summaryrefslogtreecommitdiffstats
path: root/security/smack/smack_lsm.c
Commit message (Expand)AuthorAgeFilesLines
* Merge tag 'Smack-for-5.11' of git://github.com/cschaufler/smack-nextLinus Torvalds2020-12-161-2/+1
|\
| * security/smack: remove unused varible 'rc'Alex Shi2020-11-161-2/+1
* | security: add const qualifier to struct sock in various placesFlorian Westphal2020-12-031-2/+2
|/
* Merge tag 'Smack-for-5.10' of git://github.com/cschaufler/smack-nextLinus Torvalds2020-10-131-104/+148
|\
| * Smack: Remove unnecessary variable initializationCasey Schaufler2020-10-051-1/+1
| * Smack: Fix build when NETWORK_SECMARK is not setCasey Schaufler2020-09-221-0/+7
| * Smack: Use the netlabel cacheCasey Schaufler2020-09-111-6/+21
| * Smack: Set socket labels only onceCasey Schaufler2020-09-111-76/+93
| * Smack: Consolidate uses of secmark into a functionCasey Schaufler2020-09-111-28/+33
* | treewide: Use fallthrough pseudo-keywordGustavo A. R. Silva2020-08-231-1/+1
|/
* Merge tag 'notifications-20200601' of git://git.kernel.org/pub/scm/linux/kern...Linus Torvalds2020-06-131-8/+104
|\
| * smack: Implement the watch_key and post_notification hooksDavid Howells2020-05-191-1/+82
| * keys: Make the KEY_NEED_* perms an enum rather than a maskDavid Howells2020-05-191-7/+22
* | Merge branch 'exec-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/eb...Linus Torvalds2020-06-041-6/+3
|\ \
| * | exec: Factor security_bprm_creds_for_exec out of security_bprm_set_credsEric W. Biederman2020-05-201-6/+3
| |/
* | Smack:- Remove redundant inode_smack cacheCasey Schaufler2020-05-061-8/+1
* | Smack:- Remove mutex lock "smk_lock" from inode_smackCasey Schaufler2020-05-061-6/+2
* | smack: avoid unused 'sip' variable warningArnd Bergmann2020-05-061-17/+8
|/
* Merge branch 'merge.nfs-fs_parse.1' of git://git.kernel.org/pub/scm/linux/ker...Linus Torvalds2020-02-081-7/+2
|\
| * fs_parse: fold fs_parameter_desc/fs_parameter_specAl Viro2020-02-071-6/+2
| * fs_parser: remove fs_parameter_description name fieldEric Sandeen2020-02-071-1/+0
* | broken ping to ipv6 linklocal addresses on debian busterCasey Schaufler2020-02-051-22/+19
|/
* pipe: Reduce #inclusion of pipe_fs_i.hDavid Howells2019-10-231-1/+0
* smack: use GFP_NOFS while holding inode_smack::smk_lockEric Biggers2019-09-041-1/+1
* security: smack: Fix possible null-pointer dereferences in smack_socket_sock_...Jia-Ju Bai2019-09-041-0/+2
* smack: fix some kernel-doc notationsluanshi2019-09-041-18/+15
* Smack: Don't ignore other bprm->unsafe flags if LSM_UNSAFE_PTRACE is setJann Horn2019-09-041-1/+2
* treewide: Replace GPLv2 boilerplate/reference with SPDX - rule 500Thomas Gleixner2019-06-191-4/+1
* Smack: Restore the smackfsdef mount option and add missing prefixesCasey Schaufler2019-06-141-5/+7
* Smack: Fix kbuild reported build errorCasey Schaufler2019-04-301-0/+2
* smack: Check address length before reading address familyTetsuo Handa2019-04-291-4/+15
* Smack: Fix IPv6 handling of 0 secmarkCasey Schaufler2019-04-031-0/+2
* Smack: Create smack_rule cache to optimize memory usageCasey Schaufler2019-04-021-2/+9
* Merge branch 'work.mount' of git://git.kernel.org/pub/scm/linux/kernel/git/vi...Linus Torvalds2019-03-121-1/+91
|\
| * introduce cloning of fs_contextAl Viro2019-02-281-0/+49
| * smack: Implement filesystem context security hooksDavid Howells2019-02-281-1/+42
* | Merge tag 'audit-pr-20190305' of git://git.kernel.org/pub/scm/linux/kernel/gi...Linus Torvalds2019-03-071-3/+1
|\ \
| * | audit: remove unused actx param from audit_rule_matchRichard Guy Briggs2019-01-311-3/+1
| |/
* | security: mark expected switch fall-throughs and add a missing breakGustavo A. R. Silva2019-02-221-2/+1
* | LSM: Make lsm_early_cred() and lsm_early_task() local functions.Tetsuo Handa2019-01-181-2/+0
* | LSM: Infrastructure management of the ipc security blobCasey Schaufler2019-01-081-28/+4
* | Smack: Abstract use of ipc security blobsCasey Schaufler2019-01-081-5/+9
* | LSM: Infrastructure management of the inode securityCasey Schaufler2019-01-081-59/+17
* | Smack: Abstract use of inode security blobCasey Schaufler2019-01-081-16/+16
* | LSM: Infrastructure management of the file securityCasey Schaufler2019-01-081-13/+1
* | Smack: Abstract use of file security blobCasey Schaufler2019-01-081-4/+8
* | Infrastructure management of the cred security blobCasey Schaufler2019-01-081-54/+25
* | Smack: Abstract use of cred security blobCasey Schaufler2019-01-081-29/+28
* | LSM: Separate idea of "major" LSM from "exclusive" LSMKees Cook2019-01-081-1/+1
* | LSM: Lift LSM selection out of individual LSMsKees Cook2019-01-081-3/+0