| /security/ |
| A D | lsm_syscalls.c | 55 SYSCALL_DEFINE4(lsm_set_self_attr, unsigned int, attr, struct lsm_ctx __user *, in SYSCALL_DEFINE4() argument 58 return security_setselfattr(attr, ctx, size, flags); in SYSCALL_DEFINE4() 77 SYSCALL_DEFINE4(lsm_get_self_attr, unsigned int, attr, struct lsm_ctx __user *, in SYSCALL_DEFINE4() argument 80 return security_getselfattr(attr, ctx, size, flags); in SYSCALL_DEFINE4()
|
| A D | security.c | 2341 struct dentry *dentry, struct iattr *attr) in security_inode_setattr() argument 2345 return call_int_hook(inode_setattr, idmap, dentry, attr); in security_inode_setattr() 4147 if (attr == LSM_ATTR_UNDEF) in security_getselfattr() 4180 rc = scall->hl->hook.getselfattr(attr, uctx, &entrysize, flags); in security_getselfattr() 4252 rc = scall->hl->hook.setselfattr(attr, lctx, size, flags); in security_setselfattr() 5670 return call_int_hook(bpf, cmd, attr, size, kernel); in security_bpf() 5714 int security_bpf_map_create(struct bpf_map *map, union bpf_attr *attr, in security_bpf_map_create() argument 5717 return call_int_hook(bpf_map_create, map, attr, token, kernel); in security_bpf_map_create() 5733 int security_bpf_prog_load(struct bpf_prog *prog, union bpf_attr *attr, in security_bpf_prog_load() argument 5736 return call_int_hook(bpf_prog_load, prog, attr, token, kernel); in security_bpf_prog_load() [all …]
|
| /security/keys/trusted-keys/ |
| A D | trusted_tee.c | 84 param[0].attr = TEE_IOCTL_PARAM_ATTR_TYPE_MEMREF_INPUT; in trusted_tee_seal() 88 param[1].attr = TEE_IOCTL_PARAM_ATTR_TYPE_MEMREF_OUTPUT; in trusted_tee_seal() 131 param[0].attr = TEE_IOCTL_PARAM_ATTR_TYPE_MEMREF_INPUT; in trusted_tee_unseal() 135 param[1].attr = TEE_IOCTL_PARAM_ATTR_TYPE_MEMREF_OUTPUT; in trusted_tee_unseal() 177 param[0].attr = TEE_IOCTL_PARAM_ATTR_TYPE_MEMREF_OUTPUT; in trusted_tee_get_random()
|
| /security/integrity/evm/ |
| A D | evm_main.c | 886 struct dentry *dentry, struct iattr *attr) in evm_attr_change() argument 889 unsigned int ia_valid = attr->ia_valid; in evm_attr_change() 891 if (!i_uid_needs_update(idmap, attr, inode) && in evm_attr_change() 892 !i_gid_needs_update(idmap, attr, inode) && in evm_attr_change() 893 (!(ia_valid & ATTR_MODE) || attr->ia_mode == inode->i_mode)) in evm_attr_change() 909 struct iattr *attr) in evm_inode_setattr() argument 911 unsigned int ia_valid = attr->ia_valid; in evm_inode_setattr() 939 !evm_attr_change(idmap, dentry, attr)) in evm_inode_setattr()
|
| /security/smack/ |
| A D | smack_access.c | 502 sap->attr.mls.lvl = level; in smk_netlbl_mls() 503 sap->attr.mls.cat = NULL; in smk_netlbl_mls() 509 rc = netlbl_catmap_setbit(&sap->attr.mls.cat, in smk_netlbl_mls() 512 netlbl_catmap_free(sap->attr.mls.cat); in smk_netlbl_mls() 532 skp->smk_netlabel.attr.secid = skp->smk_secid; in smack_populate_secattr()
|
| A D | smackfs.c | 755 struct netlbl_lsm_catmap *cmp = skp->smk_netlabel.attr.mls.cat; in cipso_seq_show() 770 seq_printf(s, "%s %3d", skp->smk_known, skp->smk_netlabel.attr.mls.lvl); in cipso_seq_show() 907 old_cat = skp->smk_netlabel.attr.mls.cat; in smk_set_cipso() 908 rcu_assign_pointer(skp->smk_netlabel.attr.mls.cat, ncats.attr.mls.cat); in smk_set_cipso() 909 if (ncats.attr.mls.cat) in smk_set_cipso() 913 skp->smk_netlabel.attr.mls.lvl = ncats.attr.mls.lvl; in smk_set_cipso() 966 struct netlbl_lsm_catmap *cmp = skp->smk_netlabel.attr.mls.cat; in cipso2_seq_show() 1675 if (skp->smk_netlabel.attr.mls.lvl == in smk_write_direct() 1677 skp->smk_netlabel.attr.mls.lvl = i; in smk_write_direct() 1753 if (skp->smk_netlabel.attr.mls.lvl == in smk_write_mapped() [all …]
