Home
last modified time | relevance | path

Searched refs:attr (Results 1 – 15 of 15) sorted by relevance

/security/
A Dlsm_syscalls.c55 SYSCALL_DEFINE4(lsm_set_self_attr, unsigned int, attr, struct lsm_ctx __user *, in SYSCALL_DEFINE4() argument
58 return security_setselfattr(attr, ctx, size, flags); in SYSCALL_DEFINE4()
77 SYSCALL_DEFINE4(lsm_get_self_attr, unsigned int, attr, struct lsm_ctx __user *, in SYSCALL_DEFINE4() argument
80 return security_getselfattr(attr, ctx, size, flags); in SYSCALL_DEFINE4()
A Dsecurity.c2341 struct dentry *dentry, struct iattr *attr) in security_inode_setattr() argument
2345 return call_int_hook(inode_setattr, idmap, dentry, attr); in security_inode_setattr()
4147 if (attr == LSM_ATTR_UNDEF) in security_getselfattr()
4180 rc = scall->hl->hook.getselfattr(attr, uctx, &entrysize, flags); in security_getselfattr()
4252 rc = scall->hl->hook.setselfattr(attr, lctx, size, flags); in security_setselfattr()
5670 return call_int_hook(bpf, cmd, attr, size, kernel); in security_bpf()
5714 int security_bpf_map_create(struct bpf_map *map, union bpf_attr *attr, in security_bpf_map_create() argument
5717 return call_int_hook(bpf_map_create, map, attr, token, kernel); in security_bpf_map_create()
5733 int security_bpf_prog_load(struct bpf_prog *prog, union bpf_attr *attr, in security_bpf_prog_load() argument
5736 return call_int_hook(bpf_prog_load, prog, attr, token, kernel); in security_bpf_prog_load()
[all …]
/security/keys/trusted-keys/
A Dtrusted_tee.c84 param[0].attr = TEE_IOCTL_PARAM_ATTR_TYPE_MEMREF_INPUT; in trusted_tee_seal()
88 param[1].attr = TEE_IOCTL_PARAM_ATTR_TYPE_MEMREF_OUTPUT; in trusted_tee_seal()
131 param[0].attr = TEE_IOCTL_PARAM_ATTR_TYPE_MEMREF_INPUT; in trusted_tee_unseal()
135 param[1].attr = TEE_IOCTL_PARAM_ATTR_TYPE_MEMREF_OUTPUT; in trusted_tee_unseal()
177 param[0].attr = TEE_IOCTL_PARAM_ATTR_TYPE_MEMREF_OUTPUT; in trusted_tee_get_random()
/security/integrity/evm/
A Devm_main.c886 struct dentry *dentry, struct iattr *attr) in evm_attr_change() argument
889 unsigned int ia_valid = attr->ia_valid; in evm_attr_change()
891 if (!i_uid_needs_update(idmap, attr, inode) && in evm_attr_change()
892 !i_gid_needs_update(idmap, attr, inode) && in evm_attr_change()
893 (!(ia_valid & ATTR_MODE) || attr->ia_mode == inode->i_mode)) in evm_attr_change()
909 struct iattr *attr) in evm_inode_setattr() argument
911 unsigned int ia_valid = attr->ia_valid; in evm_inode_setattr()
939 !evm_attr_change(idmap, dentry, attr)) in evm_inode_setattr()
/security/smack/
A Dsmack_access.c502 sap->attr.mls.lvl = level; in smk_netlbl_mls()
503 sap->attr.mls.cat = NULL; in smk_netlbl_mls()
509 rc = netlbl_catmap_setbit(&sap->attr.mls.cat, in smk_netlbl_mls()
512 netlbl_catmap_free(sap->attr.mls.cat); in smk_netlbl_mls()
532 skp->smk_netlabel.attr.secid = skp->smk_secid; in smack_populate_secattr()
A Dsmackfs.c755 struct netlbl_lsm_catmap *cmp = skp->smk_netlabel.attr.mls.cat; in cipso_seq_show()
770 seq_printf(s, "%s %3d", skp->smk_known, skp->smk_netlabel.attr.mls.lvl); in cipso_seq_show()
907 old_cat = skp->smk_netlabel.attr.mls.cat; in smk_set_cipso()
908 rcu_assign_pointer(skp->smk_netlabel.attr.mls.cat, ncats.attr.mls.cat); in smk_set_cipso()
909 if (ncats.attr.mls.cat) in smk_set_cipso()
913 skp->smk_netlabel.attr.mls.lvl = ncats.attr.mls.lvl; in smk_set_cipso()
966 struct netlbl_lsm_catmap *cmp = skp->smk_netlabel.attr.mls.cat; in cipso2_seq_show()
1675 if (skp->smk_netlabel.attr.mls.lvl == in smk_write_direct()
1677 skp->smk_netlabel.attr.mls.lvl = i; in smk_write_direct()
