summaryrefslogtreecommitdiffstats
path: root/security/keys/keyring.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* KEYS: Fix keyring content gc scannerDavid Howells2013-11-141-10/+35
* KEYS: Fix keyring quota misaccounting on key replacement and unlinkDavid Howells2013-10-301-12/+15
* KEYS: Fix a race between negating a key and reading the error setDavid Howells2013-10-301-0/+1
* KEYS: Add a 'trusted' flag and a 'trusted only' flagDavid Howells2013-09-251-0/+4
* KEYS: Expand the capacity of a keyringDavid Howells2013-09-241-693/+743
* KEYS: Drop the permissions argument from __keyring_search_one()David Howells2013-09-241-6/+3
* KEYS: Define a __key_get() wrapper to use rather than atomic_inc()David Howells2013-09-241-3/+3
* KEYS: Introduce a search context structureDavid Howells2013-09-241-35/+35
* KEYS: Consolidate the concept of an 'index key' for key accessDavid Howells2013-09-241-18/+19
* KEYS: Use bool in make_key_ref() and is_key_possessed()David Howells2013-09-241-2/+3
* Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/jmo...Linus Torvalds2012-12-171-6/+4
|\
| * Merge branch 'modsign-keys-devel' into security-next-keysDavid Howells2012-10-021-3/+3
| |\
| | * KEYS: Add payload preparsing opportunity prior to key instantiate or updateDavid Howells2012-09-131-3/+3
| * | KEYS: Use keyring_alloc() to create special keyringsDavid Howells2012-10-021-0/+1
| * | KEYS: Reduce initial permissions on keysDavid Howells2012-10-021-6/+3
| |/
* | Merge branch 'modules-next' of git://git.kernel.org/pub/scm/linux/kernel/git/...Linus Torvalds2012-10-141-3/+3
|\ \
| * | KEYS: Add payload preparsing opportunity prior to key instantiate or updateDavid Howells2012-10-081-3/+3
| |/
* / userns: Convert security/keys to the new userns infrastructureEric W. Biederman2012-09-141-2/+2
|/
* KEYS: Fix some sparse warningsDavid Howells2012-05-251-0/+2
* KEYS: Add invalidation supportDavid Howells2012-05-111-14/+11
* KEYS: Do LRU discard in full keyringsDavid Howells2012-05-111-7/+40
* KEYS: Permit in-place link replacement in keyring listDavid Howells2012-05-111-39/+56
* KEYS: Add missing smp_rmb() primitives to the keyring search codeDavid Howells2012-01-181-7/+15
* KEYS: __key_link() should use the RCU deref wrapper for keyring payloadsDavid Howells2011-08-231-2/+1
* rcu: treewide: Do not use rcu_read_lock_held when calling rcu_dereference_checkMichal Hocko2011-07-081-1/+0
* KEYS: Improve /proc/keysDavid Howells2011-03-171-13/+24
* KEYS: Add a new keyctl op to reject a key with a specified error codeDavid Howells2011-03-081-2/+2
* KEYS: Fix __key_link_end() quota fixup on errorDavid Howells2011-01-251-12/+19
* KEYS: Fix up comments in key management codeDavid Howells2011-01-211-72/+159
* KEYS: Do some style cleanup in the key management code.David Howells2011-01-211-48/+16
* kernel-wide: replace USHORT_MAX, SHORT_MAX and SHORT_MIN with USHRT_MAX, SHRT...Alexey Dobriyan2010-05-251-3/+3
* KEYS: Do preallocation for __key_link()David Howells2010-05-061-97/+145
* Merge branch 'master' into nextJames Morris2010-05-061-19/+22
|\
| * KEYS: Use RCU dereference wrappers in keyring key type codeDavid Howells2010-05-051-10/+13
| * KEYS: find_keyring_by_name() can gain access to a freed keyringToshiyuki Okajima2010-05-051-9/+9
* | KEYS: keyring_serialise_link_sem is only needed for keyring->keyring linksDavid Howells2010-05-061-7/+9
* | Merge branch 'master' into nextJames Morris2010-05-061-1/+1
|\|
| * keys: don't need to use RCU in keyring_read() as semaphore is heldDavid Howells2010-04-281-1/+1
* | security: whitespace coding style fixesJustin P. Mattock2010-04-231-10/+10
* | Security: key: keyring: fix some code style issuesChihau Chau2010-03-091-4/+3
* | Security: Fix some coding styles in security/keys/keyring.cwzt.wzt@gmail.com2010-03-041-4/+2
|/
* security: Apply lockdep-based checking to rcu_dereference() usesPaul E. McKenney2010-02-251-1/+3
* KEYS: Fix garbage collectorDavid Howells2009-09-151-5/+19
* KEYS: Add garbage collection for dead, revoked and expired keys. [try #6]David Howells2009-09-021-0/+85
* keys: skip keys from another user namespaceSerge E. Hallyn2009-02-271-0/+3
* CRED: Inaugurate COW credentialsDavid Howells2008-11-141-7/+7
* KEYS: Disperse linux/key_ui.hDavid Howells2008-11-141-0/+1
* keys: don't generate user and user session keyrings unless they're accessedDavid Howells2008-04-291-12/+7
* keys: check starting keyring as part of searchKevin Coffman2008-04-291-4/+31
* [AF_RXRPC]: Key facility changes for AF_RXRPCDavid Howells2007-04-271-0/+2