summaryrefslogtreecommitdiffstats
path: root/security/smack/smack.h
Commit message (Expand)AuthorAgeFilesLines
* smack: Set the SMACK64TRANSMUTE xattr in smack_inode_init_security()Roberto Sassu2023-07-101-1/+1
* smack: Record transmuting in smk_transmutedRoberto Sassu2023-05-111-0/+1
* smack: cleanup obsolete mount option flagsXiu Jianfeng2022-09-271-9/+0
* lsm: security_task_getsecid_subj() -> security_current_getsecid_subj()Paul Moore2021-11-221-16/+0
* smack: mark 'smack_enabled' global variable as __initdataAustin Kim2021-07-201-1/+1
* Merge tag 'landlock_v34' of git://git.kernel.org/pub/scm/linux/kernel/git/jmo...Linus Torvalds2021-05-011-0/+6
|\
| * LSM: Infrastructure management of the superblockCasey Schaufler2021-04-221-0/+6
* | smack: differentiate between subjective and objective task credentialsPaul Moore2021-03-221-1/+17
|/
* Smack: Use the netlabel cacheCasey Schaufler2020-09-111-0/+1
* Smack: Set socket labels only onceCasey Schaufler2020-09-111-13/+5
* Smack: Remove unused inline function smk_ad_setfield_u_fs_path_mntYueHaibing2020-05-111-4/+0
* Smack:- Remove mutex lock "smk_lock" from inode_smackCasey Schaufler2020-05-061-1/+0
* smack: remove redundant structure variable from header.Maninder Singh2020-05-061-1/+0
* smack: avoid unused 'sip' variable warningArnd Bergmann2020-05-061-6/+0
* treewide: Replace GPLv2 boilerplate/reference with SPDX - rule 372Thomas Gleixner2019-06-051-5/+1
* Smack: Create smack_rule cache to optimize memory usageCasey Schaufler2019-04-021-0/+1
* Merge branch 'work.mount' of git://git.kernel.org/pub/scm/linux/kernel/git/vi...Linus Torvalds2019-03-121-14/+5
|\
| * smack: Implement filesystem context security hooksDavid Howells2019-02-281-14/+5
* | LSM: Infrastructure management of the ipc security blobCasey Schaufler2019-01-081-2/+2
* | Smack: Abstract use of ipc security blobsCasey Schaufler2019-01-081-0/+11
* | LSM: Infrastructure management of the inode securityCasey Schaufler2019-01-081-1/+1
* | Smack: Abstract use of inode security blobCasey Schaufler2019-01-081-2/+7
* | LSM: Infrastructure management of the file securityCasey Schaufler2019-01-081-1/+2
* | Smack: Abstract use of file security blobCasey Schaufler2019-01-081-0/+5
* | Infrastructure management of the cred security blobCasey Schaufler2019-01-081-1/+2
* | Smack: Abstract use of cred security blobCasey Schaufler2019-01-081-3/+14
|/
* Smack: Privilege check on key operationsCasey Schaufler2018-01-101-0/+1
* Smack: Use cap_capable in privilege checkCasey Schaufler2017-06-011-1/+1
* SMACK: Free the i_security blob in inode using RCUHimanshu Shukla2017-01-101-0/+1
* Smack: Fix the issue of wrong SMACK label update in socket bind fail caseVishal Goel2017-01-101-0/+1
* Smack: Fix the issue of permission denied error in ipv6 hookVishal Goel2017-01-101-0/+1
* Smack: Remove unnecessary smack_known_invalidCasey Schaufler2016-11-151-1/+0
* Smack: Signal delivery as an append operationCasey Schaufler2016-09-081-0/+10
* Smack: Add support for unprivileged mounts from user namespacesSeth Forshee2016-06-241-1/+7
* Smack: limited capability for changing process labelZbigniew Jasinski2015-10-191-1/+3
* Smack: IPv6 host labelingCasey Schaufler2015-07-281-9/+39
* smack: allow mount opts setting over filesystems with binary mount dataVivek Trivedi2015-07-221-0/+18
* Smack: allow multiple labels in onlycapRafal Krypa2015-06-021-16/+9
* LSM: Switch to lists of hooksCasey Schaufler2015-05-121-2/+0
* LSM: Split security.hCasey Schaufler2015-05-121-1/+1
* Smack: Allow an unconfined label in bringup modeCasey Schaufler2015-03-231-0/+8
* smack: fix possible use after frees in task_security() callersAndrey Ryabinin2015-01-211-0/+10
* Smack: secmark support for netfilterCasey Schaufler2015-01-201-0/+1
* Make Smack operate on smack_known struct where it still used char*Lukasz Pawelczyk2014-08-291-17/+17
* Smack: Bring-up access modeCasey Schaufler2014-08-281-2/+3
* Smack: bidirectional UDS connect checkCasey Schaufler2014-04-111-3/+3
* Smack: adds smackfs/ptrace interfaceLukasz Pawelczyk2014-04-111-0/+9
* Smack: fix the subject/object order in smack_ptrace_traceme()Lukasz Pawelczyk2014-04-111-0/+1
* Smack: Make the syslog control configurableCasey Schaufler2013-12-231-2/+3
* Smack: Implement lock security modeCasey Schaufler2013-10-181-4/+8