1753 if (skp->smk_netlabel.attr.mls.lvl == in smk_write_mapped()
[all …]
A Dsmack_lsm.c3680 if (attr != LSM_ATTR_CURRENT) in smack_getselfattr()
3729 static int do_setattr(u64 attr, void *value, size_t size) in do_setattr() argument
3743 if (attr != LSM_ATTR_CURRENT) in do_setattr()
3800 rc = do_setattr(attr, ctx->ctx, ctx->ctx_len); in smack_setselfattr()
3819 int attr = lsm_name_to_attr(name); in smack_setprocattr() local
3821 if (attr != LSM_ATTR_UNDEF) in smack_setprocattr()
3822 return do_setattr(attr, value, size); in smack_setprocattr()
3995 return smack_from_secid(sap->attr.secid); in smack_from_secattr()
4010 if (sap->attr.mls.lvl != skp->smk_netlabel.attr.mls.lvl) in smack_from_secattr()
4022 acat = netlbl_catmap_walk(sap->attr.mls.cat, in smack_from_secattr()
[all …]
/security/selinux/ss/
A Dmls.c559 secattr->attr.mls.lvl = context->range.level[0].sens - 1; in mls_export_netlbl_lvl()
580 context->range.level[0].sens = secattr->attr.mls.lvl + 1; in mls_import_netlbl_lvl()
604 &secattr->attr.mls.cat); in mls_export_netlbl_cat()
605 if (rc == 0 && secattr->attr.mls.cat != NULL) in mls_export_netlbl_cat()
633 secattr->attr.mls.cat); in mls_import_netlbl_cat()
A Dconstraint.h43 u32 attr; /* attribute */ member
A Dservices.c298 switch (e->attr) { in constraint_expr_eval()
398 if (e->attr & CEXPR_TARGET) in constraint_expr_eval()
400 else if (e->attr & CEXPR_XTARGET) { in constraint_expr_eval()
407 if (e->attr & CEXPR_USER) in constraint_expr_eval()
409 else if (e->attr & CEXPR_ROLE) in constraint_expr_eval()
411 else if (e->attr & CEXPR_TYPE) in constraint_expr_eval()
3914 *sid = secattr->attr.secid; in security_netlbl_secattr_to_sid()
3990 secattr->attr.secid = sid; in security_netlbl_sid_to_secattr()
A Dpolicydb.c1270 e->attr = le32_to_cpu(buf[1]); in read_cons_helper()
1290 if (!allowxtarget && (e->attr & CEXPR_XTARGET)) in read_cons_helper()
3062 buf[1] = cpu_to_le32(e->attr); in write_cons_helper()
/security/landlock/
A Dsyscalls.c196 const struct landlock_ruleset_attr __user *const, attr, in SYSCALL_DEFINE3() argument
210 if (attr || size) in SYSCALL_DEFINE3()
226 attr, size); in SYSCALL_DEFINE3()
/security/apparmor/
A Dlsm.c796 switch (attr) { in apparmor_getselfattr()
855 static int do_setattr(u64 attr, void *value, size_t size) in do_setattr() argument
886 if (attr == LSM_ATTR_CURRENT) { in do_setattr()
901 } else if (attr == LSM_ATTR_EXEC) { in do_setattr()
921 if (attr == LSM_ATTR_CURRENT) in do_setattr()
923 else if (attr == LSM_ATTR_EXEC) in do_setattr()
938 if (attr != LSM_ATTR_CURRENT && attr != LSM_ATTR_EXEC) in apparmor_setselfattr()
941 rc = do_setattr(attr, ctx->ctx, ctx->ctx_len); in apparmor_setselfattr()
950 int attr = lsm_name_to_attr(name); in apparmor_setprocattr() local
952 if (attr) in apparmor_setprocattr()
[all …]
/security/selinux/
A Dhooks.c6538 switch (attr) { in selinux_lsm_getattr()
6589 switch (attr) { in selinux_lsm_setattr()
6667 if (attr == LSM_ATTR_EXEC) { in selinux_lsm_setattr()
6669 } else if (attr == LSM_ATTR_FSCREATE) { in selinux_lsm_setattr()
6671 } else if (attr == LSM_ATTR_KEYCREATE) { in selinux_lsm_setattr()
6679 } else if (attr == LSM_ATTR_SOCKCREATE) { in selinux_lsm_setattr()
6681 } else if (attr == LSM_ATTR_CURRENT) { in selinux_lsm_setattr()
6767 if (attr) { in selinux_getprocattr()
6768 rc = selinux_lsm_getattr(attr, p, value); in selinux_getprocattr()
6778 int attr = lsm_name_to_attr(name); in selinux_setprocattr() local
[all …]
A Dnetlabel.c112 (secattr->attr.secid == sid)) in selinux_netlbl_sock_getattr()

Completed in 69 milliseconds