Lines Matching refs:smack

3  *  Simplified MAC Kernel (smack) security module
5 * This file contains the smack hook function implementations.
46 #include "smack.h"
71 #define A(s) {"smack"#s, sizeof("smack"#s) - 1, Opt_##s}
282 * smk_fetch - Fetch the smack label from a file.
406 * Returns a converted MAY_* mode usable by smack rules
981 * smack_inode_init_security - copy out the smack from an inode
1533 * smack_inode_getsecurity - get smack xattrs
1902 * Returns 0 if a subject with the object's smack could
2110 * Sets the secid to contain a u32 version of the smack label.
2216 * Sets the secid to contain a u32 version of the task's subjective smack label.
2230 * Sets the secid to contain a u32 version of the task's objective smack label.
2351 * smack_task_to_inode - copy task smack into the inode blob
2355 * Sets the smack pointer in the inode security blob
2551 * Attach the outbound smack value (smk_out) to the socket.
2585 * Remove the outbound smack value from a socket
2834 * smack_inode_setsecurity - set smack xattrs
3074 * smack_of_ipc - the smack pointer for the ipc
3077 * Returns a pointer to the smack value
3415 * smack_ipc_getsecid - Extract smack security id
3523 * that the smack file system doesn't do
3533 * Programs that change smack have to treat the
3552 * If a smack value has been set we want to use it,
3646 * Returns the length of the smack label or an error code
3675 * Returns the length of the smack label or an error code
3737 * Return 0 if a subject with the smack of sock could access
3738 * an object with the smack of other, otherwise an error code
3788 * Return 0 if a subject with the smack of sock could access
3789 * an object with the smack of other, otherwise an error code
3870 * smack_from_secattr - Convert a netlabel attr.mls.lvl/attr.mls.cat pair to smack
3903 * Without guidance regarding the smack value
3944 * Without guidance regarding the smack value
4608 * the needed unique representation. This also better fits the smack
4614 * smack_audit_rule_init - Initialize a smack audit rule
4617 * @rulestr: smack label to be audited
4672 * @vrule: smack internal rule presentation
4713 * smack_ismaclabel - check if xattr @name references a smack MAC label
4723 * smack_secid_to_secctx - return the smack label for a secid
4741 * smack_secctx_to_secid - return the secid for a smack label
4742 * @secdata: smack label
4815 * Return 1 if this is the smack access Smack attribute.
5132 * smack_init - initialize the smack system
5154 security_add_hooks(smack_hooks, ARRAY_SIZE(smack_hooks), "smack");
5178 DEFINE_LSM(smack) = {
5179 .name = "smack",