells2008-11-145-111/+187
* KEYS: Disperse linux/key_ui.hDavid Howells2008-11-143-1/+33
* CRED: Wrap task credential accesses in the key management codeDavid Howells2008-11-144-8/+8
* keys: remove unused key_alloc_semDaniel Walker2008-06-061-1/+0
* keys: explicitly include required slab.h header file.Robert P. J. Day2008-04-292-0/+2
* keys: make the keyring quotas controllable through /proc/sysDavid Howells2008-04-296-15/+94
* keys: don't generate user and user session keyrings unless they're accessedDavid Howells2008-04-294-118/+92
* keys: allow clients to set key perms in key_create_or_update()Arun Raghavan2008-04-292-9/+12
* keys: switch to proc_create()Alexey Dobriyan2008-04-291-6/+2
* keys: add keyctl function to get a security labelDavid Howells2008-04-293-1/+71
OpenPOWER on IntegriCloud