aboutsummaryrefslogtreecommitdiffstats
path: root/security/keys/process_keys.c (follow)
AgeCommit message (Expand)AuthorFilesLines
2017-03-02sched/headers: Prepare for new header dependencies before moving code to <linux/sched/user.h>Ingo Molnar1-0/+1
2016-12-24Replace <asm/uaccess.h> with <linux/uaccess.h> globallyLinus Torvalds1-1/+1
2016-04-11KEYS: Add a facility to restrict new links into a keyringDavid Howells1-6/+10
2016-01-20KEYS: Fix keyring ref leak in join_session_keyring()Yevgeny Pats1-0/+1
2015-10-21KEYS: Merge the type-specific data with the payload dataDavid Howells1-2/+2
2015-09-04capabilities: ambient capabilitiesAndy Lutomirski1-0/+1
2014-09-16KEYS: Make the key matching functions return boolDavid Howells1-2/+2
2014-09-16KEYS: Preparse match dataDavid Howells1-6/+7
2013-09-25KEYS: initialize root uid and session keyrings earlyMimi Zohar1-0/+10
2013-09-24KEYS: Define a __key_get() wrapper to use rather than atomic_inc()David Howells1-8/+8
2013-09-24KEYS: Introduce a search context structureDavid Howells1-59/+58
2013-09-24KEYS: Skip key state checks when checking for possessionDavid Howells1-3/+5
2013-03-12keys: fix race with concurrent install_user_keyrings()David Howells1-1/+1
2013-03-03userns: Stop oopsing in key_change_session_keyringEric W. Biederman1-1/+1
2013-02-21KEYS: Revert one application of "Fix unreachable code" patchDavid Howells1-0/+2
2012-12-20keys: fix unreachable codeAlan Cox1-2/+0
2012-12-16Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-securityLinus Torvalds1-53/+39
2012-10-28Merge branch 'master' into for-nextJiri Kosina1-7/+8
2012-10-25keys: Fix unreachable codeAlan Cox1-2/+0
2012-10-02KEYS: Reduce initial permissions on keysDavid Howells1-9/+17
2012-10-02KEYS: Make the session and process keyrings per-threadDavid Howells1-44/+22
2012-09-28keys: Fix unreachable codeAlan Cox1-2/+0
2012-09-13userns: Convert security/keys to the new userns infrastructureEric W. Biederman1-7/+8
2012-07-22merge task_work and rcu_head, get rid of separate allocation for keyring caseAl Viro1-4/+2
2012-07-22trimming task_work: kill ->dataAl Viro1-2/+3
2012-05-23keys: change keyctl_session_to_parent() to use task_work_add()Oleg Nesterov1-13/+7
2012-05-23Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/ebiederm/user-namespaceLinus Torvalds1-1/+1
2012-05-11KEYS: Do LRU discard in full keyringsDavid Howells1-0/+2
2012-04-07cred: Refcount the user_ns pointed to by the cred.Eric W. Biederman1-1/+1
2012-04-07userns: Use cred->user_ns instead of cred->user->user_nsEric W. Biederman1-1/+1
2012-03-07KEYS: testing wrong bit for KEY_FLAG_REVOKEDDan Carpenter1-1/+2
2011-08-23KEYS: keyctl_get_keyring_ID() should create a session keyring if create flag setDavid Howells1-2/+12
2011-08-23KEYS: If install_session_keyring() is given a keyring, it should install itDavid Howells1-1/+1
2011-05-26Set cred->user_ns in key_replace_session_keyringSerge E. Hallyn1-0/+1
2011-03-17KEYS: Improve /proc/keysDavid Howells1-5/+7
2011-01-21KEYS: Fix up comments in key management codeDavid Howells1-37/+75
2011-01-21KEYS: Do some style cleanup in the key management code.David Howells1-18/+5
2010-10-28Fix install_process_keyring error handlingAndi Kleen1-1/+1
2010-08-02KEYS: Make /proc/keys check to see if a key is possessed before security checkDavid Howells1-21/+43
2010-05-27umh: creds: convert call_usermodehelper_keys() to use subprocess_info->init()Oleg Nesterov1-2/+1
2010-05-18KEYS: Return more accurate error codesDan Carpenter1-3/+3
2010-03-30include cleanup: Update gfp.h and slab.h includes to prepare for breaking implicit slab.h inclusion from percpu.hTejun Heo1-1/+0
2009-09-02KEYS: Add a keyctl to install a process's session keyring on its parent [try #6]David Howells1-0/+49
2009-09-02KEYS: Deal with dead-type keys appropriately [try #6]David Howells1-5/+13
2009-07-17kernel: rename is_single_threaded(task) to current_is_single_threaded(void)Oleg Nesterov1-1/+1
2009-02-27keys: distinguish per-uid keys in different namespacesSerge E. Hallyn1-0/+2
2008-11-14CRED: Make execve() take advantage of copy-on-write credentialsDavid Howells1-42/+0
2008-11-14CRED: Inaugurate COW credentialsDavid Howells1-169/+164
2008-11-14CRED: Separate per-task-group keyrings from signal_structDavid Howells1-60/+40
2008-11-14CRED: Use RCU to access another task's creds and to release a task's own credsDavid Howells1-10/+14