Home
last modified time | relevance | path

Searched refs:smack (Results 1 – 25 of 36) sorted by relevance

12

/openbmc/openbmc/meta-security/recipes-mac/smack/
H A Dsmack_1.3.1.bb2 HOMEPAGE = "https://github.com/smack-team/smack"
10 git://github.com/smack-team/smack.git;branch=master;protocol=https \
25 REQUIRED_DISTRO_FEATURES = "smack"
41 install -d ${D}${sysconfdir}/smack
42 install -d ${D}${sysconfdir}/smack/accesses.d
43 install -d ${D}${sysconfdir}/smack/cipso.d
44 install ${S}/init/smack.rc ${D}/${sysconfdir}/init.d/smack
55 INITSCRIPT_NAME = "smack"
58 FILES:${PN} += "${sysconfdir}/init.d/smack"
H A Dsmack-test_1.0.bb18 REQUIRED_DISTRO_FEATURES = "smack"
26 RDEPENDS:${PN} = "smack python3-core mmap-smack-test tcp-smack-test udp-smack-test"
H A Dmmap-smack-test_1.0.bb1 SUMMARY = "Mmap binary used to test smack mmap attribute"
2 DESCRIPTION = "Mmap binary used to test smack mmap attribute"
H A Dtcp-smack-test_1.0.bb1 SUMMARY = "Binary used to test smack tcp sockets"
2 DESCRIPTION = "Server and client binaries used to test smack attributes on TCP sockets"
H A Dudp-smack-test_1.0.bb1 SUMMARY = "Binary used to test smack udp sockets"
2 DESCRIPTION = "Server and client binaries used to test smack attributes on UDP sockets"
/openbmc/linux/security/smack/
H A Dsmack_access.c446 char *smack; in smk_parse_smack() local
468 smack = kstrndup(string, i, GFP_NOFS); in smk_parse_smack()
469 if (!smack) in smk_parse_smack()
471 return smack; in smk_parse_smack()
560 char *smack; in smk_import_entry() local
563 smack = smk_parse_smack(string, len); in smk_import_entry()
564 if (IS_ERR(smack)) in smk_import_entry()
565 return ERR_CAST(smack); in smk_import_entry()
569 skp = smk_find_entry(smack); in smk_import_entry()
579 skp->smk_known = smack; in smk_import_entry()
[all …]
H A DMakefile6 obj-$(CONFIG_SECURITY_SMACK) := smack.o
8 smack-y := smack_lsm.o smack_access.o smackfs.o
9 smack-$(CONFIG_SECURITY_SMACK_NETFILTER) += smack_netfilter.o
H A Dsmackfs.c1160 char *smack; in smk_write_net4addr() local
1192 smack = kzalloc(count + 1, GFP_KERNEL); in smk_write_net4addr()
1193 if (smack == NULL) { in smk_write_net4addr()
1199 &host[0], &host[1], &host[2], &host[3], &masks, smack); in smk_write_net4addr()
1202 &host[0], &host[1], &host[2], &host[3], smack); in smk_write_net4addr()
1217 if (smack[0] != '-') { in smk_write_net4addr()
1218 skp = smk_import_entry(smack, 0); in smk_write_net4addr()
1227 if (strcmp(smack, SMACK_CIPSO_OPTION) != 0) { in smk_write_net4addr()
1299 kfree(smack); in smk_write_net4addr()
1424 char *smack; in smk_write_net6addr() local
[all …]
/openbmc/openbmc/meta-security/recipes-kernel/linux/
H A Dlinux-yocto_security.inc4 KERNEL_FEATURES:append = " ${@bb.utils.contains("DISTRO_FEATURES", "smack", " features/smack/smack.…
/openbmc/openbmc/meta-security/recipes-core/images/
H A Dsecurity-test-image.bb8 ${@bb.utils.contains("DISTRO_FEATURES", "smack", "smack-test", "",d)} \
15 TEST_SUITES = "ssh ping apparmor clamav samhain sssd checksec smack suricata aide firejail"
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/ostree/
