summaryrefslogtreecommitdiffstats
path: root/net/core/scm.c
Commit message (Expand)AuthorAgeFilesLines
* fs: Add receive_fd() wrapper for __receive_fd()Kees Cook2020-07-131-1/+1
* fs: Move __scm_install_fd() to __receive_fd()Kees Cook2020-07-131-26/+1
* net/scm: Regularize compat handling of scm_detach_fds()Kees Cook2020-07-131-16/+11
* net: ignore sock_from_file errors in __scm_install_fdChristoph Hellwig2020-05-131-1/+1
* net: cleanly handle kernel vs user buffers for ->msg_controlChristoph Hellwig2020-05-111-21/+28
* net/scm: cleanup scm_detach_fdsChristoph Hellwig2020-05-111-43/+51
* net: add a CMSG_USER_DATA macroChristoph Hellwig2020-05-111-2/+2
* y2038: socket: remove timespec reference in timestampingArnd Bergmann2019-11-151-2/+4
* treewide: Replace GPLv2 boilerplate/reference with SPDX - rule 152Thomas Gleixner2019-05-301-5/+1
* socket: Add SO_TIMESTAMPING_NEWDeepa Dinamani2019-02-031-0/+27
* sched/headers: Prepare for new header dependencies before moving code to <lin...Ingo Molnar2017-03-021-0/+1
* scm: remove use CMSG{_COMPAT}_ALIGN(sizeof(struct {compat_}cmsghdr))yuan linyu2017-01-041-1/+1
* Replace <asm/uaccess.h> with <linux/uaccess.h> globallyLinus Torvalds2016-12-241-1/+1
* unix: correctly track in-flight fds in sending process user_structHannes Frederic Sowa2016-02-081-0/+7
* net: wrap sock->sk_cgrp_prioidx and ->sk_classid inside a structTejun Heo2015-12-081-2/+2
* net, scm: fix PaX detected msg_controllen overflow in scm_detach_fdsDaniel Borkmann2015-11-221-0/+2
* net: introduce helper macro for_each_cmsghdrGu Zheng2014-12-101-2/+1
* Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/ebi...Linus Torvalds2013-09-071-2/+2
|\
| * userns: Kill nsown_capable it makes the wrong thing easyEric W. Biederman2013-08-301-2/+2
* | net: Check the correct namespace when spoofing pid over SCM_RIGHTSAndy Lutomirski2013-08-271-1/+1
|/
* netprio_cgroup: remove task_struct parameter from sock_update_netprio()Zefan Li2013-04-091-1/+1
* cls_cgroup: remove task_struct parameter from sock_update_classid()Zefan Li2013-04-091-1/+1
* scm: Stop passing struct credEric W. Biederman2013-04-071-16/+0
* scm: Require CAP_SYS_ADMIN over the current pidns to spoof pids.Eric W. Biederman2013-03-171-1/+3
* net: net_cls: fd passed in SCM_RIGHTS datagram not set correctlyDaniel Wagner2013-01-221-1/+4
* net: Allow userns root to force the scm credsEric W. Biederman2012-11-181-3/+3
* Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/vir...Linus Torvalds2012-10-021-2/+1
|\
| * make get_file() return its argumentAl Viro2012-09-261-2/+1
* | scm: Don't use struct ucred in NETLINK_CB and struct scm_cookie.Eric W. Biederman2012-09-071-6/+11
* | Merge branch 'for-next' of git://git.kernel.org/pub/scm/linux/kernel/git/ebie...David S. Miller2012-08-241-8/+23
|\ \ | |/ |/|
| * userns: Convert net/core/scm.c to use kuids and kgidsEric W. Biederman2012-08-141-8/+23
* | net: netprio: fd passed in SCM_RIGHTS datagram not set correctlyJohn Fastabend2012-08-161-0/+4
|/
* get rid of ->scm_work_listAl Viro2012-07-221-19/+3
* Remove all #inclusions of asm/system.hDavid Howells2012-03-281-1/+0
* af_unix: dont send SCM_CREDENTIALS by defaultEric Dumazet2011-09-281-4/+6
* scm: Capture the full credentials of the scm senderTim Chen2011-08-111-1/+1
* Allow passing O_PATH descriptors via SCM_RIGHTS datagramsAl Viro2011-03-151-1/+1
* scm: lower SCM_MAX_FDEric Dumazet2010-11-241-4/+6
* net/core: EXPORT_SYMBOL cleanupsEric Dumazet2010-07-121-5/+4
* scm: Capture the full credentials of the scm sender.Eric W. Biederman2010-06-161-0/+24
* include cleanup: Update gfp.h and slab.h includes to prepare for breaking imp...Tejun Heo2010-03-301-0/+1
* scm: Only support SCM_RIGHTS on unix domain sockets.Eric W. Biederman2010-02-281-0/+2
* Merge branch 'master' into nextJames Morris2008-11-181-2/+0
|\
| * scm: fix scm_fp_list->list initialization made in wrong placePavel Emelyanov2008-11-141-2/+0
* | Merge branch 'master' into nextJames Morris2008-11-141-3/+21
|\|
| * net: Fix recursive descent in __scm_destroy().David Miller2008-11-061-3/+21
* | CRED: Wrap current->cred and a few other accessorsDavid Howells2008-11-141-1/+1
* | CRED: Separate task security context from task_structDavid Howells2008-11-141-4/+6
* | CRED: Wrap task credential accesses in the networking subsystemDavid Howells2008-11-141-4/+4
|/
* [NET]: Fix function put_cmsg() which may cause usr application memory overflowWei Yongjun2007-12-201-0/+2