Gitiles
Code Review
Sign In
gerrit-public.fairphone.software
/
kernel
/
msm-4.9
/
47ac9aa165540b43deb3582f186073884de1cf3b
/
security
/
keys
« Previous
ee009e4a0
KEYS: Add an iovec version of KEYCTL_INSTANTIATE
by David Howells
· 14 years ago
fdd1b94
KEYS: Add a new keyctl op to reject a key with a specified error code
by David Howells
· 14 years ago
b9fffa3
KEYS: Add a key type op to permit the key description to be vetted
by David Howells
· 14 years ago
633e804
KEYS: Add an RCU payload dereference macro
by David Howells
· 14 years ago
ceb73c1
KEYS: Fix __key_link_end() quota fixup on error
by David Howells
· 14 years ago
5403110
trusted keys: Fix a memory leak in trusted_update().
by Jesper Juhl
· 14 years ago
b970344
encrypted-keys: rename encrypted_defined files to encrypted
by Mimi Zohar
· 14 years ago
4b174b6
trusted-keys: rename trusted_defined files to trusted
by Mimi Zohar
· 14 years ago
973c9f4
KEYS: Fix up comments in key management code
by David Howells
· 14 years ago
a8b17ed
KEYS: Do some style cleanup in the key management code.
by David Howells
· 14 years ago
154a96b
trusted-keys: avoid scattring va_end()
by Tetsuo Handa
· 14 years ago
0e7491f
trusted-keys: check for NULL before using it
by Tetsuo Handa
· 14 years ago
35576ea
trusted-keys: another free memory bugfix
by Tetsuo Handa
· 14 years ago
40c1001
trusted-keys: free memory bugfix
by Mimi Zohar
· 14 years ago
d2e7ad1
Merge branch 'master' into next
by James Morris
· 14 years ago
3fc5e98
KEYS: Don't call up_write() if __key_link_begin() returns an error
by David Howells
· 14 years ago
3b1826c
encrypted-keys: style and other cleanup
by Mimi Zohar
· 14 years ago
1f35065
encrypted-keys: verify datablob size before converting to binary
by Mimi Zohar
· 14 years ago
1bdbb40
trusted-keys: kzalloc and other cleanup
by Mimi Zohar
· 14 years ago
bc5e0af
trusted-keys: additional TSS return code and other error handling
by Mimi Zohar
· 14 years ago
93ae86e
keys: add missing include file for trusted and encrypted keys
by Mimi Zohar
· 14 years ago
7e70cb4
keys: add new key-type encrypted
by Mimi Zohar
· 14 years ago
d00a1c7
keys: add new trusted key-type
by Mimi Zohar
· 14 years ago
27d6379
Fix install_process_keyring error handling
by Andi Kleen
· 14 years ago
3d96406
KEYS: Fix bug in keyctl_session_to_parent() if parent has no session keyring
by David Howells
· 14 years ago
9d1ac65
KEYS: Fix RCU no-lock warning in keyctl_session_to_parent()
by David Howells
· 14 years ago
12fdff3
Add a dummy printk function for the maintenance of unused printks
by David Howells
· 14 years ago
1e456a1
KEYS: request_key() should return -ENOKEY if the constructed key is negative
by David Howells
· 14 years ago
5ad18a0
KEYS: Reinstate lost passing of process keyring ID in call_sbin_request_key()
by Justin P. Mattock
· 14 years ago
94fd840
KEYS: Use the variable 'key' in keyctl_describe_key()
by David Howells
· 14 years ago
927942a
KEYS: Make /proc/keys check to see if a key is possessed before security check
by David Howells
· 14 years ago
9156235
KEYS: Authorise keyctl_set_timeout() on a key if we have its authorisation key
by David Howells
· 14 years ago
4303ef1
KEYS: Propagate error code instead of returning -EINVAL
by Dan Carpenter
· 14 years ago
dd98acf
keyctl_session_to_parent(): use thread_group_empty() to check singlethreadness
by Oleg Nesterov
· 14 years ago
685bfd2
umh: creds: convert call_usermodehelper_keys() to use subprocess_info->init()
by Oleg Nesterov
· 14 years ago
4be929b
kernel-wide: replace USHORT_MAX, SHORT_MAX and SHORT_MIN with USHRT_MAX, SHRT_MAX and SHRT_MIN
by Alexey Dobriyan
· 14 years ago
4d09ec0
KEYS: Return more accurate error codes
by Dan Carpenter
· 14 years ago
f70e2e0
KEYS: Do preallocation for __key_link()
by David Howells
· 15 years ago
043b4d4
Merge branch 'master' into next
by James Morris
· 15 years ago
2b9e468
KEYS: Better handling of errors from construct_alloc_key()
by David Howells
· 15 years ago
553d603
KEYS: keyring_serialise_link_sem is only needed for keyring->keyring links
by David Howells
· 15 years ago
0ffbe26
Merge branch 'master' into next
by James Morris
· 15 years ago
896903c
KEYS: call_sbin_request_key() must write lock keyrings before modifying them
by David Howells
· 15 years ago
f0641cb
KEYS: Use RCU dereference wrappers in keyring key type code
by David Howells
· 15 years ago
cea7daa
KEYS: find_keyring_by_name() can gain access to a freed keyring
by Toshiyuki Okajima
· 15 years ago
cf8304e
KEYS: Fix RCU handling in key_gc_keyring()
by David Howells
· 15 years ago
d9a9b4a
KEYS: Fix an RCU warning in the reading of user keys
by David Howells
· 15 years ago
1600f9d
Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/security-testing-2.6
by Linus Torvalds
· 15 years ago
03449cd
keys: the request_key() syscall should link an existing key to the dest keyring
by David Howells
· 15 years ago
b59ec78
keys: don't need to use RCU in keyring_read() as semaphore is held
by David Howells
· 15 years ago
93b4a44
keys: fix an RCU warning
by David Howells
· 15 years ago
c5b60b5
security: whitespace coding style fixes
by Justin P. Mattock
· 15 years ago
3011a34
security: remove dead hook key_session_to_parent
by Eric Paris
· 15 years ago
5a0e3ad
include cleanup: Update gfp.h and slab.h includes to prepare for breaking implicit slab.h inclusion from percpu.h
by Tejun Heo
· 15 years ago
512ea3b
Security: key: keyring: fix some code style issues
by Chihau Chau
· 15 years ago
c856347
Security: Fix some coding styles in security/keys/keyring.c
by wzt.wzt@gmail.com
· 15 years ago
e7b0a61
security: Apply lockdep-based checking to rcu_dereference() uses
by Paul E. McKenney
· 15 years ago
a00ae4d
Keys: KEYCTL_SESSION_TO_PARENT needs TIF_NOTIFY_RESUME architecture support
by Geert Uytterhoeven
· 15 years ago
fa1cc7b
keys: PTR_ERR return of wrong pointer in keyctl_get_security()
by Roel Kluin
· 15 years ago
6d45611
sysctl: Drop & in front of every proc_handler.