H A Dostree_2024.10.bb46 ${@bb.utils.filter('DISTRO_FEATURES', 'selinux smack', d)} \
57 ${@bb.utils.filter('DISTRO_FEATURES', 'selinux smack', d)} \
64 ${@bb.utils.filter('DISTRO_FEATURES', 'selinux smack', d)} \
89 PACKAGECONFIG[smack] = "--with-smack, --without-smack, smack"
/openbmc/openbmc/meta-security/recipes-core/packagegroup/
H A Dpackagegroup-core-security.bb89 ${@bb.utils.contains("DISTRO_FEATURES", "smack", "smack", "",d)} \
108 ${@bb.utils.contains("DISTRO_FEATURES", "smack", "smack-ptest", "",d)} \
/openbmc/openbmc/poky/meta/recipes-core/systemd/systemd/
H A D0012-do-not-disable-buffer-in-writing-files.patch33 src/core/smack-setup.c | 6 +++---
42 src/shared/smack-util.c | 2 +-
192 diff --git a/src/core/smack-setup.c b/src/core/smack-setup.c
194 --- a/src/core/smack-setup.c
195 +++ b/src/core/smack-setup.c
393 diff --git a/src/shared/smack-util.c b/src/shared/smack-util.c
395 --- a/src/shared/smack-util.c
396 +++ b/src/shared/smack-util.c
/openbmc/openbmc/meta-security/recipes-mac/smack/smack-test/
H A Dtest_smack_onlycap.sh3 SMACK_PATH=`grep smack /proc/mounts | awk '{print $2}'`
H A Dsmack_test_file_access.sh3 SMACK_PATH=`grep smack /proc/mounts | awk '{print $2}' `
/openbmc/linux/security/
H A DMakefile16 obj-$(CONFIG_SECURITY_SMACK) += smack/
H A DKconfig221 source "security/smack/Kconfig"
268 …default "landlock,lockdown,yama,loadpin,safesetid,smack,selinux,tomoyo,apparmor,bpf" if DEFAULT_SE…
269 …default "landlock,lockdown,yama,loadpin,safesetid,apparmor,selinux,smack,tomoyo,bpf" if DEFAULT_SE…
272 default "landlock,lockdown,yama,loadpin,safesetid,selinux,smack,tomoyo,apparmor,bpf"
/openbmc/openbmc/meta-security/recipes-mac/smack/udp-smack-test/
H A Dtest_smack_udp_sockets.sh4 SMACK_PATH=`grep smack /proc/mounts | awk '{print $2}' `
/openbmc/openbmc/meta-security/recipes-mac/smack/tcp-smack-test/
H A Dtest_smack_tcp_sockets.sh4 SMACK_PATH=`grep smack /proc/mounts | awk '{print $2}' `
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-core/sdbus-c++/sdbus-c++-libsystemd/
H A D0012-do-not-disable-buffer-in-writing-files.patch32 src/core/smack-setup.c | 8 ++++----
41 src/shared/smack-util.c | 2 +-
202 --- a/src/core/smack-setup.c
203 +++ b/src/core/smack-setup.c
359 --- a/src/shared/smack-util.c
360 +++ b/src/shared/smack-util.c
/openbmc/linux/Documentation/admin-guide/LSM/
H A Dindex.rst35 named after the module. ``/proc/.../attr/smack`` is provided by the Smack
H A DSmack.rst41 git://github.com/smack-team/smack.git
329 you can add access rules in ``/etc/smack/accesses``. They take the form::
594 The configuration file /etc/smack/accesses contains the rules to be set at
656 /etc/smack/cipso.
660 smack level [category [category]*]
/openbmc/openbmc/meta-security/conf/distro/include/
H A Dmaintainers-meta-security.inc54 RECIPE_MAINTAINER:pn-smack = "Armin Kuster <akuster808@gmail.com>"
/openbmc/openbmc/meta-security/meta-integrity/
H A DREADME.md185 2.19 in meta-security-smack has a patch reverting the broken
/openbmc/linux/arch/s390/configs/
H A Ddefconfig693 CONFIG_LSM="yama,loadpin,safesetid,integrity,selinux,smack,tomoyo,apparmor"

12