summaryrefslogtreecommitdiffstats
path: root/security/smack
Commit message (Expand)AuthorAgeFilesLines
* pipe: Reduce #inclusion of pipe_fs_i.hDavid Howells2019-10-231-1/+0
* Merge tag 'smack-for-5.4-rc1' of git://github.com/cschaufler/smack-nextLinus Torvalds2019-09-232-23/+23
|\
| * smack: use GFP_NOFS while holding inode_smack::smk_lockEric Biggers2019-09-042-4/+4
| * security: smack: Fix possible null-pointer dereferences in smack_socket_sock_...Jia-Ju Bai2019-09-041-0/+2
| * smack: fix some kernel-doc notationsluanshi2019-09-041-18/+15
| * Smack: Don't ignore other bprm->unsafe flags if LSM_UNSAFE_PTRACE is setJann Horn2019-09-041-1/+2
* | Merge branch 'work.mount0' of git://git.kernel.org/pub/scm/linux/kernel/git/v...Linus Torvalds2019-07-191-12/+22
|\ \
| * | vfs: Convert smackfs to use the new mount APIDavid Howells2019-07-041-12/+22
* | | Revert "Merge tag 'keys-acl-20190703' of git://git.kernel.org/pub/scm/linux/k...Linus Torvalds2019-07-101-2/+1
* | | Merge tag 'keys-acl-20190703' of git://git.kernel.org/pub/scm/linux/kernel/gi...Linus Torvalds2019-07-081-1/+2
|\ \ \ | |_|/ |/| |
| * | keys: Replace uid/gid/perm permissions checking with an ACLDavid Howells2019-06-271-1/+2
| |/
* | treewide: Replace GPLv2 boilerplate/reference with SPDX - rule 500Thomas Gleixner2019-06-192-8/+2
* | Smack: Restore the smackfsdef mount option and add missing prefixesCasey Schaufler2019-06-141-5/+7
* | treewide: Replace GPLv2 boilerplate/reference with SPDX - rule 372Thomas Gleixner2019-06-053-15/+3
* | treewide: Add SPDX license identifier - Makefile/KconfigThomas Gleixner2019-05-212-0/+2
|/
* Smack: Fix kbuild reported build errorCasey Schaufler2019-04-301-0/+2
* smack: Check address length before reading address familyTetsuo Handa2019-04-291-4/+15
* Smack: Fix IPv6 handling of 0 secmarkCasey Schaufler2019-04-031-0/+2
* Smack: Create smack_rule cache to optimize memory usageCasey Schaufler2019-04-023-3/+11
* smack: removal of global rule listVishal Goel2019-04-021-38/+15
* Merge branch 'work.mount' of git://git.kernel.org/pub/scm/linux/kernel/git/vi...Linus Torvalds2019-03-122-15/+96
|\
| * introduce cloning of fs_contextAl Viro2019-02-281-0/+49
| * smack: Implement filesystem context security hooksDavid Howells2019-02-282-15/+47
* | Merge tag 'audit-pr-20190305' of git://git.kernel.org/pub/scm/linux/kernel/gi...Linus Torvalds2019-03-071-3/+1
|\ \
| * | audit: remove unused actx param from audit_rule_matchRichard Guy Briggs2019-01-311-3/+1
| |/
* | security: mark expected switch fall-throughs and add a missing breakGustavo A. R. Silva2019-02-221-2/+1
* | LSM: Make lsm_early_cred() and lsm_early_task() local functions.Tetsuo Handa2019-01-181-2/+0
* | LSM: generalize flag passing to security_capableMicah Morton2019-01-101-1/+1
* | LSM: Infrastructure management of the ipc security blobCasey Schaufler2019-01-082-30/+6
* | Smack: Abstract use of ipc security blobsCasey Schaufler2019-01-082-5/+20
* | LSM: Infrastructure management of the inode securityCasey Schaufler2019-01-082-60/+18
* | Smack: Abstract use of inode security blobCasey Schaufler2019-01-082-18/+23
* | LSM: Infrastructure management of the file securityCasey Schaufler2019-01-082-14/+3
* | Smack: Abstract use of file security blobCasey Schaufler2019-01-082-4/+13
* | Infrastructure management of the cred security blobCasey Schaufler2019-01-082-55/+27
* | Smack: Abstract use of cred security blobCasey Schaufler2019-01-084-43/+53
* | LSM: Separate idea of "major" LSM from "exclusive" LSMKees Cook2019-01-081-1/+1
* | LSM: Lift LSM selection out of individual LSMsKees Cook2019-01-081-3/+0
* | LSM: Introduce LSM_FLAG_LEGACY_MAJORKees Cook2019-01-081-0/+1
|/
* Merge branch 'mount.part1' of git://git.kernel.org/pub/scm/linux/kernel/git/v...Linus Torvalds2019-01-051-222/+137
|\
| * smack: rewrite smack_sb_eat_lsm_opts()Al Viro2018-12-211-85/+23
| * smack: get rid of match_token()Al Viro2018-12-211-18/+38
| * smack: take the guts of smack_parse_opts_str() into a new helperAl Viro2018-12-211-57/+57
| * LSM: new method: ->sb_add_mnt_opt()Al Viro2018-12-211-1/+0
| * smack: switch to private smack_mnt_optsAl Viro2018-12-211-102/+55
| * LSM: hide struct security_mnt_opts from any generic codeAl Viro2018-12-211-8/+30
| * LSM: turn sb_eat_lsm_opts() into a methodAl Viro2018-12-211-1/+15
| * LSM: split ->sb_set_mnt_opts() out of ->sb_kern_mount()Al Viro2018-12-211-15/+0
| * LSM: lift parsing LSM options into the caller of ->sb_kern_mount()Al Viro2018-12-211-20/+3
| * smack: make smack_parse_opts_str() clean up on failureAl Viro2018-12-211-0/+1