summaryrefslogtreecommitdiff
path: root/security/smack/smack_access.c
AgeCommit message (Expand)AuthorFilesLines
2019-01-10LSM: generalize flag passing to security_capableMicah Morton1-1/+1
2019-01-08Smack: Abstract use of cred security blobCasey Schaufler1-2/+2
2018-01-10Smack: Privilege check on key operationsCasey Schaufler1-11/+29
2017-06-01Smack: Use cap_capable in privilege checkCasey Schaufler1-8/+11
2017-04-04Smack: Use GFP_KERNEL for smk_netlbl_mls().Tetsuo Handa1-1/+1
2016-11-15Smack: Remove unnecessary smack_known_invalidCasey Schaufler1-6/+1
2016-06-10vfs: make the string hashes salt the hashLinus Torvalds1-2/+2
2015-10-19Smack: limited capability for changing process labelZbigniew Jasinski1-3/+3
2015-08-10Kernel threads excluded from smack checksRoman Kubiak1-0/+6
2015-06-02Smack: allow multiple labels in onlycapRafal Krypa1-0/+41
2015-05-15smack: pass error code through pointersLukasz Pawelczyk1-11/+16
2015-03-23Smack: Allow an unconfined label in bringup modeCasey Schaufler1-10/+33
2014-11-21security: smack: fix out-of-bounds access in smk_parse_smack()Andrey Ryabinin1-4/+3
2014-10-28Smack: Lock mode for the floor and hat labelsCasey Schaufler1-5/+5
2014-08-29Make Smack operate on smack_known struct where it still used char*Lukasz Pawelczyk1-64/+30
2014-08-28Smack: Bring-up access modeCasey Schaufler1-3/+21
2014-08-02Merge branch 'next' of git://git.infradead.org/users/pcmoore/selinux into nextJames Morris1-7/+4
2014-08-01netlabel: shorter names for the NetLabel catmap funcs/structsPaul Moore1-3/+3
2014-08-01netlabel: fix the horribly broken catmap functionsPaul Moore1-4/+1
2014-08-01netlabel: fix a problem when setting bits below the previously lowest bitPaul Moore1-1/+1
2014-04-11Smack: adds smackfs/ptrace interfaceLukasz Pawelczyk1-1/+4
2014-04-11Smack: fix the subject/object order in smack_ptrace_traceme()Lukasz Pawelczyk1-7/+26
2013-10-18Smack: Implement lock security modeCasey Schaufler1-0/+10
2013-08-01security: smack: add a hash table to quicken smk_find_entry()Tomasz Stanislawski1-3/+26
2013-05-28Smack: Fix possible NULL pointer dereference at smk_netlbl_mls()Tetsuo Handa1-0/+2
2013-05-28Smack: Improve access check performanceCasey Schaufler1-20/+21
2013-03-19Smack: add missing support for transmute bit in smack_str_from_perm()Rafal Krypa1-0/+2
2012-07-13Smack: onlycap limits on CAP_MAC_ADMINCasey Schaufler1-7/+2
2012-05-14Smack: allow for significantly longer Smack labels v4Casey Schaufler1-117/+116
2012-04-03lsm_audit: don't specify the audit pre/post callbacks in 'struct common_audit...Linus Torvalds1-2/+1
2012-04-03LSM: shrink sizeof LSM specific portion of common_audit_dataEric Paris1-5/+6
2011-10-20Smack: allow to access /smack/access as normal userJarkko Sakkinen1-8/+19
2011-10-12Smack: Rule list lookup performanceCasey Schaufler1-57/+56
2011-03-31Fix common misspellingsLucas De Marchi1-1/+1
2011-01-17Subject: [PATCH] Smack: mmap controls for library containmentCasey Schaufler1-18/+34
2010-12-07Smack: Transmute labels on specified directoriesJarkko Sakkinen1-13/+41
2010-12-02This patch adds a new security attribute to Smack calledCasey Schaufler1-2/+2
2010-03-30include cleanup: Update gfp.h and slab.h includes to prepare for breaking imp...Tejun Heo1-0/+1
2009-07-10security: Make lsm_priv union in lsm_audit.h anonymousThomas Liu1-5/+5
2009-07-10Move variable function in lsm_audit.h into SMACK private spaceThomas Liu1-3/+4
2009-04-14smack: implement logging V3Etienne Basset1-16/+127
2009-03-28smack: Add a new '-CIPSO' option to the network address label configurationEtienne Basset1-0/+3
2009-03-26smack: convert smack to standard linux listsEtienne Basset1-25/+38
2009-02-19smack: fix lots of kernel-doc notationRandy Dunlap1-2/+2
2008-12-31smack: Add support for unlabeled network hosts and networksCasey Schaufler1-9/+19
2008-11-14CRED: Wrap current->cred and a few other accessorsDavid Howells1-1/+1
2008-11-14CRED: Separate task security context from task_structDavid Howells1-2/+2
2008-08-05smack: limit privilege by labelCasey Schaufler1-1/+9
2008-02-05Smack: Simplified Mandatory Access Control KernelCasey Schaufler1-0/+356