summaryrefslogtreecommitdiffstats
path: root/security/smack (follow)
Commit message (Expand)AuthorAgeFilesLines
* Smack: Fix kbuild reported build errorCasey Schaufler2019-04-301-0/+2
* smack: Check address length before reading address familyTetsuo Handa2019-04-301-4/+15
* Smack: Fix IPv6 handling of 0 secmarkCasey Schaufler2019-04-031-0/+2
* Smack: Create smack_rule cache to optimize memory usageCasey Schaufler2019-04-023-3/+11
* smack: removal of global rule listVishal Goel2019-04-021-38/+15
* Merge branch 'work.mount' of git://git.kernel.org/pub/scm/linux/kernel/git/vi...Linus Torvalds2019-03-122-15/+96
|\
| * introduce cloning of fs_contextAl Viro2019-02-281-0/+49
| * smack: Implement filesystem context security hooksDavid Howells2019-02-282-15/+47
* | Merge tag 'audit-pr-20190305' of git://git.kernel.org/pub/scm/linux/kernel/gi...Linus Torvalds2019-03-071-3/+1
|\ \
| * | audit: remove unused actx param from audit_rule_matchRichard Guy Briggs2019-02-011-3/+1
| |/
* | security: mark expected switch fall-throughs and add a missing breakGustavo A. R. Silva2019-02-221-2/+1
* | LSM: Make lsm_early_cred() and lsm_early_task() local functions.Tetsuo Handa2019-01-181-2/+0
* | LSM: generalize flag passing to security_capableMicah Morton2019-01-101-1/+1
* | LSM: Infrastructure management of the ipc security blobCasey Schaufler2019-01-082-30/+6
* | Smack: Abstract use of ipc security blobsCasey Schaufler2019-01-082-5/+20
* | LSM: Infrastructure management of the inode securityCasey Schaufler2019-01-082-60/+18
* | Smack: Abstract use of inode security blobCasey Schaufler2019-01-082-18/+23
* | LSM: Infrastructure management of the file securityCasey Schaufler2019-01-082-14/+3
* | Smack: Abstract use of file security blobCasey Schaufler2019-01-082-4/+13
* | Infrastructure management of the cred security blobCasey Schaufler2019-01-082-55/+27
* | Smack: Abstract use of cred security blobCasey Schaufler2019-01-084-43/+53
* | LSM: Separate idea of "major" LSM from "exclusive" LSMKees Cook2019-01-081-1/+1
* | LSM: Lift LSM selection out of individual LSMsKees Cook2019-01-081-3/+0
* | LSM: Introduce LSM_FLAG_LEGACY_MAJORKees Cook2019-01-081-0/+1
|/
* Merge branch 'mount.part1' of git://git.kernel.org/pub/scm/linux/kernel/git/v...Linus Torvalds2019-01-051-222/+137
|\
| * smack: rewrite smack_sb_eat_lsm_opts()Al Viro2018-12-211-85/+23
| * smack: get rid of match_token()Al Viro2018-12-211-18/+38
| * smack: take the guts of smack_parse_opts_str() into a new helperAl Viro2018-12-211-57/+57
| * LSM: new method: ->sb_add_mnt_opt()Al Viro2018-12-211-1/+0
| * smack: switch to private smack_mnt_optsAl Viro2018-12-211-102/+55
| * LSM: hide struct security_mnt_opts from any generic codeAl Viro2018-12-211-8/+30
| * LSM: turn sb_eat_lsm_opts() into a methodAl Viro2018-12-211-1/+15
| * LSM: split ->sb_set_mnt_opts() out of ->sb_kern_mount()Al Viro2018-12-211-15/+0
| * LSM: lift parsing LSM options into the caller of ->sb_kern_mount()Al Viro2018-12-211-20/+3
| * smack: make smack_parse_opts_str() clean up on failureAl Viro2018-12-211-0/+1
* | smack: fix access permissions for keyringZoran Markovic2018-12-031-3/+9
|/
* Merge branch 'next-smack' of git://git.kernel.org/pub/scm/linux/kernel/git/jm...Linus Torvalds2018-10-252-7/+11
|\
| * Smack: Mark expected switch fall-throughGustavo A. R. Silva2018-09-191-1/+1
| * Smack: ptrace capability use fixesCasey Schaufler2018-09-191-3/+10
| * Smack: remove set but not used variable 'root_inode'YueHaibing2018-09-181-3/+0
* | Merge branch 'next-general' of git://git.kernel.org/pub/scm/linux/kernel/git/...Linus Torvalds2018-10-241-1/+4
|\ \
| * | LSM: Record LSM name in struct lsm_infoKees Cook2018-10-111-0/+1
| * | LSM: Convert security_initcall() into DEFINE_LSM()Kees Cook2018-10-111-1/+3
| |/
* / signal: Distinguish between kernel_siginfo and siginfoEric W. Biederman2018-10-031-1/+1
|/
* Merge branch 'next-smack' of git://git.kernel.org/pub/scm/linux/kernel/git/jm...Linus Torvalds2018-08-161-6/+16
|\
| * Smack: Inform peer that IPv6 traffic has been blockedPiotr Sawicki2018-07-231-0/+4
| * Smack: Check UDP-Lite and DCCP protocols during IPv6 handlingPiotr Sawicki2018-07-231-1/+3
| * Smack: Fix handling of IPv4 traffic received by PF_INET6 socketsPiotr Sawicki2018-07-231-5/+9
* | Merge branch 'work.open3' of git://git.kernel.org/pub/scm/linux/kernel/git/vi...Linus Torvalds2018-08-141-3/+3
|\ \
| * | ->file_open(): lose cred argumentAl Viro2018-07-121-3/+3
| |/