Commit Graph

116 Commits (20673406534176ead9b984a84b662928110f77b1)

Author SHA1 Message Date
David Howells 896903c2f5 KEYS: call_sbin_request_key() must write lock keyrings before modifying them 15 years ago
David Howells f0641cba77 KEYS: Use RCU dereference wrappers in keyring key type code 15 years ago
Toshiyuki Okajima cea7daa358 KEYS: find_keyring_by_name() can gain access to a freed keyring 15 years ago
David Howells cf8304e8f3 KEYS: Fix RCU handling in key_gc_keyring() 15 years ago
David Howells d9a9b4aeea KEYS: Fix an RCU warning in the reading of user keys 15 years ago
David Howells e35ec2d2c1 KEYS: Fix an RCU warning in the reading of user keys 15 years ago
David Howells bfeb0360de KEYS: Fix an RCU warning 15 years ago
David Howells 03449cd9ea keys: the request_key() syscall should link an existing key to the dest keyring 15 years ago
David Howells b59ec78cdc keys: don't need to use RCU in keyring_read() as semaphore is held 15 years ago
David Howells 93b4a44f3a keys: fix an RCU warning 15 years ago
Tejun Heo 5a0e3ad6af include cleanup: Update gfp.h and slab.h includes to prepare for breaking implicit slab.h inclusion from percpu.h 15 years ago
Paul E. McKenney e7b0a61b79 security: Apply lockdep-based checking to rcu_dereference() uses 15 years ago
Geert Uytterhoeven a00ae4d21b Keys: KEYCTL_SESSION_TO_PARENT needs TIF_NOTIFY_RESUME architecture support 15 years ago
Roel Kluin fa1cc7b5a5 keys: PTR_ERR return of wrong pointer in keyctl_get_security() 15 years ago
Eric W. Biederman 6d4561110a sysctl: Drop & in front of every proc_handler. 15 years ago
Eric W. Biederman 5cdb35557d sysctl security/keys: Remove dead binary sysctl support 15 years ago
David Howells 21279cfa10 KEYS: get_instantiation_keyring() should inc the keyring refcount in all cases 16 years ago
David Howells 606531c316 KEYS: Have the garbage collector set its timer for live expired keys 16 years ago
David Howells c08ef808ef KEYS: Fix garbage collector 16 years ago
Marc Dionne 5c84342a3e KEYS: Unlock tasklist when exiting early from keyctl_session_to_parent 16 years ago
David Howells ee18d64c1f KEYS: Add a keyctl to install a process's session keyring on its parent [try #6] 16 years ago
David Howells 7b1b916459 KEYS: Do some whitespace cleanups [try #6] 16 years ago
Serge E. Hallyn ad73a717e0 KEYS: Make /proc/keys use keyid not numread as file position [try #6] 16 years ago
David Howells 5d135440fa KEYS: Add garbage collection for dead, revoked and expired keys. [try #6] 16 years ago
David Howells f041ae2f99 KEYS: Flag dead keys to induce EKEYREVOKED [try #6] 16 years ago
David Howells 0c2c9a3fc7 KEYS: Allow keyctl_revoke() on keys that have SETATTR but not WRITE perm [try #6] 16 years ago
David Howells 5593122eec KEYS: Deal with dead-type keys appropriately [try #6] 16 years ago
Oleg Nesterov 5bb459bb45 kernel: rename is_single_threaded(task) to current_is_single_threaded(void) 16 years ago
James Morris 86abcf9ceb keys: annotate seqfile ops with __releases and __acquires 16 years ago
David Howells 34574dd10b keys: Handle there being no fallback destination keyring for request_key() 16 years ago
Serge E. Hallyn 454804ab03 keys: make procfiles per-user-namespace 16 years ago
Serge E. Hallyn 2ea190d0a0 keys: skip keys from another user namespace 16 years ago
Serge E. Hallyn 8ff3bc3138 keys: consider user namespace in key_permission 16 years ago
Serge E. Hallyn 1d1e97562e keys: distinguish per-uid keys in different namespaces 16 years ago
Vegard Nossum 0d54ee1c78 security: introduce missing kfree 16 years ago
Heiko Carstens 938bb9f5e8 [CVE-2009-0029] System call wrappers part 28 16 years ago
Heiko Carstens 1e7bfb2134 [CVE-2009-0029] System call wrappers part 27 16 years ago
James Morris 90bd49ab66 keys: fix sparse warning by adding __user annotation to cast 16 years ago
David Howells eca1bf5b4f KEYS: Fix variable uninitialisation warnings 16 years ago
David Howells a6f76f23d2 CRED: Make execve() take advantage of copy-on-write credentials 16 years ago
David Howells d84f4f992c CRED: Inaugurate COW credentials 16 years ago
David Howells bb952bb98a CRED: Separate per-task-group keyrings from signal_struct 16 years ago
David Howells c69e8d9c01 CRED: Use RCU to access another task's creds and to release a task's own creds 16 years ago
David Howells 86a264abe5 CRED: Wrap current->cred and a few other accessors 16 years ago
David Howells b6dff3ec5e CRED: Separate task security context from task_struct 16 years ago
David Howells 8bbf4976b5 KEYS: Alter use of key instantiation link-to-keyring argument 16 years ago
David Howells e9e349b051 KEYS: Disperse linux/key_ui.h 16 years ago
David Howells 47d804bfa1 CRED: Wrap task credential accesses in the key management code 16 years ago
David Howells 1f8f5cf6e4 KEYS: Make request key instantiate the per-user keyrings 16 years ago
Daniel Walker dba6a4d32d keys: remove unused key_alloc_sem 17 years ago