summaryrefslogtreecommitdiffstats
path: root/security/smack
AgeCommit message (Expand)AuthorFilesLines
2019-04-30Smack: Fix kbuild reported build errorCasey Schaufler1-0/+2
2019-04-29smack: Check address length before reading address familyTetsuo Handa1-4/+15
2019-04-03Smack: Fix IPv6 handling of 0 secmarkCasey Schaufler1-0/+2
2019-04-02Smack: Create smack_rule cache to optimize memory usageCasey Schaufler3-3/+11
2019-04-02smack: removal of global rule listVishal Goel1-38/+15
2019-03-12Merge branch 'work.mount' of git://git.kernel.org/pub/scm/linux/kernel/git/vi...Linus Torvalds2-15/+96
2019-03-07Merge tag 'audit-pr-20190305' of git://git.kernel.org/pub/scm/linux/kernel/gi...Linus Torvalds1-3/+1
2019-02-28introduce cloning of fs_contextAl Viro1-0/+49
2019-02-28smack: Implement filesystem context security hooksDavid Howells2-15/+47
2019-02-22security: mark expected switch fall-throughs and add a missing breakGustavo A. R. Silva1-2/+1
2019-01-31audit: remove unused actx param from audit_rule_matchRichard Guy Briggs1-3/+1
2019-01-18LSM: Make lsm_early_cred() and lsm_early_task() local functions.Tetsuo Handa1-2/+0
2019-01-10LSM: generalize flag passing to security_capableMicah Morton1-1/+1
2019-01-08LSM: Infrastructure management of the ipc security blobCasey Schaufler2-30/+6
2019-01-08Smack: Abstract use of ipc security blobsCasey Schaufler2-5/+20
2019-01-08LSM: Infrastructure management of the inode securityCasey Schaufler2-60/+18
2019-01-08Smack: Abstract use of inode security blobCasey Schaufler2-18/+23
2019-01-08LSM: Infrastructure management of the file securityCasey Schaufler2-14/+3
2019-01-08Smack: Abstract use of file security blobCasey Schaufler2-4/+13
2019-01-08Infrastructure management of the cred security blobCasey Schaufler2-55/+27
2019-01-08Smack: Abstract use of cred security blobCasey Schaufler4-43/+53
2019-01-08LSM: Separate idea of "major" LSM from "exclusive" LSMKees Cook1-1/+1
2019-01-08LSM: Lift LSM selection out of individual LSMsKees Cook1-3/+0
2019-01-08LSM: Introduce LSM_FLAG_LEGACY_MAJORKees Cook1-0/+1
2019-01-05Merge branch 'mount.part1' of git://git.kernel.org/pub/scm/linux/kernel/git/v...Linus Torvalds1-222/+137
2018-12-21smack: rewrite smack_sb_eat_lsm_opts()Al Viro1-85/+23
2018-12-21smack: get rid of match_token()Al Viro1-18/+38
2018-12-21smack: take the guts of smack_parse_opts_str() into a new helperAl Viro1-57/+57
2018-12-21LSM: new method: ->sb_add_mnt_opt()Al Viro1-1/+0
2018-12-21smack: switch to private smack_mnt_optsAl Viro1-102/+55
2018-12-21LSM: hide struct security_mnt_opts from any generic codeAl Viro1-8/+30
2018-12-21LSM: turn sb_eat_lsm_opts() into a methodAl Viro1-1/+15
2018-12-21LSM: split ->sb_set_mnt_opts() out of ->sb_kern_mount()Al Viro1-15/+0
2018-12-21LSM: lift parsing LSM options into the caller of ->sb_kern_mount()Al Viro1-20/+3
2018-12-21smack: make smack_parse_opts_str() clean up on failureAl Viro1-0/+1
2018-12-03smack: fix access permissions for keyringZoran Markovic1-3/+9
2018-10-25Merge branch 'next-smack' of git://git.kernel.org/pub/scm/linux/kernel/git/jm...Linus Torvalds2-7/+11
2018-10-24Merge branch 'next-general' of git://git.kernel.org/pub/scm/linux/kernel/git/...Linus Torvalds1-1/+4
2018-10-10LSM: Record LSM name in struct lsm_infoKees Cook1-0/+1
2018-10-10LSM: Convert security_initcall() into DEFINE_LSM()Kees Cook1-1/+3
2018-10-03signal: Distinguish between kernel_siginfo and siginfoEric W. Biederman1-1/+1
2018-09-18Smack: Mark expected switch fall-throughGustavo A. R. Silva1-1/+1
2018-09-18Smack: ptrace capability use fixesCasey Schaufler1-3/+10
2018-09-18Smack: remove set but not used variable 'root_inode'YueHaibing1-3/+0
2018-08-15Merge branch 'next-smack' of git://git.kernel.org/pub/scm/linux/kernel/git/jm...Linus Torvalds1-6/+16
2018-08-13Merge branch 'work.open3' of git://git.kernel.org/pub/scm/linux/kernel/git/vi...Linus Torvalds1-3/+3
2018-07-23Smack: Inform peer that IPv6 traffic has been blockedPiotr Sawicki1-0/+4
2018-07-23Smack: Check UDP-Lite and DCCP protocols during IPv6 handlingPiotr Sawicki1-1/+3
2018-07-23Smack: Fix handling of IPv4 traffic received by PF_INET6 socketsPiotr Sawicki1-5/+9
2018-07-12->file_open(): lose cred argumentAl Viro1-3/+3