Home
last modified time | relevance | path

Searched refs:smack (Results 1 – 11 of 11) sorted by relevance

/linux/security/smack/
H A Dsmack_access.c489 char *smack; in smk_parse_smack() local
495 smack = kstrndup(string, i, GFP_NOFS); in smk_parse_smack()
496 if (!smack) in smk_parse_smack()
498 return smack; in smk_parse_smack()
584 smk_import_allocated_label(char *smack, gfp_t gfp) in smk_import_allocated_label() argument
591 skp = smk_find_entry(smack); in smk_import_allocated_label()
601 skp->smk_known = smack; in smk_import_allocated_label()
618 kfree(smack); in smk_import_allocated_label()
636 char *smack = smk_parse_smack(string, len); in smk_import_entry() local
638 if (IS_ERR(smack)) in smk_import_entry()
[all …]
H A DMakefile6 obj-$(CONFIG_SECURITY_SMACK) := smack.o
8 smack-y := smack_lsm.o smack_access.o smackfs.o
9 smack-$(CONFIG_SECURITY_SMACK_NETFILTER) += smack_netfilter.o
H A Dsmackfs.c190 nap->prop.smack.skp = smk_of_current(); in smk_netlabel_audit_set()
1154 char *smack; in smk_write_net4addr() local
1186 smack = kzalloc(count + 1, GFP_KERNEL); in smk_write_net4addr()
1187 if (smack == NULL) { in smk_write_net4addr()
1193 &host[0], &host[1], &host[2], &host[3], &masks, smack); in smk_write_net4addr()
1196 &host[0], &host[1], &host[2], &host[3], smack); in smk_write_net4addr()
1211 if (smack[0] != '-') { in smk_write_net4addr()
1212 skp = smk_import_entry(smack, 0); in smk_write_net4addr()
1221 if (strcmp(smack, SMACK_CIPSO_OPTION) != 0) { in smk_write_net4addr()
1293 kfree(smack); in smk_write_net4addr()
[all …]
H A Dsmack_lsm.c3 * Simplified MAC Kernel (smack) security module
5 * This file contains the smack hook function implementations.
47 #include "smack.h"
72 #define A(s) {"smack"#s, sizeof("smack"#s) - 1, Opt_##s}
267 * smk_fetch - Fetch the smack label from a file.
391 * Returns a converted MAY_* mode usable by smack rules
1002 * smack_inode_init_security - copy out the smack from an inode
1597 * smack_inode_getsecurity - get smack xattrs
1688 prop->smack in smack_inode_getlsmprop()
[all...]
/linux/security/
H A DMakefile17 obj-$(CONFIG_SECURITY_SMACK) += smack/
H A DKconfig222 source "security/smack/Kconfig"
271 default "landlock,lockdown,yama,loadpin,safesetid,smack,selinux,tomoyo,apparmor,ipe,bpf" if DEFAULT_SECURITY_SMACK
272 default "landlock,lockdown,yama,loadpin,safesetid,apparmor,selinux,smack,tomoyo,ipe,bpf" if DEFAULT_SECURITY_APPARMOR
275 default "landlock,lockdown,yama,loadpin,safesetid,selinux,smack,tomoyo,apparmor,ipe,bpf"
/linux/Documentation/userspace-api/
H A Dlsm.rst21 Smack also provides this value in ``/proc/self/attr/smack/current``.
/linux/Documentation/admin-guide/LSM/
H A DSmack.rst41 git://github.com/smack-team/smack.git
329 you can add access rules in ``/etc/smack/accesses``. They take the form::
594 The configuration file /etc/smack/accesses contains the rules to be set at
661 /etc/smack/cipso.
665 smack level [category [category]*]
H A Dipe.rst323 If a traditional MAC system is enabled (SELinux, apparmor, smack), all
340 If a traditional MAC system is enabled (SELinux, apparmor, smack, etcetera),
551 If a traditional MAC system is enabled (SELinux, apparmor, smack, etcetera),
/linux/fs/proc/
H A Dbase.c2895 LSM_DIR_OPS(smack);
/linux/
H A DMAINTAINERS24641 T: git https://github.com/cschaufler/smack-next.git
24643 F: security/smack/