• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/security/smack/

Lines Matching defs:smack

2  *  Simplified MAC Kernel (smack) security module
4 * This file contains the smack hook function implementations.
34 #include "smack.h"
39 * smk_fetch - Fetch the smack label from a file.
63 * @smack: a pointer to the Smack label to use in the blob
67 struct inode_smack *new_inode_smack(char *smack)
75 isp->smk_inode = smack;
270 * @data: the smack mount options
428 * smack_inode_init_security - copy out the smack from an inode
779 * smack_inode_getsecurity - get smack xattrs
1024 * Returns 0 if a subject with the object's smack could
1143 char *smack = smack_from_secid(secid);
1145 if (smack == NULL)
1148 new->security = smack;
1224 * Sets the secid to contain a u32 version of the smack label.
1322 * @secid: identifies the smack to use in lieu of current's
1372 * account for the smack labels having gotten to
1378 * the smack value.
1391 * smack_task_to_inode - copy task smack into the inode blob
1395 * Sets the smack pointer in the inode security blob
1515 * smack_to_secattr - fill a secattr from a smack value
1516 * @smack: the smack value
1524 static void smack_to_secattr(char *smack, struct netlbl_lsm_secattr *nlsp)
1529 nlsp->domain = smack;
1532 rc = smack_to_cipso(smack, &cipso);
1538 smack_set_catset(smack, nlsp);
1547 * Convert the outbound smack value (smk_out) to a
1627 * smack_inode_setsecurity - set smack xattrs
1773 * smack_of_shm - the smack pointer for the shm
1776 * Returns a pointer to the smack value
1896 * smack_of_sem - the smack pointer for the sem
1899 * Returns a pointer to the smack value
2052 * smack_of_msq - the smack pointer for the msq
2055 * Returns a pointer to the smack value
2183 * smack_ipc_getsecid - Extract smack security id
2189 char *smack = ipp->security;
2191 *secid = smack_to_secid(smack);
2254 * that the smack file system doesn't do
2268 * Programs that change smack have to treat the
2275 * Casey says sockets get the smack of the task.
2295 * If a smack value has been set we want to use it,
2343 * Returns the length of the smack label or an error code
2372 * Returns the length of the smack label or an error code
2420 * Return 0 if a subject with the smack of sock could access
2421 * an object with the smack of other, otherwise an error code
2441 * Return 0 if a subject with the smack of sock could access
2442 * an object with the smack of other, otherwise an error code
2481 * smack_from_secattr - Convert a netlabel attr.mls.lvl/attr.mls.cat pair to smack
2485 * Copies a smack label into sip
2489 char smack[SMK_LABELLEN];
2500 * Without guidance regarding the smack value
2504 memset(smack, '\0', SMK_LABELLEN);
2511 smack_catset_bit(pcat, smack);
2514 * If it is CIPSO using smack direct mapping
2518 memcpy(sip, smack, SMK_MAXLEN);
2525 smack_from_cipso(sap->attr.mls.lvl, smack, sip);
2545 * Without guidance regarding the smack value
2564 char smack[SMK_LABELLEN];
2578 smack_from_secattr(&secattr, smack);
2579 csp = smack;
2649 char smack[SMK_LABELLEN];
2669 smack_from_secattr(&secattr, smack);
2678 s = smack_to_secid(smack);
2724 char smack[SMK_LABELLEN];
2735 smack_from_secattr(&secattr, smack);
2737 strncpy(smack, smack_known_huh.smk_known, SMK_MAXLEN);
2750 rc = smk_access(smack, ssp->smk_in, MAY_WRITE, &ad);
2758 req->peer_secid = smack_to_secid(smack);
2771 smack_to_secattr(smack, &secattr);
2793 char *smack;
2796 smack = smack_from_secid(req->peer_secid);
2797 strncpy(ssp->smk_packet, smack, SMK_MAXLEN);
2888 * the needed unique representation. This also better fits the smack
2894 * smack_audit_rule_init - Initialize a smack audit rule
2897 * @rulestr: smack label to be audited
2947 * @vrule: smack internal rule presentation
2956 char *smack;
2968 smack = smack_from_secid(secid);
2976 return (rule == smack);
2978 return (rule != smack);
2984 * smack_audit_rule_free - free smack rule representation
2997 * smack_secid_to_secctx - return the smack label for a secid
3014 * smack_secctx_to_secid - return the secid for a smack label
3015 * @secdata: smack label
3060 .name = "smack",
3203 * smack_init - initialize the smack system
3237 panic("smack: Unable to register with kernel.\n");