summaryrefslogtreecommitdiffstats
path: root/security/smack/smack.h
Commit message (Expand)AuthorAgeFilesLines
* Smack: Create smack_rule cache to optimize memory usageCasey Schaufler2019-04-021-0/+1
* Merge branch 'work.mount' of git://git.kernel.org/pub/scm/linux/kernel/git/vi...Linus Torvalds2019-03-121-14/+5
|\
| * smack: Implement filesystem context security hooksDavid Howells2019-02-281-14/+5
* | LSM: Infrastructure management of the ipc security blobCasey Schaufler2019-01-081-2/+2
* | Smack: Abstract use of ipc security blobsCasey Schaufler2019-01-081-0/+11
* | LSM: Infrastructure management of the inode securityCasey Schaufler2019-01-081-1/+1
* | Smack: Abstract use of inode security blobCasey Schaufler2019-01-081-2/+7
* | LSM: Infrastructure management of the file securityCasey Schaufler2019-01-081-1/+2
* | Smack: Abstract use of file security blobCasey Schaufler2019-01-081-0/+5
* | Infrastructure management of the cred security blobCasey Schaufler2019-01-081-1/+2
* | Smack: Abstract use of cred security blobCasey Schaufler2019-01-081-3/+14
|/
* Smack: Privilege check on key operationsCasey Schaufler2018-01-101-0/+1
* Smack: Use cap_capable in privilege checkCasey Schaufler2017-06-011-1/+1
* SMACK: Free the i_security blob in inode using RCUHimanshu Shukla2017-01-101-0/+1
* Smack: Fix the issue of wrong SMACK label update in socket bind fail caseVishal Goel2017-01-101-0/+1
* Smack: Fix the issue of permission denied error in ipv6 hookVishal Goel2017-01-101-0/+1
* Smack: Remove unnecessary smack_known_invalidCasey Schaufler2016-11-151-1/+0
* Smack: Signal delivery as an append operationCasey Schaufler2016-09-081-0/+10
* Smack: Add support for unprivileged mounts from user namespacesSeth Forshee2016-06-241-1/+7
* Smack: limited capability for changing process labelZbigniew Jasinski2015-10-191-1/+3
* Smack: IPv6 host labelingCasey Schaufler2015-07-281-9/+39
* smack: allow mount opts setting over filesystems with binary mount dataVivek Trivedi2015-07-221-0/+18
* Smack: allow multiple labels in onlycapRafal Krypa2015-06-021-16/+9
* LSM: Switch to lists of hooksCasey Schaufler2015-05-121-2/+0
* LSM: Split security.hCasey Schaufler2015-05-121-1/+1
* Smack: Allow an unconfined label in bringup modeCasey Schaufler2015-03-231-0/+8
* smack: fix possible use after frees in task_security() callersAndrey Ryabinin2015-01-211-0/+10
* Smack: secmark support for netfilterCasey Schaufler2015-01-201-0/+1
* Make Smack operate on smack_known struct where it still used char*Lukasz Pawelczyk2014-08-291-17/+17
* Smack: Bring-up access modeCasey Schaufler2014-08-281-2/+3
* Smack: bidirectional UDS connect checkCasey Schaufler2014-04-111-3/+3
* Smack: adds smackfs/ptrace interfaceLukasz Pawelczyk2014-04-111-0/+9
* Smack: fix the subject/object order in smack_ptrace_traceme()Lukasz Pawelczyk2014-04-111-0/+1
* Smack: Make the syslog control configurableCasey Schaufler2013-12-231-2/+3
* Smack: Implement lock security modeCasey Schaufler2013-10-181-4/+8
* Smack: network label match fixCasey Schaufler2013-08-011-2/+6
* security: smack: add a hash table to quicken smk_find_entry()Tomasz Stanislawski2013-08-011-0/+5
* Smack: Add smkfstransmute mount optionCasey Schaufler2013-05-281-0/+1
* Smack: Improve access check performanceCasey Schaufler2013-05-281-53/+55
* Smack: Local IPv6 port based controlsCasey Schaufler2013-05-281-0/+11
* smack: SMACK_MAGIC to include/uapi/linux/magic.hJarkko Sakkinen2013-03-191-5/+0
* Smack: onlycap limits on CAP_MAC_ADMINCasey Schaufler2012-07-131-0/+13
* Smack: fix smack_new_inode bogositiesCasey Schaufler2012-07-131-1/+0
* Merge branch 'master' of git://git.infradead.org/users/eparis/selinux into nextJames Morris2012-05-221-1/+1
|\
| * LSM: do not initialize common_audit_data to 0Eric Paris2012-04-091-1/+1
* | Smack: allow for significantly longer Smack labels v4Casey Schaufler2012-05-141-36/+20
* | Smack: recursive tramsmuteCasey Schaufler2012-05-141-0/+1
|/
* LSM: shrink the common_audit_data data unionEric Paris2012-04-031-1/+9
* LSM: shrink sizeof LSM specific portion of common_audit_dataEric Paris2012-04-031-1/+12
* Smack: allow to access /smack/access as normal userJarkko Sakkinen2011-10-201-0/+1
OpenPOWER on IntegriCloud