summaryrefslogtreecommitdiff
path: root/security/smack/smack.h
AgeCommit message (Expand)AuthorFilesLines
2021-05-01Merge tag 'landlock_v34' of git://git.kernel.org/pub/scm/linux/kernel/git/jmo...Linus Torvalds1-0/+6
2021-04-22LSM: Infrastructure management of the superblockCasey Schaufler1-0/+6
2021-03-22smack: differentiate between subjective and objective task credentialsPaul Moore1-1/+17
2020-09-11Smack: Use the netlabel cacheCasey Schaufler1-0/+1
2020-09-11Smack: Set socket labels only onceCasey Schaufler1-13/+5
2020-05-11Smack: Remove unused inline function smk_ad_setfield_u_fs_path_mntYueHaibing1-4/+0
2020-05-06Smack:- Remove mutex lock "smk_lock" from inode_smackCasey Schaufler1-1/+0
2020-05-06smack: remove redundant structure variable from header.Maninder Singh1-1/+0
2020-05-06smack: avoid unused 'sip' variable warningArnd Bergmann1-6/+0
2019-06-05treewide: Replace GPLv2 boilerplate/reference with SPDX - rule 372Thomas Gleixner1-5/+1
2019-04-02Smack: Create smack_rule cache to optimize memory usageCasey Schaufler1-0/+1
2019-03-12Merge branch 'work.mount' of git://git.kernel.org/pub/scm/linux/kernel/git/vi...Linus Torvalds1-14/+5
2019-02-28smack: Implement filesystem context security hooksDavid Howells1-14/+5
2019-01-08LSM: Infrastructure management of the ipc security blobCasey Schaufler1-2/+2
2019-01-08Smack: Abstract use of ipc security blobsCasey Schaufler1-0/+11
2019-01-08LSM: Infrastructure management of the inode securityCasey Schaufler1-1/+1
2019-01-08Smack: Abstract use of inode security blobCasey Schaufler1-2/+7
2019-01-08LSM: Infrastructure management of the file securityCasey Schaufler1-1/+2
2019-01-08Smack: Abstract use of file security blobCasey Schaufler1-0/+5
2019-01-08Infrastructure management of the cred security blobCasey Schaufler1-1/+2
2019-01-08Smack: Abstract use of cred security blobCasey Schaufler1-3/+14
2018-01-10Smack: Privilege check on key operationsCasey Schaufler1-0/+1
2017-06-01Smack: Use cap_capable in privilege checkCasey Schaufler1-1/+1
2017-01-10SMACK: Free the i_security blob in inode using RCUHimanshu Shukla1-0/+1
2017-01-10Smack: Fix the issue of wrong SMACK label update in socket bind fail caseVishal Goel1-0/+1
2017-01-10Smack: Fix the issue of permission denied error in ipv6 hookVishal Goel1-0/+1
2016-11-15Smack: Remove unnecessary smack_known_invalidCasey Schaufler1-1/+0
2016-09-08Smack: Signal delivery as an append operationCasey Schaufler1-0/+10
2016-06-24Smack: Add support for unprivileged mounts from user namespacesSeth Forshee1-1/+7
2015-10-19Smack: limited capability for changing process labelZbigniew Jasinski1-1/+3
2015-07-28Smack: IPv6 host labelingCasey Schaufler1-9/+39
2015-07-22smack: allow mount opts setting over filesystems with binary mount dataVivek Trivedi1-0/+18
2015-06-02Smack: allow multiple labels in onlycapRafal Krypa1-16/+9
2015-05-12LSM: Switch to lists of hooksCasey Schaufler1-2/+0
2015-05-12LSM: Split security.hCasey Schaufler1-1/+1
2015-03-23Smack: Allow an unconfined label in bringup modeCasey Schaufler1-0/+8
2015-01-21smack: fix possible use after frees in task_security() callersAndrey Ryabinin1-0/+10
2015-01-20Smack: secmark support for netfilterCasey Schaufler1-0/+1
2014-08-29Make Smack operate on smack_known struct where it still used char*Lukasz Pawelczyk1-17/+17
2014-08-28Smack: Bring-up access modeCasey Schaufler1-2/+3
2014-04-11Smack: bidirectional UDS connect checkCasey Schaufler1-3/+3
2014-04-11Smack: adds smackfs/ptrace interfaceLukasz Pawelczyk1-0/+9
2014-04-11Smack: fix the subject/object order in smack_ptrace_traceme()Lukasz Pawelczyk1-0/+1
2013-12-23Smack: Make the syslog control configurableCasey Schaufler1-2/+3
2013-10-18Smack: Implement lock security modeCasey Schaufler1-4/+8
2013-08-01Smack: network label match fixCasey Schaufler1-2/+6
2013-08-01security: smack: add a hash table to quicken smk_find_entry()Tomasz Stanislawski1-0/+5
2013-05-28Smack: Add smkfstransmute mount optionCasey Schaufler1-0/+1
2013-05-28Smack: Improve access check performanceCasey Schaufler1-53/+55
2013-05-28Smack: Local IPv6 port based controlsCasey Schaufler1-0/+11