Home
last modified time | relevance | path

Searched refs:smack (Results 1 – 13 of 13) sorted by relevance

/Linux-v6.6/security/smack/
Dsmack_access.c446 char *smack; in smk_parse_smack() local
468 smack = kstrndup(string, i, GFP_NOFS); in smk_parse_smack()
469 if (!smack) in smk_parse_smack()
471 return smack; in smk_parse_smack()
560 char *smack; in smk_import_entry() local
563 smack = smk_parse_smack(string, len); in smk_import_entry()
564 if (IS_ERR(smack)) in smk_import_entry()
565 return ERR_CAST(smack); in smk_import_entry()
569 skp = smk_find_entry(smack); in smk_import_entry()
579 skp->smk_known = smack; in smk_import_entry()
[all …]
DMakefile6 obj-$(CONFIG_SECURITY_SMACK) := smack.o
8 smack-y := smack_lsm.o smack_access.o smackfs.o
9 smack-$(CONFIG_SECURITY_SMACK_NETFILTER) += smack_netfilter.o
Dsmackfs.c1160 char *smack; in smk_write_net4addr() local
1192 smack = kzalloc(count + 1, GFP_KERNEL); in smk_write_net4addr()
1193 if (smack == NULL) { in smk_write_net4addr()
1199 &host[0], &host[1], &host[2], &host[3], &masks, smack); in smk_write_net4addr()
1202 &host[0], &host[1], &host[2], &host[3], smack); in smk_write_net4addr()
1217 if (smack[0] != '-') { in smk_write_net4addr()
1218 skp = smk_import_entry(smack, 0); in smk_write_net4addr()
1227 if (strcmp(smack, SMACK_CIPSO_OPTION) != 0) { in smk_write_net4addr()
1299 kfree(smack); in smk_write_net4addr()
1424 char *smack; in smk_write_net6addr() local
[all …]
Dsmack_lsm.c5167 DEFINE_LSM(smack) = {
/Linux-v6.6/security/
DMakefile16 obj-$(CONFIG_SECURITY_SMACK) += smack/
DKconfig189 source "security/smack/Kconfig"
236 …default "landlock,lockdown,yama,loadpin,safesetid,smack,selinux,tomoyo,apparmor,bpf" if DEFAULT_SE…
237 …default "landlock,lockdown,yama,loadpin,safesetid,apparmor,selinux,smack,tomoyo,bpf" if DEFAULT_SE…
240 default "landlock,lockdown,yama,loadpin,safesetid,selinux,smack,tomoyo,apparmor,bpf"
/Linux-v6.6/Documentation/admin-guide/LSM/
Dindex.rst35 named after the module. ``/proc/.../attr/smack`` is provided by the Smack
DSmack.rst41 git://github.com/smack-team/smack.git
329 you can add access rules in ``/etc/smack/accesses``. They take the form::
594 The configuration file /etc/smack/accesses contains the rules to be set at
656 /etc/smack/cipso.
660 smack level [category [category]*]
/Linux-v6.6/arch/s390/configs/
Ddefconfig693 CONFIG_LSM="yama,loadpin,safesetid,integrity,selinux,smack,tomoyo,apparmor"
Ddebug_defconfig709 CONFIG_LSM="yama,loadpin,safesetid,integrity,selinux,smack,tomoyo,apparmor"
/Linux-v6.6/Documentation/filesystems/
Dporting.rst725 called before we attach dentry to inode and !@#!@##!@$!$#!@#$!@$!@$ smack
/Linux-v6.6/fs/proc/
Dbase.c2842 LSM_DIR_OPS(smack);
/Linux-v6.6/
DMAINTAINERS19755 T: git git://github.com/cschaufler/smack-next
19757 F: security/smack/