|
| A D | smack_lsm.c | 3680 if (attr != LSM_ATTR_CURRENT) in smack_getselfattr() 3729 static int do_setattr(u64 attr, void *value, size_t size) in do_setattr() argument 3743 if (attr != LSM_ATTR_CURRENT) in do_setattr() 3800 rc = do_setattr(attr, ctx->ctx, ctx->ctx_len); in smack_setselfattr() 3819 int attr = lsm_name_to_attr(name); in smack_setprocattr() local 3821 if (attr != LSM_ATTR_UNDEF) in smack_setprocattr() 3822 return do_setattr(attr, value, size); in smack_setprocattr() 3995 return smack_from_secid(sap->attr.secid); in smack_from_secattr() 4010 if (sap->attr.mls.lvl != skp->smk_netlabel.attr.mls.lvl) in smack_from_secattr() 4022 acat = netlbl_catmap_walk(sap->attr.mls.cat, in smack_from_secattr() [all …]
|
| /security/selinux/ss/ |
| A D | mls.c | 559 secattr->attr.mls.lvl = context->range.level[0].sens - 1; in mls_export_netlbl_lvl() 580 context->range.level[0].sens = secattr->attr.mls.lvl + 1; in mls_import_netlbl_lvl() 604 &secattr->attr.mls.cat); in mls_export_netlbl_cat() 605 if (rc == 0 && secattr->attr.mls.cat != NULL) in mls_export_netlbl_cat() 633 secattr->attr.mls.cat); in mls_import_netlbl_cat()
|
| A D | constraint.h | 43 u32 attr; /* attribute */ member
|
| A D | services.c | 298 switch (e->attr) { in constraint_expr_eval() 398 if (e->attr & CEXPR_TARGET) in constraint_expr_eval() 400 else if (e->attr & CEXPR_XTARGET) { in constraint_expr_eval() 407 if (e->attr & CEXPR_USER) in constraint_expr_eval() 409 else if (e->attr & CEXPR_ROLE) in constraint_expr_eval() 411 else if (e->attr & CEXPR_TYPE) in constraint_expr_eval() 3914 *sid = secattr->attr.secid; in security_netlbl_secattr_to_sid() 3990 secattr->attr.secid = sid; in security_netlbl_sid_to_secattr()
|
| A D | policydb.c | 1270 e->attr = le32_to_cpu(buf[1]); in read_cons_helper() 1290 if (!allowxtarget && (e->attr & CEXPR_XTARGET)) in read_cons_helper() 3062 buf[1] = cpu_to_le32(e->attr); in write_cons_helper()
|
| /security/landlock/ |
| A D | syscalls.c | 196 const struct landlock_ruleset_attr __user *const, attr, in SYSCALL_DEFINE3() argument 210 if (attr || size) in SYSCALL_DEFINE3() 226 attr, size); in SYSCALL_DEFINE3()
|
| /security/apparmor/ |
| A D | lsm.c | 796 switch (attr) { in apparmor_getselfattr() 855 static int do_setattr(u64 attr, void *value, size_t size) in do_setattr() argument 886 if (attr == LSM_ATTR_CURRENT) { in do_setattr() 901 } else if (attr == LSM_ATTR_EXEC) { in do_setattr() 921 if (attr == LSM_ATTR_CURRENT) in do_setattr() 923 else if (attr == LSM_ATTR_EXEC) in do_setattr() 938 if (attr != LSM_ATTR_CURRENT && attr != LSM_ATTR_EXEC) in apparmor_setselfattr() 941 rc = do_setattr(attr, ctx->ctx, ctx->ctx_len); in apparmor_setselfattr() 950 int attr = lsm_name_to_attr(name); in apparmor_setprocattr() local 952 if (attr) in apparmor_setprocattr() [all …]
|
| /security/selinux/ |
| A D | hooks.c | 6538 switch (attr) { in selinux_lsm_getattr() 6589 switch (attr) { in selinux_lsm_setattr() 6667 if (attr == LSM_ATTR_EXEC) { in selinux_lsm_setattr() 6669 } else if (attr == LSM_ATTR_FSCREATE) { in selinux_lsm_setattr() 6671 } else if (attr == LSM_ATTR_KEYCREATE) { in selinux_lsm_setattr() 6679 } else if (attr == LSM_ATTR_SOCKCREATE) { in selinux_lsm_setattr() 6681 } else if (attr == LSM_ATTR_CURRENT) { in selinux_lsm_setattr() 6767 if (attr) { in selinux_getprocattr() 6768 rc = selinux_lsm_getattr(attr, p, value); in selinux_getprocattr() 6778 int attr = lsm_name_to_attr(name); in selinux_setprocattr() local [all …]
|
| A D | netlabel.c | 112 (secattr->attr.secid == sid)) in selinux_netlbl_sock_getattr()
|