/openbmc/openbmc/meta-security/recipes-mac/smack/ |
H A D | smack_1.3.1.bb | 2 HOMEPAGE = "https://github.com/smack-team/smack" 10 git://github.com/smack-team/smack.git;branch=master;protocol=https \ 25 REQUIRED_DISTRO_FEATURES = "smack" 41 install -d ${D}${sysconfdir}/smack 42 install -d ${D}${sysconfdir}/smack/accesses.d 43 install -d ${D}${sysconfdir}/smack/cipso.d 44 install ${S}/init/smack.rc ${D}/${sysconfdir}/init.d/smack 55 INITSCRIPT_NAME = "smack" 58 FILES:${PN} += "${sysconfdir}/init.d/smack"
|
H A D | smack-test_1.0.bb | 18 REQUIRED_DISTRO_FEATURES = "smack" 26 RDEPENDS:${PN} = "smack python3-core mmap-smack-test tcp-smack-test udp-smack-test"
|
H A D | mmap-smack-test_1.0.bb | 1 SUMMARY = "Mmap binary used to test smack mmap attribute" 2 DESCRIPTION = "Mmap binary used to test smack mmap attribute"
|
H A D | tcp-smack-test_1.0.bb | 1 SUMMARY = "Binary used to test smack tcp sockets" 2 DESCRIPTION = "Server and client binaries used to test smack attributes on TCP sockets"
|
H A D | udp-smack-test_1.0.bb | 1 SUMMARY = "Binary used to test smack udp sockets" 2 DESCRIPTION = "Server and client binaries used to test smack attributes on UDP sockets"
|
/openbmc/linux/security/smack/ |
H A D | smack_access.c | 446 char *smack; in smk_parse_smack() local 468 smack = kstrndup(string, i, GFP_NOFS); in smk_parse_smack() 469 if (!smack) in smk_parse_smack() 471 return smack; in smk_parse_smack() 560 char *smack; in smk_import_entry() local 563 smack = smk_parse_smack(string, len); in smk_import_entry() 564 if (IS_ERR(smack)) in smk_import_entry() 565 return ERR_CAST(smack); in smk_import_entry() 569 skp = smk_find_entry(smack); in smk_import_entry() 579 skp->smk_known = smack; in smk_import_entry() [all …]
|
H A D | Makefile | 6 obj-$(CONFIG_SECURITY_SMACK) := smack.o 8 smack-y := smack_lsm.o smack_access.o smackfs.o 9 smack-$(CONFIG_SECURITY_SMACK_NETFILTER) += smack_netfilter.o
|
H A D | smackfs.c | 1160 char *smack; in smk_write_net4addr() local 1192 smack = kzalloc(count + 1, GFP_KERNEL); in smk_write_net4addr() 1193 if (smack == NULL) { in smk_write_net4addr() 1199 &host[0], &host[1], &host[2], &host[3], &masks, smack); in smk_write_net4addr() 1202 &host[0], &host[1], &host[2], &host[3], smack); in smk_write_net4addr() 1217 if (smack[0] != '-') { in smk_write_net4addr() 1218 skp = smk_import_entry(smack, 0); in smk_write_net4addr() 1227 if (strcmp(smack, SMACK_CIPSO_OPTION) != 0) { in smk_write_net4addr() 1299 kfree(smack); in smk_write_net4addr() 1424 char *smack; in smk_write_net6addr() local [all …]
|
/openbmc/openbmc/meta-security/recipes-kernel/linux/ |
H A D | linux-yocto_security.inc | 4 KERNEL_FEATURES:append = " ${@bb.utils.contains("DISTRO_FEATURES", "smack", " features/smack/smack.…
|
/openbmc/openbmc/meta-security/recipes-core/images/ |
H A D | security-test-image.bb | 8 ${@bb.utils.contains("DISTRO_FEATURES", "smack", "smack-test", "",d)} \ 15 TEST_SUITES = "ssh ping apparmor clamav samhain sssd checksec smack suricata aide firejail"
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/ostree/ |
