Home
last modified time | relevance | path

Searched refs:attr (Results 1 – 13 of 13) sorted by relevance

/security/keys/trusted-keys/
Dtrusted_tee.c94 param[0].attr = TEE_IOCTL_PARAM_ATTR_TYPE_MEMREF_INPUT; in trusted_tee_seal()
98 param[1].attr = TEE_IOCTL_PARAM_ATTR_TYPE_MEMREF_OUTPUT; in trusted_tee_seal()
155 param[0].attr = TEE_IOCTL_PARAM_ATTR_TYPE_MEMREF_INPUT; in trusted_tee_unseal()
159 param[1].attr = TEE_IOCTL_PARAM_ATTR_TYPE_MEMREF_OUTPUT; in trusted_tee_unseal()
206 param[0].attr = TEE_IOCTL_PARAM_ATTR_TYPE_MEMREF_OUTPUT; in trusted_tee_get_random()
/security/integrity/evm/
Devm_main.c758 static int evm_attr_change(struct dentry *dentry, struct iattr *attr) in evm_attr_change() argument
761 unsigned int ia_valid = attr->ia_valid; in evm_attr_change()
763 if ((!(ia_valid & ATTR_UID) || uid_eq(attr->ia_uid, inode->i_uid)) && in evm_attr_change()
764 (!(ia_valid & ATTR_GID) || gid_eq(attr->ia_gid, inode->i_gid)) && in evm_attr_change()
765 (!(ia_valid & ATTR_MODE) || attr->ia_mode == inode->i_mode)) in evm_attr_change()
780 int evm_inode_setattr(struct dentry *dentry, struct iattr *attr) in evm_inode_setattr() argument
782 unsigned int ia_valid = attr->ia_valid; in evm_inode_setattr()
806 !evm_attr_change(dentry, attr)) in evm_inode_setattr()
/security/smack/
Dsmack_access.c497 sap->attr.mls.lvl = level; in smk_netlbl_mls()
498 sap->attr.mls.cat = NULL; in smk_netlbl_mls()
504 rc = netlbl_catmap_setbit(&sap->attr.mls.cat, in smk_netlbl_mls()
507 netlbl_catmap_free(sap->attr.mls.cat); in smk_netlbl_mls()
527 skp->smk_netlabel.attr.secid = skp->smk_secid; in smack_populate_secattr()
Dsmackfs.c770 struct netlbl_lsm_catmap *cmp = skp->smk_netlabel.attr.mls.cat; in cipso_seq_show()
785 seq_printf(s, "%s %3d", skp->smk_known, skp->smk_netlabel.attr.mls.lvl); in cipso_seq_show()
922 old_cat = skp->smk_netlabel.attr.mls.cat; in smk_set_cipso()
923 skp->smk_netlabel.attr.mls.cat = ncats.attr.mls.cat; in smk_set_cipso()
924 skp->smk_netlabel.attr.mls.lvl = ncats.attr.mls.lvl; in smk_set_cipso()
977 struct netlbl_lsm_catmap *cmp = skp->smk_netlabel.attr.mls.cat; in cipso2_seq_show()
981 seq_printf(s, "%s %3d", skp->smk_known, skp->smk_netlabel.attr.mls.lvl); in cipso2_seq_show()
1689 if (skp->smk_netlabel.attr.mls.lvl == in smk_write_direct()
1691 skp->smk_netlabel.attr.mls.lvl = i; in smk_write_direct()
1767 if (skp->smk_netlabel.attr.mls.lvl == in smk_write_mapped()
[all …]
Dsmack_lsm.c3756 return smack_from_secid(sap->attr.secid); in smack_from_secattr()
3771 if (sap->attr.mls.lvl != skp->smk_netlabel.attr.mls.lvl) in smack_from_secattr()
3783 acat = netlbl_catmap_walk(sap->attr.mls.cat, in smack_from_secattr()
3786 skp->smk_netlabel.attr.mls.cat, in smack_from_secattr()
/security/landlock/
Dsyscalls.c158 const struct landlock_ruleset_attr __user *const, attr, in SYSCALL_DEFINE3() argument
172 if ((flags == LANDLOCK_CREATE_RULESET_VERSION) && !attr && in SYSCALL_DEFINE3()
182 attr, size); in SYSCALL_DEFINE3()
/security/selinux/ss/
Dmls.c571 secattr->attr.mls.lvl = context->range.level[0].sens - 1; in mls_export_netlbl_lvl()
592 context->range.level[0].sens = secattr->attr.mls.lvl + 1; in mls_import_netlbl_lvl()
616 &secattr->attr.mls.cat); in mls_export_netlbl_cat()
617 if (rc == 0 && secattr->attr.mls.cat != NULL) in mls_export_netlbl_cat()
645 secattr->attr.mls.cat); in mls_import_netlbl_cat()
Dconstraint.h42 u32 attr; /* attribute */ member
Dservices.c305 switch (e->attr) { in constraint_expr_eval()
405 if (e->attr & CEXPR_TARGET) in constraint_expr_eval()
407 else if (e->attr & CEXPR_XTARGET) { in constraint_expr_eval()
414 if (e->attr & CEXPR_USER) in constraint_expr_eval()
416 else if (e->attr & CEXPR_ROLE) in constraint_expr_eval()
418 else if (e->attr & CEXPR_TYPE) in constraint_expr_eval()
3904 *sid = secattr->attr.secid; in security_netlbl_secattr_to_sid()
3982 secattr->attr.secid = sid; in security_netlbl_sid_to_secattr()
Dpolicydb.c1242 e->attr = le32_to_cpu(buf[1]); in read_cons_helper()
1262 if (!allowxtarget && (e->attr & CEXPR_XTARGET)) in read_cons_helper()
3021 buf[1] = cpu_to_le32(e->attr); in write_cons_helper()
/security/
Dsecurity.c1332 int security_inode_setattr(struct dentry *dentry, struct iattr *attr) in security_inode_setattr() argument
1338 ret = call_int_hook(inode_setattr, 0, dentry, attr); in security_inode_setattr()
1341 return evm_inode_setattr(dentry, attr); in security_inode_setattr()
2613 int security_bpf(int cmd, union bpf_attr *attr, unsigned int size) in security_bpf() argument
2615 return call_int_hook(bpf, 0, cmd, attr, size); in security_bpf()
2650 int security_perf_event_open(struct perf_event_attr *attr, int type) in security_perf_event_open() argument
2652 return call_int_hook(perf_event_open, 0, attr, type); in security_perf_event_open()
/security/selinux/
Dnetlabel.c110 (secattr->attr.secid == sid)) in selinux_netlbl_sock_getattr()
Dhooks.c6919 static int selinux_bpf(int cmd, union bpf_attr *attr, in selinux_bpf() argument
7095 static int selinux_perf_event_open(struct perf_event_attr *attr, int type) in selinux_perf_event_open() argument