Home
last modified time | relevance | path

Searched refs:smack (Results 1 – 11 of 11) sorted by relevance

/linux/security/smack/
H A Dsmack_access.c489 char *smack; in smk_parse_smack() local
495 smack = kstrndup(string, i, GFP_NOFS); in smk_parse_smack()
496 if (!smack) in smk_parse_smack()
498 return smack; in smk_parse_smack()
584 smk_import_allocated_label(char *smack, gfp_t gfp) in smk_import_allocated_label() argument
591 skp = smk_find_entry(smack); in smk_import_allocated_label()
601 skp->smk_known = smack; in smk_import_allocated_label()
618 kfree(smack); in smk_import_allocated_label()
636 char *smack = smk_parse_smack(string, len); in smk_import_entry() local
638 if (IS_ERR(smack)) in smk_import_entry()
[all …]
H A DMakefile6 obj-$(CONFIG_SECURITY_SMACK) := smack.o
8 smack-y := smack_lsm.o smack_access.o smackfs.o
9 smack-$(CONFIG_SECURITY_SMACK_NETFILTER) += smack_netfilter.o
H A Dsmackfs.c190 nap->prop.smack.skp = smk_of_current(); in smk_netlabel_audit_set()
1154 char *smack; in smk_write_net4addr() local
1186 smack = kzalloc(count + 1, GFP_KERNEL); in smk_write_net4addr()
1187 if (smack == NULL) { in smk_write_net4addr()
1193 &host[0], &host[1], &host[2], &host[3], &masks, smack); in smk_write_net4addr()
1196 &host[0], &host[1], &host[2], &host[3], smack); in smk_write_net4addr()
1211 if (smack[0] != '-') { in smk_write_net4addr()
1212 skp = smk_import_entry(smack, 0); in smk_write_net4addr()
1221 if (strcmp(smack, SMACK_CIPSO_OPTION) != 0) { in smk_write_net4addr()
1293 kfree(smack); in smk_write_net4addr()
[all …]
H A Dsmack_lsm.c1688 prop->smack.skp = smk_of_inode(inode); in smack_inode_getlsmprop()
2190 prop->smack.skp = smk_of_task(smack_cred(cred)); in smack_cred_getlsmprop()
2292 prop->smack.skp = smk_of_current(); in smack_current_getlsmprop_subj()
2305 prop->smack.skp = smk_of_task_struct_obj(p); in smack_task_getlsmprop_obj()
3494 prop->smack.skp = *iskpp; in smack_ipc_getlsmprop()
4835 struct smack_known *skp = prop->smack.skp; in smack_audit_rule_match()
4916 return smack_to_secctx(prop->smack.skp, cp); in smack_lsmprop_to_secctx()
5381 DEFINE_LSM(smack) = {
/linux/security/
H A DMakefile17 obj-$(CONFIG_SECURITY_SMACK) += smack/
H A DKconfig224 source "security/smack/Kconfig"
273 default "landlock,lockdown,yama,loadpin,safesetid,smack,selinux,tomoyo,apparmor,ipe,bpf" if DEFAULT_SECURITY_SMACK
274 default "landlock,lockdown,yama,loadpin,safesetid,apparmor,selinux,smack,tomoyo,ipe,bpf" if DEFAULT_SECURITY_APPARMOR
277 default "landlock,lockdown,yama,loadpin,safesetid,selinux,smack,tomoyo,apparmor,ipe,bpf"
/linux/Documentation/userspace-api/
H A Dlsm.rst21 Smack also provides this value in ``/proc/self/attr/smack/current``.
/linux/Documentation/admin-guide/LSM/
H A DSmack.rst41 git://github.com/smack-team/smack.git
329 you can add access rules in ``/etc/smack/accesses``. They take the form::
594 The configuration file /etc/smack/accesses contains the rules to be set at
661 /etc/smack/cipso.
665 smack level [category [category]*]
H A Dipe.rst323 If a traditional MAC system is enabled (SELinux, apparmor, smack), all
340 If a traditional MAC system is enabled (SELinux, apparmor, smack, etcetera),
551 If a traditional MAC system is enabled (SELinux, apparmor, smack, etcetera),
/linux/fs/proc/
H A Dbase.c2895 LSM_DIR_OPS(smack);
/linux/
H A DMAINTAINERS24389 T: git https://github.com/cschaufler/smack-next.git
24391 F: security/smack/