/security/selinux/ss/ |
D | ebitmap.h | 41 struct ebitmap_node **n) in ebitmap_start_positive() argument 45 for (*n = e->node; *n; *n = (*n)->next) { in ebitmap_start_positive() 46 ofs = find_first_bit((*n)->maps, EBITMAP_SIZE); in ebitmap_start_positive() 48 return (*n)->startbit + ofs; in ebitmap_start_positive() 59 struct ebitmap_node **n, in ebitmap_next_positive() argument 64 ofs = find_next_bit((*n)->maps, EBITMAP_SIZE, bit - (*n)->startbit + 1); in ebitmap_next_positive() 66 return ofs + (*n)->startbit; in ebitmap_next_positive() 68 for (*n = (*n)->next; *n; *n = (*n)->next) { in ebitmap_next_positive() 69 ofs = find_first_bit((*n)->maps, EBITMAP_SIZE); in ebitmap_next_positive() 71 return ofs + (*n)->startbit; in ebitmap_next_positive() [all …]
|
D | ebitmap.c | 51 struct ebitmap_node *n, *new, *prev; in ebitmap_cpy() local 54 n = src->node; in ebitmap_cpy() 56 while (n) { in ebitmap_cpy() 62 new->startbit = n->startbit; in ebitmap_cpy() 63 memcpy(new->maps, n->maps, EBITMAP_SIZE / 8); in ebitmap_cpy() 70 n = n->next; in ebitmap_cpy() 248 struct ebitmap_node *n; in ebitmap_get_bit() local 253 n = e->node; in ebitmap_get_bit() 254 while (n && (n->startbit <= bit)) { in ebitmap_get_bit() 255 if ((n->startbit + EBITMAP_SIZE) > bit) in ebitmap_get_bit() [all …]
|
D | sidtab.c | 150 static void sidtab_update_cache(struct sidtab *s, struct sidtab_node *n, int loc) in sidtab_update_cache() argument 158 s->cache[0] = n; in sidtab_update_cache()
|
D | services.c | 222 unsigned i, n = current_mapping[tclass].num_perms; in map_decision() local 225 for (i = 0, result = 0; i < n; i++) { in map_decision() 233 for (i = 0, result = 0; i < n; i++) in map_decision() 238 for (i = 0, result = 0; i < n; i++) { in map_decision() 757 char *o = NULL, *n = NULL, *t = NULL; in security_validtrans_handle_fail() local 762 if (context_struct_to_string(ncontext, &n, &nlen)) in security_validtrans_handle_fail() 769 o, n, t, sym_name(&policydb, SYM_CLASSES, tclass-1)); in security_validtrans_handle_fail() 772 kfree(n); in security_validtrans_handle_fail() 1513 char *s = NULL, *t = NULL, *n = NULL; in compute_sid_handle_invalid_context() local 1520 if (context_struct_to_string(newcontext, &n, &nlen)) in compute_sid_handle_invalid_context() [all …]
|
/security/keys/ |
D | proc.c | 91 static struct rb_node *key_serial_next(struct rb_node *n) in key_serial_next() argument 95 n = rb_next(n); in key_serial_next() 96 while (n) { in key_serial_next() 97 struct key *key = rb_entry(n, struct key, serial_node); in key_serial_next() 100 n = rb_next(n); in key_serial_next() 102 return n; in key_serial_next() 113 struct rb_node *n = key_serial_tree.rb_node; in find_ge_key() local 116 while (n) { in find_ge_key() 117 struct key *key = rb_entry(n, struct key, serial_node); in find_ge_key() 121 n = n->rb_left; in find_ge_key() [all …]
|
D | key.c | 611 struct rb_node *n; in key_lookup() local 617 n = key_serial_tree.rb_node; in key_lookup() 618 while (n) { in key_lookup() 619 key = rb_entry(n, struct key, serial_node); in key_lookup() 622 n = n->rb_left; in key_lookup() 624 n = n->rb_right; in key_lookup()
|
/security/integrity/ |
D | iint.c | 36 struct rb_node *n = integrity_iint_tree.rb_node; in __integrity_iint_find() local 40 while (n) { in __integrity_iint_find() 41 iint = rb_entry(n, struct integrity_iint_cache, rb_node); in __integrity_iint_find() 44 n = n->rb_left; in __integrity_iint_find() 46 n = n->rb_right; in __integrity_iint_find() 50 if (!n) in __integrity_iint_find()
|
D | Kconfig | 9 default n
|
/security/integrity/evm/ |
D | Kconfig | 3 depends on SECURITY && KEYS && (TRUSTED_KEYS=y || TRUSTED_KEYS=n) 8 default n
|
/security/selinux/ |
D | Kconfig | 5 default n 14 default n 43 default n 100 default n
|
D | selinuxfs.c | 1403 loff_t n = *pos - 1; in sel_avc_stats_seq_start() local 1408 return sel_avc_get_stat_idx(&n); in sel_avc_stats_seq_start()
|
/security/smack/ |
D | Kconfig | 4 default n
|
D | smack_lsm.c | 1406 struct list_head *n; in smack_cred_free() local 1412 list_for_each_safe(l, n, &tsp->smk_rules) { in smack_cred_free()
|
/security/yama/ |
D | Kconfig | 6 default n
|
/security/tomoyo/ |
D | Kconfig | 8 default n 41 default n
|
/security/apparmor/ |
D | Kconfig | 8 default n
|
/security/ |
D | Kconfig | 77 default n
|