| /OK3568_Linux_fs/kernel/security/smack/ |
| H A D | smack_access.c | 445 char *smack; in smk_parse_smack() local 467 smack = kzalloc(i + 1, GFP_NOFS); in smk_parse_smack() 468 if (smack == NULL) in smk_parse_smack() 471 strncpy(smack, string, i); in smk_parse_smack() 473 return smack; in smk_parse_smack() 560 char *smack; in smk_import_entry() local 563 smack = smk_parse_smack(string, len); in smk_import_entry() 564 if (IS_ERR(smack)) in smk_import_entry() 565 return ERR_CAST(smack); in smk_import_entry() 569 skp = smk_find_entry(smack); in smk_import_entry() [all …]
|
| H A D | Makefile | 6 obj-$(CONFIG_SECURITY_SMACK) := smack.o 8 smack-y := smack_lsm.o smack_access.o smackfs.o 9 smack-$(CONFIG_SECURITY_SMACK_NETFILTER) += smack_netfilter.o
|
| H A D | smackfs.c | 1148 char *smack; in smk_write_net4addr() local 1180 smack = kzalloc(count + 1, GFP_KERNEL); in smk_write_net4addr() 1181 if (smack == NULL) { in smk_write_net4addr() 1187 &host[0], &host[1], &host[2], &host[3], &masks, smack); in smk_write_net4addr() 1190 &host[0], &host[1], &host[2], &host[3], smack); in smk_write_net4addr() 1206 if (smack[0] != '-') { in smk_write_net4addr() 1207 skp = smk_import_entry(smack, 0); in smk_write_net4addr() 1216 if (strcmp(smack, SMACK_CIPSO_OPTION) != 0) { in smk_write_net4addr() 1288 kfree(smack); in smk_write_net4addr() 1413 char *smack; in smk_write_net6addr() local [all …]
|
| H A D | smack_lsm.c | 4924 DEFINE_LSM(smack) = {
|
| /OK3568_Linux_fs/buildroot/package/smack/ |
| H A D | Config.in | 2 bool "smack" 28 To activate SMACK, do not forget to add "security=smack" to 31 https://github.com/smack-team/smack 33 comment "smack needs a toolchain w/ dynamic library, threads, headers >= 3.0"
|
| H A D | smack.mk | 8 SMACK_SITE = $(call github,smack-team,smack,v$(SMACK_VERSION))
|
| H A D | smack.hash | 2 sha256 1a607da3b1a661dc76b7a5b8571f4a2d56b4d61d78376088d19f2d8637dc6822 smack-1.3.1.tar.gz
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-extended/ostree/ |
| H A D | ostree_2021.6.bb | 43 ${@bb.utils.filter('DISTRO_FEATURES', 'selinux smack', d)} \ 53 ${@bb.utils.filter('DISTRO_FEATURES', 'selinux smack', d)} \ 60 ${@bb.utils.filter('DISTRO_FEATURES', 'selinux smack', d)} \ 82 PACKAGECONFIG[smack] = "--with-smack, --without-smack, smack"
|
| /OK3568_Linux_fs/kernel/security/ |
| H A D | Makefile | 8 subdir-$(CONFIG_SECURITY_SMACK) += smack 25 obj-$(CONFIG_SECURITY_SMACK) += smack/
|
| H A D | Kconfig | 226 source "security/smack/Kconfig" 272 …default "lockdown,yama,loadpin,safesetid,integrity,smack,selinux,tomoyo,apparmor,bpf" if DEFAULT_S… 273 …default "lockdown,yama,loadpin,safesetid,integrity,apparmor,selinux,smack,tomoyo,bpf" if DEFAULT_S… 276 default "lockdown,yama,loadpin,safesetid,integrity,selinux,smack,tomoyo,apparmor,bpf"
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-core/systemd/systemd/ |
| H A D | 0022-do-not-disable-buffer-in-writing-files.patch | 31 src/core/smack-setup.c | 8 ++++---- 40 src/shared/smack-util.c | 2 +- 235 diff --git a/src/core/smack-setup.c b/src/core/smack-setup.c 237 --- a/src/core/smack-setup.c 238 +++ b/src/core/smack-setup.c 390 diff --git a/src/shared/smack-util.c b/src/shared/smack-util.c 392 --- a/src/shared/smack-util.c 393 +++ b/src/shared/smack-util.c
|
| H A D | 0002-Add-sys-stat.h-for-S_IFDIR.patch | 22 #include "smack-util.h"
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-core/sdbus-c++/sdbus-c++-libsystemd/ |
| H A D | 0022-do-not-disable-buffer-in-writing-files.patch | 29 src/core/smack-setup.c | 8 ++++---- 36 src/shared/smack-util.c | 2 +- 186 --- a/src/core/smack-setup.c 187 +++ b/src/core/smack-setup.c 292 --- a/src/shared/smack-util.c 293 +++ b/src/shared/smack-util.c
|
| H A D | 0002-Add-sys-stat.h-for-S_IFDIR.patch | 21 #include "smack-util.h"
|
| /OK3568_Linux_fs/kernel/Documentation/admin-guide/LSM/ |
| H A D | index.rst | 35 named after the module. ``/proc/.../attr/smack`` is provided by the Smack
|
| H A D | Smack.rst | 41 git://github.com/smack-team/smack.git 329 you can add access rules in ``/etc/smack/accesses``. They take the form:: 594 The configuration file /etc/smack/accesses contains the rules to be set at 656 /etc/smack/cipso. 660 smack level [category [category]*]
|
| /OK3568_Linux_fs/kernel/arch/s390/configs/ |
| H A D | defconfig | 673 CONFIG_LSM="yama,loadpin,safesetid,integrity,selinux,smack,tomoyo,apparmor"
|
| H A D | debug_defconfig | 684 CONFIG_LSM="yama,loadpin,safesetid,integrity,selinux,smack,tomoyo,apparmor"
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-core/systemd/ |
| H A D | systemd_250.5.bb | 68 …${@bb.utils.filter('DISTRO_FEATURES', 'acl audit efi ldconfig pam selinux smack usrmerge polkit se… 194 PACKAGECONFIG[smack] = "-Dsmack=true,-Dsmack=false"
|
| /OK3568_Linux_fs/kernel/Documentation/filesystems/ |
| H A D | porting.rst | 722 called before we attach dentry to inode and !@#!@##!@$!$#!@#$!@$!@$ smack
|
| /OK3568_Linux_fs/kernel/fs/proc/ |
| H A D | base.c | 2806 LSM_DIR_OPS(smack);
|
| /OK3568_Linux_fs/buildroot/ |
| H A D | DEVELOPERS | 745 F: package/smack/
|
| H A D | CHANGES | 34 python-cycler, qemu, qdecoder, smack, smcroute, spidev_test, 6927 smack, snowball-init, socat, sp-oops-extract, sqlite, 8630 python-pyrex, qdecoder, qhull, samba4, smack, tz, tzdump, ucl,
|
| /OK3568_Linux_fs/buildroot/package/ |
| H A D | Config.in | 2582 source "package/smack/Config.in"
|
| /OK3568_Linux_fs/kernel/ |
| H A D | MAINTAINERS | 16135 T: git git://github.com/cschaufler/smack-next 16137 F: security/smack/
|