Searched refs:smack (Results 1 – 11 of 11) sorted by relevance
| /linux/security/smack/ |
| H A D | smack_access.c | 489 char *smack; in smk_parse_smack() local 495 smack = kstrndup(string, i, GFP_NOFS); in smk_parse_smack() 496 if (!smack) in smk_parse_smack() 498 return smack; in smk_parse_smack() 584 smk_import_allocated_label(char *smack, gfp_t gfp) in smk_import_allocated_label() argument 591 skp = smk_find_entry(smack); in smk_import_allocated_label() 601 skp->smk_known = smack; in smk_import_allocated_label() 618 kfree(smack); in smk_import_allocated_label() 636 char *smack = smk_parse_smack(string, len); in smk_import_entry() local 638 if (IS_ERR(smack)) in smk_import_entry() [all …]
|
| H A D | Makefile | 6 obj-$(CONFIG_SECURITY_SMACK) := smack.o 8 smack-y := smack_lsm.o smack_access.o smackfs.o 9 smack-$(CONFIG_SECURITY_SMACK_NETFILTER) += smack_netfilter.o
|
| H A D | smackfs.c | 190 nap->prop.smack.skp = smk_of_current(); in smk_netlabel_audit_set() 1154 char *smack; in smk_write_net4addr() local 1186 smack = kzalloc(count + 1, GFP_KERNEL); in smk_write_net4addr() 1187 if (smack == NULL) { in smk_write_net4addr() 1193 &host[0], &host[1], &host[2], &host[3], &masks, smack); in smk_write_net4addr() 1196 &host[0], &host[1], &host[2], &host[3], smack); in smk_write_net4addr() 1211 if (smack[0] != '-') { in smk_write_net4addr() 1212 skp = smk_import_entry(smack, 0); in smk_write_net4addr() 1221 if (strcmp(smack, SMACK_CIPSO_OPTION) != 0) { in smk_write_net4addr() 1293 kfree(smack); in smk_write_net4addr() [all …]
|
| H A D | smack_lsm.c | 1688 prop->smack.skp = smk_of_inode(inode); in smack_inode_getlsmprop() 2190 prop->smack.skp = smk_of_task(smack_cred(cred)); in smack_cred_getlsmprop() 2292 prop->smack.skp = smk_of_current(); in smack_current_getlsmprop_subj() 2305 prop->smack.skp = smk_of_task_struct_obj(p); in smack_task_getlsmprop_obj() 3494 prop->smack.skp = *iskpp; in smack_ipc_getlsmprop() 4835 struct smack_known *skp = prop->smack.skp; in smack_audit_rule_match() 4916 return smack_to_secctx(prop->smack.skp, cp); in smack_lsmprop_to_secctx() 5381 DEFINE_LSM(smack) = {
|
| /linux/security/ |
| H A D | Makefile | 17 obj-$(CONFIG_SECURITY_SMACK) += smack/
|
| H A D | Kconfig | 224 source "security/smack/Kconfig" 273 default "landlock,lockdown,yama,loadpin,safesetid,smack,selinux,tomoyo,apparmor,ipe,bpf" if DEFAULT_SECURITY_SMACK 274 default "landlock,lockdown,yama,loadpin,safesetid,apparmor,selinux,smack,tomoyo,ipe,bpf" if DEFAULT_SECURITY_APPARMOR 277 default "landlock,lockdown,yama,loadpin,safesetid,selinux,smack,tomoyo,apparmor,ipe,bpf"
|
| /linux/Documentation/userspace-api/ |
| H A D | lsm.rst | 21 Smack also provides this value in ``/proc/self/attr/smack/current``.
|
| /linux/Documentation/admin-guide/LSM/ |
| H A D | Smack.rst | 41 git://github.com/smack-team/smack.git 329 you can add access rules in ``/etc/smack/accesses``. They take the form:: 594 The configuration file /etc/smack/accesses contains the rules to be set at 661 /etc/smack/cipso. 665 smack level [category [category]*]
|
| H A D | ipe.rst | 323 If a traditional MAC system is enabled (SELinux, apparmor, smack), all 340 If a traditional MAC system is enabled (SELinux, apparmor, smack, etcetera), 551 If a traditional MAC system is enabled (SELinux, apparmor, smack, etcetera),
|
| /linux/fs/proc/ |
| H A D | base.c | 2895 LSM_DIR_OPS(smack);
|
| /linux/ |
| H A D | MAINTAINERS | 24389 T: git https://github.com/cschaufler/smack-next.git 24391 F: security/smack/
|