aboutsummaryrefslogtreecommitdiff
path: root/security/keys
Commit message (Expand)AuthorAgeFilesLines
* KEYS: put keyring if install_session_keyring_to_cred() failsEric Biggers2019-07-061-3/+4
* Replace <asm/uaccess.h> with <linux/uaccess.h> globallyLinus Torvalds2018-11-294-4/+4
* UPSTREAM: KEYS: encrypted: fix buffer overread in valid_master_desc()Eric Biggers2018-05-161-16/+15
* KEYS: Fix an error code in request_master_key()Dan Carpenter2017-11-061-1/+1
* KEYS: encrypted: fix dereference of NULL user_key_payloadEric Biggers2017-11-061-0/+7
* KEYS: prevent creating a different user's keyringsEric Biggers2017-11-064-12/+23
* KEYS: don't let add_key() update an uninstantiated keyDavid Howells2017-11-061-0/+10
* KEYS: fix dereferencing NULL payload with nonzero lengthEric Biggers2017-11-061-2/+2
* KEYS: Disallow keyrings beginning with '.' to be joined as session keyringsDavid Howells2017-06-171-2/+7
* KEYS: fix keyctl_set_reqkey_keyring() to not leak thread keyringsEric Biggers2017-05-202-24/+31
* KEYS: Change the name of the dead type to ".dead" to prevent user accessDavid Howells2017-05-071-1/+1
* security: keys: fix maybe-uninitialized warningsNathan Chancellor2017-04-131-4/+4
* UPSTREAM: capabilities: ambient capabilitiesAndy Lutomirski2016-11-181-0/+1
* KEYS: Fix handling of stored error in a negatively instantiated user keyDavid Howells2016-11-173-2/+10
* KEYS: Fix short sprintf buffer in /proc/keys show functionDavid Howells2016-11-171-1/+1
* 3.10.102-> 3.10.103Jan Engelmohr2016-09-101-1/+1
* Linux 3.10.95 (accumulative patch)Stefan Guendhoer2016-08-263-13/+16
* 3.10.66 -> 3.10.67Jan Engelmohr2016-08-261-2/+2
* first commitMeizu OpenSource2016-08-1523-0/+10149