| Commit message (Expand) | Author | Age | Files | Lines |
* | security: follow rename pack_hex_byte() to hex_byte_pack() | Andy Shevchenko | 2011-10-31 | 2 | -2/+2 |
* | Cross Memory Attach | Christopher Yeoh | 2011-10-31 | 2 | -2/+2 |
* | encrypted-keys: check hex2bin result | Mimi Zohar | 2011-09-20 | 1 | -3/+11 |
* | trusted-keys: check hex2bin result | Mimi Zohar | 2011-09-20 | 1 | -4/+15 |
* | encrypted-keys: IS_ERR need include/err.h | Stephen Rothwell | 2011-09-15 | 1 | -0/+1 |
* | encrypted-keys: remove trusted-keys dependency | Mimi Zohar | 2011-09-14 | 4 | -27/+64 |
* | encrypted-keys: create encrypted-keys directory | Mimi Zohar | 2011-09-14 | 6 | -1/+6 |
* | KEYS: Correctly destroy key payloads when their keytype is removed | David Howells | 2011-08-23 | 3 | -208/+258 |
* | KEYS: The dead key link reaper should be non-reentrant | David Howells | 2011-08-23 | 1 | -3/+3 |
* | KEYS: Make the key reaper non-reentrant | David Howells | 2011-08-23 | 1 | -1/+1 |
* | KEYS: Move the unreferenced key reaper to the keys garbage collector file | David Howells | 2011-08-23 | 3 | -76/+85 |
* | KEYS: __key_link() should use the RCU deref wrapper for keyring payloads | David Howells | 2011-08-23 | 1 | -2/+1 |
* | KEYS: keyctl_get_keyring_ID() should create a session keyring if create flag set | David Howells | 2011-08-23 | 1 | -2/+12 |
* | KEYS: If install_session_keyring() is given a keyring, it should install it | David Howells | 2011-08-23 | 1 | -1/+1 |
* | Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/jmo... | Linus Torvalds | 2011-07-27 | 5 | -53/+313 |
|\ |
|
| * | Merge branch 'linus' into next | James Morris | 2011-06-30 | 1 | -3/+3 |
| |\ |
|
| * | | encrypted-keys: add ecryptfs format support | Roberto Sassu | 2011-06-27 | 4 | -8/+180 |
| * | | encrypted-keys: add key format support | Roberto Sassu | 2011-06-27 | 1 | -40/+101 |
| * | | encrypted-keys: added additional debug messages | Roberto Sassu | 2011-06-27 | 1 | -11/+34 |
| * | | encrypted-keys: fixed valid_master_desc() function description | Roberto Sassu | 2011-06-27 | 1 | -1/+1 |
| * | | encrypted_keys: avoid dumping the master key if the request fails | Roberto Sassu | 2011-06-27 | 1 | -3/+5 |
| * | | KEYS: Don't return EAGAIN to keyctl_assume_authority() | David Howells | 2011-06-14 | 1 | -0/+2 |
* | | | Merge branch 'master' into for-next | Jiri Kosina | 2011-07-11 | 1 | -3/+3 |
|\ \ \
| | |/
| |/| |
|
| * | | KEYS: Fix error handling in construct_key_and_link() | David Howells | 2011-06-21 | 1 | -1/+2 |
| * | | KEYS/DNS: Fix ____call_usermodehelper() to not lose the session keyring | David Howells | 2011-06-17 | 1 | -2/+1 |
| |/ |
|
* | | rcu: treewide: Do not use rcu_read_lock_held when calling rcu_dereference_check | Michal Hocko | 2011-07-08 | 1 | -1/+0 |
|/ |
|
* | Merge branch 'docs-move' of git://git.kernel.org/pub/scm/linux/kernel/git/rdu... | Linus Torvalds | 2011-05-27 | 4 | -4/+4 |
|\ |
|
| * | Create Documentation/security/, | Randy Dunlap | 2011-05-19 | 4 | -4/+4 |
* | | Set cred->user_ns in key_replace_session_keyring | Serge E. Hallyn | 2011-05-26 | 1 | -0/+1 |
* | | Merge branch 'next' into for-linus | James Morris | 2011-05-24 | 8 | -25/+46 |
|\ \ |
|
| * | | KEYS: Make request_key() and co. return an error for a negative key | David Howells | 2011-03-17 | 1 | -0/+6 |
| * | | KEYS: Improve /proc/keys | David Howells | 2011-03-17 | 7 | -25/+40 |
| |/ |
|
* | | security,rcu: convert call_rcu(user_update_rcu_disposal) to kfree_rcu() | Lai Jiangshan | 2011-05-07 | 1 | -14/+2 |
|/ |
|
* | KEYS: Add an iovec version of KEYCTL_INSTANTIATE | David Howells | 2011-03-08 | 3 | -7/+150 |
* | KEYS: Add a new keyctl op to reject a key with a specified error code | David Howells | 2011-03-08 | 6 | -13/+56 |
* | KEYS: Add a key type op to permit the key description to be vetted | David Howells | 2011-03-08 | 1 | -0/+8 |
* | KEYS: Add an RCU payload dereference macro | David Howells | 2011-03-08 | 3 | -6/+3 |
* | KEYS: Fix __key_link_end() quota fixup on error | David Howells | 2011-01-26 | 4 | -20/+27 |
* | trusted keys: Fix a memory leak in trusted_update(). | Jesper Juhl | 2011-01-24 | 1 | -0/+1 |
* | encrypted-keys: rename encrypted_defined files to encrypted | Mimi Zohar | 2011-01-24 | 3 | -2/+3 |
* | trusted-keys: rename trusted_defined files to trusted | Mimi Zohar | 2011-01-24 | 3 | -2/+2 |
* | KEYS: Fix up comments in key management code | David Howells | 2011-01-21 | 11 | -366/+777 |
* | KEYS: Do some style cleanup in the key management code. | David Howells | 2011-01-21 | 10 | -248/+80 |
* | trusted-keys: avoid scattring va_end() | Tetsuo Handa | 2011-01-19 | 1 | -17/+13 |
* | trusted-keys: check for NULL before using it | Tetsuo Handa | 2011-01-19 | 1 | -0/+5 |
* | trusted-keys: another free memory bugfix | Tetsuo Handa | 2011-01-19 | 1 | -3/+5 |
* | trusted-keys: free memory bugfix | Mimi Zohar | 2011-01-14 | 1 | -5/+7 |
* | Merge branch 'master' into next | James Morris | 2011-01-10 | 1 | -1/+0 |
|\ |
|
| * | KEYS: Don't call up_write() if __key_link_begin() returns an error | David Howells | 2010-12-23 | 1 | -1/+0 |
* | | encrypted-keys: style and other cleanup | Mimi Zohar | 2010-12-15 | 2 | -37/+29 |