Searched refs:smack (Results 1 – 13 of 13) sorted by relevance
/Linux-v6.1/security/smack/ |
D | Makefile | 6 obj-$(CONFIG_SECURITY_SMACK) := smack.o 8 smack-y := smack_lsm.o smack_access.o smackfs.o 9 smack-$(CONFIG_SECURITY_SMACK_NETFILTER) += smack_netfilter.o
|
D | smack_access.c | 446 char *smack; in smk_parse_smack() local 468 smack = kstrndup(string, i, GFP_NOFS); in smk_parse_smack() 469 if (!smack) in smk_parse_smack() 471 return smack; in smk_parse_smack() 560 char *smack; in smk_import_entry() local 563 smack = smk_parse_smack(string, len); in smk_import_entry() 564 if (IS_ERR(smack)) in smk_import_entry() 565 return ERR_CAST(smack); in smk_import_entry() 569 skp = smk_find_entry(smack); in smk_import_entry() 579 skp->smk_known = smack; in smk_import_entry() [all …]
|
D | smackfs.c | 1149 char *smack; in smk_write_net4addr() local 1181 smack = kzalloc(count + 1, GFP_KERNEL); in smk_write_net4addr() 1182 if (smack == NULL) { in smk_write_net4addr() 1188 &host[0], &host[1], &host[2], &host[3], &masks, smack); in smk_write_net4addr() 1191 &host[0], &host[1], &host[2], &host[3], smack); in smk_write_net4addr() 1206 if (smack[0] != '-') { in smk_write_net4addr() 1207 skp = smk_import_entry(smack, 0); in smk_write_net4addr() 1216 if (strcmp(smack, SMACK_CIPSO_OPTION) != 0) { in smk_write_net4addr() 1288 kfree(smack); in smk_write_net4addr() 1413 char *smack; in smk_write_net6addr() local [all …]
|
D | smack_lsm.c | 5017 DEFINE_LSM(smack) = {
|
/Linux-v6.1/security/ |
D | Makefile | 16 obj-$(CONFIG_SECURITY_SMACK) += smack/
|
D | Kconfig | 202 source "security/smack/Kconfig" 249 …default "landlock,lockdown,yama,loadpin,safesetid,integrity,smack,selinux,tomoyo,apparmor,bpf" if … 250 …default "landlock,lockdown,yama,loadpin,safesetid,integrity,apparmor,selinux,smack,tomoyo,bpf" if … 253 default "landlock,lockdown,yama,loadpin,safesetid,integrity,selinux,smack,tomoyo,apparmor,bpf"
|
/Linux-v6.1/Documentation/admin-guide/LSM/ |
D | index.rst | 35 named after the module. ``/proc/.../attr/smack`` is provided by the Smack
|
D | Smack.rst | 41 git://github.com/smack-team/smack.git 329 you can add access rules in ``/etc/smack/accesses``. They take the form:: 594 The configuration file /etc/smack/accesses contains the rules to be set at 656 /etc/smack/cipso. 660 smack level [category [category]*]
|
/Linux-v6.1/arch/s390/configs/ |
D | defconfig | 697 CONFIG_LSM="yama,loadpin,safesetid,integrity,selinux,smack,tomoyo,apparmor"
|
D | debug_defconfig | 714 CONFIG_LSM="yama,loadpin,safesetid,integrity,selinux,smack,tomoyo,apparmor"
|
/Linux-v6.1/Documentation/filesystems/ |
D | porting.rst | 730 called before we attach dentry to inode and !@#!@##!@$!$#!@#$!@$!@$ smack
|
/Linux-v6.1/fs/proc/ |
D | base.c | 2842 LSM_DIR_OPS(smack);
|
/Linux-v6.1/ |
D | MAINTAINERS | 18985 T: git git://github.com/cschaufler/smack-next 18987 F: security/smack/
|