aboutsummaryrefslogtreecommitdiffstats
path: root/security/keys
Commit message (Expand)AuthorAgeFilesLines
* first round of updates to the security codeWolfgang Wiedmeyer2015-10-2312-1196/+320
* initial merge with 3.2.72Wolfgang Wiedmeyer2015-10-236-0/+1273
|\
| * KEYS: close race between key lookup and freeingSasha Levin2015-02-201-2/+2
| * KEYS: Fix stale key registration at error pathTakashi Iwai2015-02-201-1/+4
| * key: Fix resource leakAlan Cox2013-04-101-2/+2
| * Fix: compat_rw_copy_check_uvector() misuse in aio, readv, writev, and securit...Mathieu Desnoyers2013-03-201-2/+2
| * keys: fix race with concurrent install_user_keyrings()David Howells2013-03-201-1/+1
| * encrypted-keys: module build fixesMimi Zohar2011-11-162-3/+8
| * encrypted-keys: fix error return codeMimi Zohar2011-11-161-1/+1
| * KEYS: Fix a NULL pointer deref in the user-defined key typeDavid Howells2011-11-151-1/+2
| * security: follow rename pack_hex_byte() to hex_byte_pack()Andy Shevchenko2011-10-312-2/+2
| * Cross Memory AttachChristopher Yeoh2011-10-312-2/+2
| * encrypted-keys: check hex2bin resultMimi Zohar2011-09-201-3/+11
| * trusted-keys: check hex2bin resultMimi Zohar2011-09-201-4/+15
| * encrypted-keys: IS_ERR need include/err.hStephen Rothwell2011-09-151-0/+1
| * encrypted-keys: remove trusted-keys dependencyMimi Zohar2011-09-144-27/+64
| * encrypted-keys: create encrypted-keys directoryMimi Zohar2011-09-146-1/+6
| * KEYS: Correctly destroy key payloads when their keytype is removedDavid Howells2011-08-233-208/+258
| * KEYS: The dead key link reaper should be non-reentrantDavid Howells2011-08-231-3/+3
| * KEYS: Make the key reaper non-reentrantDavid Howells2011-08-231-1/+1
| * KEYS: Move the unreferenced key reaper to the keys garbage collector fileDavid Howells2011-08-233-76/+85
| * KEYS: __key_link() should use the RCU deref wrapper for keyring payloadsDavid Howells2011-08-231-2/+1
| * KEYS: keyctl_get_keyring_ID() should create a session keyring if create flag setDavid Howells2011-08-231-2/+12
| * KEYS: If install_session_keyring() is given a keyring, it should install itDavid Howells2011-08-231-1/+1
| * Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/jmo...Linus Torvalds2011-07-275-53/+313
| |\
| | * Merge branch 'linus' into nextJames Morris2011-06-301-3/+3
| | |\
| | * | encrypted-keys: add ecryptfs format supportRoberto Sassu2011-06-274-8/+180
| | * | encrypted-keys: add key format supportRoberto Sassu2011-06-271-40/+101
| | * | encrypted-keys: added additional debug messagesRoberto Sassu2011-06-271-11/+34
| | * | encrypted-keys: fixed valid_master_desc() function descriptionRoberto Sassu2011-06-271-1/+1
| | * | encrypted_keys: avoid dumping the master key if the request failsRoberto Sassu2011-06-271-3/+5
| | * | KEYS: Don't return EAGAIN to keyctl_assume_authority()David Howells2011-06-141-0/+2
| * | | Merge branch 'master' into for-nextJiri Kosina2011-07-111-3/+3
| |\ \ \ | | | |/ | | |/|
| * | | rcu: treewide: Do not use rcu_read_lock_held when calling rcu_dereference_checkMichal Hocko2011-07-081-1/+0
| | |/ | |/|
* | | merged 3.0.101 tagWolfgang Wiedmeyer2015-10-223-5/+5
* | | KEYS: Fix a NULL pointer deref in the user-defined key typeDavid Howells2011-11-211-1/+2
| |/ |/|
* | KEYS: Fix error handling in construct_key_and_link()David Howells2011-06-211-1/+2
* | KEYS/DNS: Fix ____call_usermodehelper() to not lose the session keyringDavid Howells2011-06-171-2/+1
|/
* Merge branch 'docs-move' of git://git.kernel.org/pub/scm/linux/kernel/git/rdu...Linus Torvalds2011-05-274-4/+4
|\
| * Create Documentation/security/,Randy Dunlap2011-05-194-4/+4
* | Set cred->user_ns in key_replace_session_keyringSerge E. Hallyn2011-05-261-0/+1
* | Merge branch 'next' into for-linusJames Morris2011-05-248-25/+46
|\ \
| * | KEYS: Make request_key() and co. return an error for a negative keyDavid Howells2011-03-171-0/+6
| * | KEYS: Improve /proc/keysDavid Howells2011-03-177-25/+40
| |/
* | security,rcu: convert call_rcu(user_update_rcu_disposal) to kfree_rcu()Lai Jiangshan2011-05-071-14/+2
|/
* KEYS: Add an iovec version of KEYCTL_INSTANTIATEDavid Howells2011-03-083-7/+150
* KEYS: Add a new keyctl op to reject a key with a specified error codeDavid Howells2011-03-086-13/+56
* KEYS: Add a key type op to permit the key description to be vettedDavid Howells2011-03-081-0/+8
* KEYS: Add an RCU payload dereference macroDavid Howells2011-03-083-6/+3
* KEYS: Fix __key_link_end() quota fixup on errorDavid Howells2011-01-264-20/+27