Searched refs:smack (Results 1 – 7 of 7) sorted by relevance
/linux-2.6.39/security/smack/ |
D | smack_access.c | 357 char smack[SMK_LABELLEN]; in smk_import_entry() local 366 smack[i] = '\0'; in smk_import_entry() 370 smack[i] = '\0'; in smk_import_entry() 373 smack[i] = string[i]; in smk_import_entry() 376 if (smack[0] == '\0') in smk_import_entry() 383 if (strncmp(skp->smk_known, smack, SMK_MAXLEN) == 0) { in smk_import_entry() 392 strncpy(skp->smk_known, smack, SMK_MAXLEN); in smk_import_entry() 464 u32 smack_to_secid(const char *smack) in smack_to_secid() argument 470 if (strncmp(skp->smk_known, smack, SMK_MAXLEN) == 0) { in smack_to_secid() 527 int smack_to_cipso(const char *smack, struct smack_cipso *cp) in smack_to_cipso() argument [all …]
|
D | Makefile | 5 obj-$(CONFIG_SECURITY_SMACK) := smack.o 7 smack-y := smack_lsm.o smack_access.o smackfs.o
|
D | smack_lsm.c | 73 struct inode_smack *new_inode_smack(char *smack) in new_inode_smack() argument 81 isp->smk_inode = smack; in new_inode_smack() 1420 char *smack = smack_from_secid(secid); in smack_kernel_act_as() local 1422 if (smack == NULL) in smack_kernel_act_as() 1425 new_tsp->smk_task = smack; in smack_kernel_act_as() 1803 static void smack_to_secattr(char *smack, struct netlbl_lsm_secattr *nlsp) in smack_to_secattr() argument 1808 nlsp->domain = smack; in smack_to_secattr() 1811 rc = smack_to_cipso(smack, &cipso); in smack_to_secattr() 1817 smack_set_catset(smack, nlsp); in smack_to_secattr() 2471 char *smack = ipp->security; in smack_ipc_getsecid() local [all …]
|
D | smackfs.c | 836 char smack[SMK_LABELLEN]; in smk_write_netlbladdr() local 868 &host[0], &host[1], &host[2], &host[3], &m, smack); in smk_write_netlbladdr() 871 &host[0], &host[1], &host[2], &host[3], smack); in smk_write_netlbladdr() 880 if (smack[0] != '-') { in smk_write_netlbladdr() 881 sp = smk_import(smack, 0); in smk_write_netlbladdr() 886 if (strcmp(smack, smack_cipso_option) == 0) in smk_write_netlbladdr() 1146 char *smack; in smk_write_ambient() local 1157 smack = smk_import(in, count); in smk_write_ambient() 1158 if (smack == NULL) in smk_write_ambient() 1164 smack_net_ambient = smack; in smk_write_ambient() [all …]
|
/linux-2.6.39/Documentation/ |
D | Smack.txt | 30 The startup script etc-init.d-smack should be installed 31 in /etc/init.d/smack and should be invoked early in the 50 The format of /etc/smack/usr is: 52 username smack 60 smackfs /smack smackfs smackfsdef=* 0 0 62 and create the /smack directory for mounting. 75 at other labels use the attr command to set the smack value on the 78 You can add access rules in /etc/smack/accesses. They take the form: 86 A process can see the smack label it is running with by 88 set the process smack by writing there. [all …]
|
/linux-2.6.39/security/ |
D | Makefile | 7 subdir-$(CONFIG_SECURITY_SMACK) += smack 20 obj-$(CONFIG_SECURITY_SMACK) += smack/built-in.o
|
D | Kconfig | 184 source security/smack/Kconfig 222 default "smack" if DEFAULT_SECURITY_SMACK
|