H A D | ostree_2024.10.bb | 46 ${@bb.utils.filter('DISTRO_FEATURES', 'selinux smack', d)} \ 57 ${@bb.utils.filter('DISTRO_FEATURES', 'selinux smack', d)} \ 64 ${@bb.utils.filter('DISTRO_FEATURES', 'selinux smack', d)} \ 89 PACKAGECONFIG[smack] = "--with-smack, --without-smack, smack"
|
/openbmc/openbmc/meta-security/recipes-core/packagegroup/ |
H A D | packagegroup-core-security.bb | 89 ${@bb.utils.contains("DISTRO_FEATURES", "smack", "smack", "",d)} \ 108 ${@bb.utils.contains("DISTRO_FEATURES", "smack", "smack-ptest", "",d)} \
|
/openbmc/openbmc/poky/meta/recipes-core/systemd/systemd/ |
H A D | 0012-do-not-disable-buffer-in-writing-files.patch | 33 src/core/smack-setup.c | 6 +++--- 42 src/shared/smack-util.c | 2 +- 192 diff --git a/src/core/smack-setup.c b/src/core/smack-setup.c 194 --- a/src/core/smack-setup.c 195 +++ b/src/core/smack-setup.c 393 diff --git a/src/shared/smack-util.c b/src/shared/smack-util.c 395 --- a/src/shared/smack-util.c 396 +++ b/src/shared/smack-util.c
|
/openbmc/openbmc/meta-security/recipes-mac/smack/smack-test/ |
H A D | test_smack_onlycap.sh | 3 SMACK_PATH=`grep smack /proc/mounts | awk '{print $2}'`
|
H A D | smack_test_file_access.sh | 3 SMACK_PATH=`grep smack /proc/mounts | awk '{print $2}' `
|
/openbmc/linux/security/ |
H A D | Makefile | 16 obj-$(CONFIG_SECURITY_SMACK) += smack/
|
H A D | Kconfig | 221 source "security/smack/Kconfig" 268 …default "landlock,lockdown,yama,loadpin,safesetid,smack,selinux,tomoyo,apparmor,bpf" if DEFAULT_SE… 269 …default "landlock,lockdown,yama,loadpin,safesetid,apparmor,selinux,smack,tomoyo,bpf" if DEFAULT_SE… 272 default "landlock,lockdown,yama,loadpin,safesetid,selinux,smack,tomoyo,apparmor,bpf"
|
/openbmc/openbmc/meta-security/recipes-mac/smack/udp-smack-test/ |
H A D | test_smack_udp_sockets.sh | 4 SMACK_PATH=`grep smack /proc/mounts | awk '{print $2}' `
|
/openbmc/openbmc/meta-security/recipes-mac/smack/tcp-smack-test/ |
H A D | test_smack_tcp_sockets.sh | 4 SMACK_PATH=`grep smack /proc/mounts | awk '{print $2}' `
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-core/sdbus-c++/sdbus-c++-libsystemd/ |
H A D | 0012-do-not-disable-buffer-in-writing-files.patch | 32 src/core/smack-setup.c | 8 ++++---- 41 src/shared/smack-util.c | 2 +- 202 --- a/src/core/smack-setup.c 203 +++ b/src/core/smack-setup.c 359 --- a/src/shared/smack-util.c 360 +++ b/src/shared/smack-util.c
|
/openbmc/linux/Documentation/admin-guide/LSM/ |
H A D | index.rst | 35 named after the module. ``/proc/.../attr/smack`` is provided by the Smack
|
H A D | Smack.rst | 41 git://github.com/smack-team/smack.git 329 you can add access rules in ``/etc/smack/accesses``. They take the form:: 594 The configuration file /etc/smack/accesses contains the rules to be set at 656 /etc/smack/cipso. 660 smack level [category [category]*]
|
/openbmc/openbmc/meta-security/conf/distro/include/ |
H A D | maintainers-meta-security.inc | 54 RECIPE_MAINTAINER:pn-smack = "Armin Kuster <akuster808@gmail.com>"
|
/openbmc/openbmc/meta-security/meta-integrity/ |
H A D | README.md | 185 2.19 in meta-security-smack has a patch reverting the broken
|
/openbmc/linux/arch/s390/configs/ |
H A D | defconfig | 693 CONFIG_LSM="yama,loadpin,safesetid,integrity,selinux,smack,tomoyo,apparmor"
|