summaryrefslogtreecommitdiffstats
path: root/security/smack/smack.h
Commit message (Expand)AuthorAgeFilesLines
* Smack: Use cap_capable in privilege checkCasey Schaufler2017-06-011-1/+1
* SMACK: Free the i_security blob in inode using RCUHimanshu Shukla2017-01-101-0/+1
* Smack: Fix the issue of wrong SMACK label update in socket bind fail caseVishal Goel2017-01-101-0/+1
* Smack: Fix the issue of permission denied error in ipv6 hookVishal Goel2017-01-101-0/+1
* Smack: Remove unnecessary smack_known_invalidCasey Schaufler2016-11-151-1/+0
* Smack: Signal delivery as an append operationCasey Schaufler2016-09-081-0/+10
* Smack: Add support for unprivileged mounts from user namespacesSeth Forshee2016-06-241-1/+7
* Smack: limited capability for changing process labelZbigniew Jasinski2015-10-191-1/+3
* Smack: IPv6 host labelingCasey Schaufler2015-07-281-9/+39
* smack: allow mount opts setting over filesystems with binary mount dataVivek Trivedi2015-07-221-0/+18
* Smack: allow multiple labels in onlycapRafal Krypa2015-06-021-16/+9
* LSM: Switch to lists of hooksCasey Schaufler2015-05-121-2/+0
* LSM: Split security.hCasey Schaufler2015-05-121-1/+1
* Smack: Allow an unconfined label in bringup modeCasey Schaufler2015-03-231-0/+8
* smack: fix possible use after frees in task_security() callersAndrey Ryabinin2015-01-211-0/+10
* Smack: secmark support for netfilterCasey Schaufler2015-01-201-0/+1
* Make Smack operate on smack_known struct where it still used char*Lukasz Pawelczyk2014-08-291-17/+17
* Smack: Bring-up access modeCasey Schaufler2014-08-281-2/+3
* Smack: bidirectional UDS connect checkCasey Schaufler2014-04-111-3/+3
* Smack: adds smackfs/ptrace interfaceLukasz Pawelczyk2014-04-111-0/+9
* Smack: fix the subject/object order in smack_ptrace_traceme()Lukasz Pawelczyk2014-04-111-0/+1
* Smack: Make the syslog control configurableCasey Schaufler2013-12-231-2/+3
* Smack: Implement lock security modeCasey Schaufler2013-10-181-4/+8
* Smack: network label match fixCasey Schaufler2013-08-011-2/+6
* security: smack: add a hash table to quicken smk_find_entry()Tomasz Stanislawski2013-08-011-0/+5
* Smack: Add smkfstransmute mount optionCasey Schaufler2013-05-281-0/+1
* Smack: Improve access check performanceCasey Schaufler2013-05-281-53/+55
* Smack: Local IPv6 port based controlsCasey Schaufler2013-05-281-0/+11
* smack: SMACK_MAGIC to include/uapi/linux/magic.hJarkko Sakkinen2013-03-191-5/+0
* Smack: onlycap limits on CAP_MAC_ADMINCasey Schaufler2012-07-131-0/+13
* Smack: fix smack_new_inode bogositiesCasey Schaufler2012-07-131-1/+0
* Merge branch 'master' of git://git.infradead.org/users/eparis/selinux into nextJames Morris2012-05-221-1/+1
|\
| * LSM: do not initialize common_audit_data to 0Eric Paris2012-04-091-1/+1
* | Smack: allow for significantly longer Smack labels v4Casey Schaufler2012-05-141-36/+20
* | Smack: recursive tramsmuteCasey Schaufler2012-05-141-0/+1
|/
* LSM: shrink the common_audit_data data unionEric Paris2012-04-031-1/+9
* LSM: shrink sizeof LSM specific portion of common_audit_dataEric Paris2012-04-031-1/+12
* Smack: allow to access /smack/access as normal userJarkko Sakkinen2011-10-201-0/+1
* Smack: Clean up commentsCasey Schaufler2011-10-121-3/+2
* Smack: Rule list lookup performanceCasey Schaufler2011-10-121-6/+12
* LSM: separate LSM_AUDIT_DATA_DENTRY from LSM_AUDIT_DATA_PATHEric Paris2011-04-251-6/+1
* LSM: split LSM_AUDIT_DATA_FS into _PATH and _INODEEric Paris2011-04-251-4/+4
* security:smack: kill unused SMACK_LIST_MAX, MAY_ANY and MAY_ANYWRITEShan Wei2011-02-091-8/+0
* Subject: [PATCH] Smack: mmap controls for library containmentCasey Schaufler2011-01-171-3/+6
* Smack: Transmute labels on specified directoriesJarkko Sakkinen2010-12-071-1/+16
* This patch adds a new security attribute to Smack calledCasey Schaufler2010-12-021-0/+30
* security: move LSM xattrnames to xattr.hMimi Zohar2010-08-021-10/+0
* security: Make lsm_priv union in lsm_audit.h anonymousThomas Liu2009-07-101-1/+1
* Move variable function in lsm_audit.h into SMACK private spaceThomas Liu2009-07-101-1/+1
* smack: implement logging V3Etienne Basset2009-04-141-2/+106