Home
last modified time | relevance | path

Searched refs:attr (Results 1 – 11 of 11) sorted by relevance

/security/selinux/ss/
Dmls.c569 secattr->attr.mls.lvl = context->range.level[0].sens - 1; in mls_export_netlbl_lvl()
590 context->range.level[0].sens = secattr->attr.mls.lvl + 1; in mls_import_netlbl_lvl()
614 &secattr->attr.mls.cat); in mls_export_netlbl_cat()
615 if (rc == 0 && secattr->attr.mls.cat != NULL) in mls_export_netlbl_cat()
643 secattr->attr.mls.cat); in mls_import_netlbl_cat()
Dconstraint.h42 u32 attr; /* attribute */ member
Dservices.c295 switch (e->attr) { in constraint_expr_eval()
395 if (e->attr & CEXPR_TARGET) in constraint_expr_eval()
397 else if (e->attr & CEXPR_XTARGET) { in constraint_expr_eval()
404 if (e->attr & CEXPR_USER) in constraint_expr_eval()
406 else if (e->attr & CEXPR_ROLE) in constraint_expr_eval()
408 else if (e->attr & CEXPR_TYPE) in constraint_expr_eval()
3653 *sid = secattr->attr.secid; in security_netlbl_secattr_to_sid()
3726 secattr->attr.secid = sid; in security_netlbl_sid_to_secattr()
Dpolicydb.c1231 e->attr = le32_to_cpu(buf[1]); in read_cons_helper()
1251 if (!allowxtarget && (e->attr & CEXPR_XTARGET)) in read_cons_helper()
2835 buf[1] = cpu_to_le32(e->attr); in write_cons_helper()
/security/smack/
Dsmack_access.c495 sap->attr.mls.lvl = level; in smk_netlbl_mls()
496 sap->attr.mls.cat = NULL; in smk_netlbl_mls()
502 rc = netlbl_catmap_setbit(&sap->attr.mls.cat, in smk_netlbl_mls()
505 netlbl_catmap_free(sap->attr.mls.cat); in smk_netlbl_mls()
Dsmackfs.c772 struct netlbl_lsm_catmap *cmp = skp->smk_netlabel.attr.mls.cat; in cipso_seq_show()
787 seq_printf(s, "%s %3d", skp->smk_known, skp->smk_netlabel.attr.mls.lvl); in cipso_seq_show()
907 netlbl_catmap_free(skp->smk_netlabel.attr.mls.cat); in smk_set_cipso()
908 skp->smk_netlabel.attr.mls.cat = ncats.attr.mls.cat; in smk_set_cipso()
909 skp->smk_netlabel.attr.mls.lvl = ncats.attr.mls.lvl; in smk_set_cipso()
956 struct netlbl_lsm_catmap *cmp = skp->smk_netlabel.attr.mls.cat; in cipso2_seq_show()
960 seq_printf(s, "%s %3d", skp->smk_known, skp->smk_netlabel.attr.mls.lvl); in cipso2_seq_show()
1668 if (skp->smk_netlabel.attr.mls.lvl == in smk_write_direct()
1670 skp->smk_netlabel.attr.mls.lvl = i; in smk_write_direct()
1746 if (skp->smk_netlabel.attr.mls.lvl == in smk_write_mapped()
[all …]
Dsmack_lsm.c3742 if (sap->attr.mls.lvl != skp->smk_netlabel.attr.mls.lvl) in smack_from_secattr()
3754 acat = netlbl_catmap_walk(sap->attr.mls.cat, in smack_from_secattr()
3757 skp->smk_netlabel.attr.mls.cat, in smack_from_secattr()
3780 return smack_from_secid(sap->attr.secid); in smack_from_secattr()
/security/integrity/evm/
Devm_main.c474 int evm_inode_setattr(struct dentry *dentry, struct iattr *attr) in evm_inode_setattr() argument
476 unsigned int ia_valid = attr->ia_valid; in evm_inode_setattr()
/security/
Dsecurity.c1206 int security_inode_setattr(struct dentry *dentry, struct iattr *attr) in security_inode_setattr() argument
1212 ret = call_int_hook(inode_setattr, 0, dentry, attr); in security_inode_setattr()
1215 return evm_inode_setattr(dentry, attr); in security_inode_setattr()
2373 int security_bpf(int cmd, union bpf_attr *attr, unsigned int size) in security_bpf() argument
2375 return call_int_hook(bpf, 0, cmd, attr, size); in security_bpf()
2410 int security_perf_event_open(struct perf_event_attr *attr, int type) in security_perf_event_open() argument
2412 return call_int_hook(perf_event_open, 0, attr, type); in security_perf_event_open()
/security/selinux/
Dnetlabel.c110 (secattr->attr.secid == sid)) in selinux_netlbl_sock_getattr()
Dhooks.c6656 static int selinux_bpf(int cmd, union bpf_attr *attr, in selinux_bpf() argument
6803 static int selinux_perf_event_open(struct perf_event_attr *attr, int type) in selinux_perf_event_open() argument