/security/keys/trusted-keys/ |
D | trusted_tee.c | 94 param[0].attr = TEE_IOCTL_PARAM_ATTR_TYPE_MEMREF_INPUT; in trusted_tee_seal() 98 param[1].attr = TEE_IOCTL_PARAM_ATTR_TYPE_MEMREF_OUTPUT; in trusted_tee_seal() 155 param[0].attr = TEE_IOCTL_PARAM_ATTR_TYPE_MEMREF_INPUT; in trusted_tee_unseal() 159 param[1].attr = TEE_IOCTL_PARAM_ATTR_TYPE_MEMREF_OUTPUT; in trusted_tee_unseal() 206 param[0].attr = TEE_IOCTL_PARAM_ATTR_TYPE_MEMREF_OUTPUT; in trusted_tee_get_random()
|
/security/integrity/evm/ |
D | evm_main.c | 758 static int evm_attr_change(struct dentry *dentry, struct iattr *attr) in evm_attr_change() argument 761 unsigned int ia_valid = attr->ia_valid; in evm_attr_change() 763 if ((!(ia_valid & ATTR_UID) || uid_eq(attr->ia_uid, inode->i_uid)) && in evm_attr_change() 764 (!(ia_valid & ATTR_GID) || gid_eq(attr->ia_gid, inode->i_gid)) && in evm_attr_change() 765 (!(ia_valid & ATTR_MODE) || attr->ia_mode == inode->i_mode)) in evm_attr_change() 780 int evm_inode_setattr(struct dentry *dentry, struct iattr *attr) in evm_inode_setattr() argument 782 unsigned int ia_valid = attr->ia_valid; in evm_inode_setattr() 806 !evm_attr_change(dentry, attr)) in evm_inode_setattr()
|
/security/smack/ |
D | smack_access.c | 497 sap->attr.mls.lvl = level; in smk_netlbl_mls() 498 sap->attr.mls.cat = NULL; in smk_netlbl_mls() 504 rc = netlbl_catmap_setbit(&sap->attr.mls.cat, in smk_netlbl_mls() 507 netlbl_catmap_free(sap->attr.mls.cat); in smk_netlbl_mls() 527 skp->smk_netlabel.attr.secid = skp->smk_secid; in smack_populate_secattr()
|
D | smackfs.c | 770 struct netlbl_lsm_catmap *cmp = skp->smk_netlabel.attr.mls.cat; in cipso_seq_show() 785 seq_printf(s, "%s %3d", skp->smk_known, skp->smk_netlabel.attr.mls.lvl); in cipso_seq_show() 922 old_cat = skp->smk_netlabel.attr.mls.cat; in smk_set_cipso() 923 skp->smk_netlabel.attr.mls.cat = ncats.attr.mls.cat; in smk_set_cipso() 924 skp->smk_netlabel.attr.mls.lvl = ncats.attr.mls.lvl; in smk_set_cipso() 977 struct netlbl_lsm_catmap *cmp = skp->smk_netlabel.attr.mls.cat; in cipso2_seq_show() 981 seq_printf(s, "%s %3d", skp->smk_known, skp->smk_netlabel.attr.mls.lvl); in cipso2_seq_show() 1689 if (skp->smk_netlabel.attr.mls.lvl == in smk_write_direct() 1691 skp->smk_netlabel.attr.mls.lvl = i; in smk_write_direct() 1767 if (skp->smk_netlabel.attr.mls.lvl == in smk_write_mapped() [all …]
|
D | smack_lsm.c | 3756 return smack_from_secid(sap->attr.secid); in smack_from_secattr() 3771 if (sap->attr.mls.lvl != skp->smk_netlabel.attr.mls.lvl) in smack_from_secattr() 3783 acat = netlbl_catmap_walk(sap->attr.mls.cat, in smack_from_secattr() 3786 skp->smk_netlabel.attr.mls.cat, in smack_from_secattr()
|
/security/landlock/ |
D | syscalls.c | 158 const struct landlock_ruleset_attr __user *const, attr, in SYSCALL_DEFINE3() argument 172 if ((flags == LANDLOCK_CREATE_RULESET_VERSION) && !attr && in SYSCALL_DEFINE3() 182 attr, size); in SYSCALL_DEFINE3()
|
/security/selinux/ss/ |
D | mls.c | 571 secattr->attr.mls.lvl = context->range.level[0].sens - 1; in mls_export_netlbl_lvl() 592 context->range.level[0].sens = secattr->attr.mls.lvl + 1; in mls_import_netlbl_lvl() 616 &secattr->attr.mls.cat); in mls_export_netlbl_cat() 617 if (rc == 0 && secattr->attr.mls.cat != NULL) in mls_export_netlbl_cat() 645 secattr->attr.mls.cat); in mls_import_netlbl_cat()
|
D | constraint.h | 42 u32 attr; /* attribute */ member
|
D | services.c | 305 switch (e->attr) { in constraint_expr_eval() 405 if (e->attr & CEXPR_TARGET) in constraint_expr_eval() 407 else if (e->attr & CEXPR_XTARGET) { in constraint_expr_eval() 414 if (e->attr & CEXPR_USER) in constraint_expr_eval() 416 else if (e->attr & CEXPR_ROLE) in constraint_expr_eval() 418 else if (e->attr & CEXPR_TYPE) in constraint_expr_eval() 3904 *sid = secattr->attr.secid; in security_netlbl_secattr_to_sid() 3982 secattr->attr.secid = sid; in security_netlbl_sid_to_secattr()
|
D | policydb.c | 1242 e->attr = le32_to_cpu(buf[1]); in read_cons_helper() 1262 if (!allowxtarget && (e->attr & CEXPR_XTARGET)) in read_cons_helper() 3021 buf[1] = cpu_to_le32(e->attr); in write_cons_helper()
|
/security/ |
D | security.c | 1332 int security_inode_setattr(struct dentry *dentry, struct iattr *attr) in security_inode_setattr() argument 1338 ret = call_int_hook(inode_setattr, 0, dentry, attr); in security_inode_setattr() 1341 return evm_inode_setattr(dentry, attr); in security_inode_setattr() 2613 int security_bpf(int cmd, union bpf_attr *attr, unsigned int size) in security_bpf() argument 2615 return call_int_hook(bpf, 0, cmd, attr, size); in security_bpf() 2650 int security_perf_event_open(struct perf_event_attr *attr, int type) in security_perf_event_open() argument 2652 return call_int_hook(perf_event_open, 0, attr, type); in security_perf_event_open()
|
/security/selinux/ |
D | netlabel.c | 110 (secattr->attr.secid == sid)) in selinux_netlbl_sock_getattr()
|
D | hooks.c | 6919 static int selinux_bpf(int cmd, union bpf_attr *attr, in selinux_bpf() argument 7095 static int selinux_perf_event_open(struct perf_event_attr *attr, int type) in selinux_perf_event_open() argument
|