android_kernel_samsung_univ.../security
Casey Schaufler 091cb7dec8 Smack: Mark inode instant in smack_task_to_inode
[ Upstream commit 7b4e88434c4e7982fb053c49657e1c8bbb8692d9 ]

Smack: Mark inode instant in smack_task_to_inode

/proc clean-up in commit 1bbc55131e59bd099fdc568d3aa0b42634dbd188
resulted in smack_task_to_inode() being called before smack_d_instantiate.
This resulted in the smk_inode value being ignored, even while present
for files in /proc/self. Marking the inode as instant here fixes that.

Signed-off-by: Casey Schaufler <casey@schaufler-ca.com>
Signed-off-by: James Morris <james.morris@microsoft.com>
Signed-off-by: Sasha Levin <alexander.levin@microsoft.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2018-08-24 13:26:56 +02:00
..
apparmor
integrity Revert "ima: limit file hash setting by user to fix and log modes" 2018-06-06 16:46:20 +02:00
keys
selinux selinux: KASAN: slab-out-of-bounds in xattr_getsecurity 2018-06-06 16:46:21 +02:00
smack Smack: Mark inode instant in smack_task_to_inode 2018-08-24 13:26:56 +02:00
tomoyo
yama
commoncap.c
device_cgroup.c
inode.c
Kconfig
lsm_audit.c
Makefile
min_addr.c
security.c