Searched refs:attr (Results 1 – 11 of 11) sorted by relevance
/security/selinux/ss/ |
D | mls.c | 569 secattr->attr.mls.lvl = context->range.level[0].sens - 1; in mls_export_netlbl_lvl() 590 context->range.level[0].sens = secattr->attr.mls.lvl + 1; in mls_import_netlbl_lvl() 614 &secattr->attr.mls.cat); in mls_export_netlbl_cat() 615 if (rc == 0 && secattr->attr.mls.cat != NULL) in mls_export_netlbl_cat() 643 secattr->attr.mls.cat); in mls_import_netlbl_cat()
|
D | constraint.h | 42 u32 attr; /* attribute */ member
|
D | services.c | 295 switch (e->attr) { in constraint_expr_eval() 395 if (e->attr & CEXPR_TARGET) in constraint_expr_eval() 397 else if (e->attr & CEXPR_XTARGET) { in constraint_expr_eval() 404 if (e->attr & CEXPR_USER) in constraint_expr_eval() 406 else if (e->attr & CEXPR_ROLE) in constraint_expr_eval() 408 else if (e->attr & CEXPR_TYPE) in constraint_expr_eval() 3653 *sid = secattr->attr.secid; in security_netlbl_secattr_to_sid() 3726 secattr->attr.secid = sid; in security_netlbl_sid_to_secattr()
|
D | policydb.c | 1231 e->attr = le32_to_cpu(buf[1]); in read_cons_helper() 1251 if (!allowxtarget && (e->attr & CEXPR_XTARGET)) in read_cons_helper() 2835 buf[1] = cpu_to_le32(e->attr); in write_cons_helper()
|
/security/smack/ |
D | smack_access.c | 495 sap->attr.mls.lvl = level; in smk_netlbl_mls() 496 sap->attr.mls.cat = NULL; in smk_netlbl_mls() 502 rc = netlbl_catmap_setbit(&sap->attr.mls.cat, in smk_netlbl_mls() 505 netlbl_catmap_free(sap->attr.mls.cat); in smk_netlbl_mls()
|
D | smackfs.c | 772 struct netlbl_lsm_catmap *cmp = skp->smk_netlabel.attr.mls.cat; in cipso_seq_show() 787 seq_printf(s, "%s %3d", skp->smk_known, skp->smk_netlabel.attr.mls.lvl); in cipso_seq_show() 907 netlbl_catmap_free(skp->smk_netlabel.attr.mls.cat); in smk_set_cipso() 908 skp->smk_netlabel.attr.mls.cat = ncats.attr.mls.cat; in smk_set_cipso() 909 skp->smk_netlabel.attr.mls.lvl = ncats.attr.mls.lvl; in smk_set_cipso() 956 struct netlbl_lsm_catmap *cmp = skp->smk_netlabel.attr.mls.cat; in cipso2_seq_show() 960 seq_printf(s, "%s %3d", skp->smk_known, skp->smk_netlabel.attr.mls.lvl); in cipso2_seq_show() 1668 if (skp->smk_netlabel.attr.mls.lvl == in smk_write_direct() 1670 skp->smk_netlabel.attr.mls.lvl = i; in smk_write_direct() 1746 if (skp->smk_netlabel.attr.mls.lvl == in smk_write_mapped() [all …]
|
D | smack_lsm.c | 3742 if (sap->attr.mls.lvl != skp->smk_netlabel.attr.mls.lvl) in smack_from_secattr() 3754 acat = netlbl_catmap_walk(sap->attr.mls.cat, in smack_from_secattr() 3757 skp->smk_netlabel.attr.mls.cat, in smack_from_secattr() 3780 return smack_from_secid(sap->attr.secid); in smack_from_secattr()
|
/security/integrity/evm/ |
D | evm_main.c | 474 int evm_inode_setattr(struct dentry *dentry, struct iattr *attr) in evm_inode_setattr() argument 476 unsigned int ia_valid = attr->ia_valid; in evm_inode_setattr()
|
/security/ |
D | security.c | 1206 int security_inode_setattr(struct dentry *dentry, struct iattr *attr) in security_inode_setattr() argument 1212 ret = call_int_hook(inode_setattr, 0, dentry, attr); in security_inode_setattr() 1215 return evm_inode_setattr(dentry, attr); in security_inode_setattr() 2373 int security_bpf(int cmd, union bpf_attr *attr, unsigned int size) in security_bpf() argument 2375 return call_int_hook(bpf, 0, cmd, attr, size); in security_bpf() 2410 int security_perf_event_open(struct perf_event_attr *attr, int type) in security_perf_event_open() argument 2412 return call_int_hook(perf_event_open, 0, attr, type); in security_perf_event_open()
|
/security/selinux/ |
D | netlabel.c | 110 (secattr->attr.secid == sid)) in selinux_netlbl_sock_getattr()
|
D | hooks.c | 6656 static int selinux_bpf(int cmd, union bpf_attr *attr, in selinux_bpf() argument 6803 static int selinux_perf_event_open(struct perf_event_attr *attr, int type) in selinux_perf_event_open() argument
|