by Eric W. Biederman
· 15 years ago
5cdb355
sysctl security/keys: Remove dead binary sysctl support
by Eric W. Biederman
· 16 years ago
21279cf
KEYS: get_instantiation_keyring() should inc the keyring refcount in all cases
by David Howells
· 15 years ago
606531c
KEYS: Have the garbage collector set its timer for live expired keys
by David Howells
· 15 years ago
c08ef80
KEYS: Fix garbage collector
by David Howells
· 15 years ago
5c84342
KEYS: Unlock tasklist when exiting early from keyctl_session_to_parent
by Marc Dionne
· 15 years ago
ee18d64
KEYS: Add a keyctl to install a process's session keyring on its parent [try #6]
by David Howells
· 15 years ago
7b1b916
KEYS: Do some whitespace cleanups [try #6]
by David Howells
· 15 years ago
ad73a71
KEYS: Make /proc/keys use keyid not numread as file position [try #6]
by Serge E. Hallyn
· 15 years ago
5d13544
KEYS: Add garbage collection for dead, revoked and expired keys. [try #6]
by David Howells
· 15 years ago
f041ae2
KEYS: Flag dead keys to induce EKEYREVOKED [try #6]
by David Howells
· 15 years ago
0c2c9a3
KEYS: Allow keyctl_revoke() on keys that have SETATTR but not WRITE perm [try #6]
by David Howells
· 15 years ago
5593122
KEYS: Deal with dead-type keys appropriately [try #6]
by David Howells
· 15 years ago
5bb459b
kernel: rename is_single_threaded(task) to current_is_single_threaded(void)
by Oleg Nesterov
· 15 years ago
86abcf9
keys: annotate seqfile ops with __releases and __acquires
by James Morris
· 15 years ago
34574dd
keys: Handle there being no fallback destination keyring for request_key()
by David Howells
· 16 years ago
454804a
keys: make procfiles per-user-namespace
by Serge E. Hallyn
· 16 years ago
2ea190d
keys: skip keys from another user namespace
by Serge E. Hallyn
· 16 years ago
8ff3bc3
keys: consider user namespace in key_permission
by Serge E. Hallyn
· 16 years ago
1d1e975
keys: distinguish per-uid keys in different namespaces
by Serge E. Hallyn
· 16 years ago
0d54ee1
security: introduce missing kfree
by Vegard Nossum
· 16 years ago
938bb9f
[CVE-2009-0029] System call wrappers part 28
by Heiko Carstens
· 16 years ago
1e7bfb2
[CVE-2009-0029] System call wrappers part 27
by Heiko Carstens
· 16 years ago
90bd49a
keys: fix sparse warning by adding __user annotation to cast
by James Morris
· 16 years ago
eca1bf5
KEYS: Fix variable uninitialisation warnings
by David Howells
· 16 years ago
a6f76f2
CRED: Make execve() take advantage of copy-on-write credentials
by David Howells
· 16 years ago
d84f4f9
CRED: Inaugurate COW credentials
by David Howells
· 16 years ago
bb952bb
CRED: Separate per-task-group keyrings from signal_struct
by David Howells
· 16 years ago
c69e8d9
CRED: Use RCU to access another task's creds and to release a task's own creds
by David Howells
· 16 years ago
86a264a
CRED: Wrap current->cred and a few other accessors
by David Howells
· 16 years ago
b6dff3e
CRED: Separate task security context from task_struct
by David Howells
· 16 years ago
8bbf4976
KEYS: Alter use of key instantiation link-to-keyring argument
by David Howells
· 16 years ago
e9e349b
KEYS: Disperse linux/key_ui.h
by David Howells
· 16 years ago
47d804b
CRED: Wrap task credential accesses in the key management code
by David Howells
· 16 years ago
dba6a4d
keys: remove unused key_alloc_sem
by Daniel Walker
· 16 years ago
fdb89bc
keys: explicitly include required slab.h header file.
by Robert P. J. Day
· 17 years ago
0b77f5b
keys: make the keyring quotas controllable through /proc/sys
by David Howells
· 17 years ago
69664cf
keys: don't generate user and user session keyrings unless they're accessed
by David Howells
· 17 years ago
6b79ccb
keys: allow clients to set key perms in key_create_or_update()
by Arun Raghavan
· 17 years ago
da91d2e
keys: switch to proc_create()
by Alexey Dobriyan
· 17 years ago
70a5bb7
keys: add keyctl function to get a security label
by David Howells
· 17 years ago
Next »