/security/selinux/ss/ |
D | mls.c | 38 int i, l, len, head, prev; in mls_compute_context_len() local 47 for (l = 0; l < 2; l++) { in mls_compute_context_len() 48 int index_sens = context->range.level[l].sens; in mls_compute_context_len() 54 e = &context->range.level[l].cat; in mls_compute_context_len() 72 if (l == 0) { in mls_compute_context_len() 93 int i, l, head, prev; in mls_sid_to_context() local 105 for (l = 0; l < 2; l++) { in mls_sid_to_context() 107 context->range.level[l].sens - 1)); in mls_sid_to_context() 113 e = &context->range.level[l].cat; in mls_sid_to_context() 148 if (l == 0) { in mls_sid_to_context() [all …]
|
D | mls.h | 32 int mls_level_isvalid(struct policydb *p, struct mls_level *l);
|
D | policydb.c | 2002 struct ocontext *l, *c; in genfs_read() local 2075 for (l = NULL, c = genfs->head; c; in genfs_read() 2076 l = c, c = c->next) { in genfs_read() 2092 if (l) in genfs_read() 2093 l->next = newc; in genfs_read() 2117 struct ocontext *l, *c; in ocontext_read() local 2126 l = NULL; in ocontext_read() 2132 if (l) in ocontext_read() 2133 l->next = c; in ocontext_read() 2136 l = c; in ocontext_read() [all …]
|
/security/apparmor/include/ |
D | label.h | 158 int aa_label_next_confined(struct aa_label *l, int i); 292 struct aa_label *aa_label_insert(struct aa_labelset *ls, struct aa_label *l); 297 struct aa_label *aa_label_find(struct aa_label *l); 348 static inline struct aa_label *__aa_get_label(struct aa_label *l) in __aa_get_label() argument 350 if (l && kref_get_unless_zero(&l->count)) in __aa_get_label() 351 return l; in __aa_get_label() 356 static inline struct aa_label *aa_get_label(struct aa_label *l) in aa_get_label() argument 358 if (l) in aa_get_label() 359 kref_get(&(l->count)); in aa_get_label() 361 return l; in aa_get_label() [all …]
|
D | context.h | 133 struct aa_label *l = aa_current_raw_label(); in aa_get_current_label() local 135 if (label_is_stale(l)) in aa_get_current_label() 136 return aa_get_newest_label(l); in aa_get_current_label() 137 return aa_get_label(l); in aa_get_current_label()
|
D | policy_unpack.h | 116 bool aa_rawdata_eq(struct aa_loaddata *l, struct aa_loaddata *r);
|
/security/apparmor/ |
D | file.c | 498 struct aa_label *l, *old; in update_file_ctx() local 504 l = aa_label_merge(old, label, GFP_ATOMIC); in update_file_ctx() 505 if (l) { in update_file_ctx() 506 if (l != old) { in update_file_ctx() 507 rcu_assign_pointer(fctx->label, l); in update_file_ctx() 510 aa_put_label(l); in update_file_ctx()
|
D | label.c | 784 struct aa_label *l; in aa_label_replace() local 794 l = __label_insert(ls, new, true); in aa_label_replace() 795 res = (l == new); in aa_label_replace() 797 aa_put_label(l); in aa_label_replace() 905 struct aa_label *l; in aa_label_insert() local 914 l = __label_find(label); in aa_label_insert() 916 if (l) in aa_label_insert() 917 return l; in aa_label_insert() 921 l = __label_insert(ls, label, false); in aa_label_insert() 924 return l; in aa_label_insert() [all …]
|
D | policy.c | 116 struct aa_label *l; in __add_profile() local 126 l = aa_label_insert(&profile->ns->labels, &profile->label); in __add_profile() 127 AA_BUG(l != &profile->label); in __add_profile() 128 aa_put_label(l); in __add_profile()
|
D | policy_unpack.c | 141 bool aa_rawdata_eq(struct aa_loaddata *l, struct aa_loaddata *r) in aa_rawdata_eq() argument 143 if (l->size != r->size) in aa_rawdata_eq() 145 if (aa_g_hash_policy && memcmp(l->hash, r->hash, aa_hash_size()) != 0) in aa_rawdata_eq() 147 return memcmp(l->data, r->data, r->size) == 0; in aa_rawdata_eq()
|
D | apparmorfs.c | 2042 loff_t l = *pos; in p_start() local 2050 for (; profile && l > 0; l--) in p_start()
|
/security/integrity/ima/ |
D | ima_fs.c | 81 loff_t l = *pos; in ima_measurements_start() local 87 if (!l--) { in ima_measurements_start()
|
D | ima_policy.c | 981 loff_t l = *pos; in ima_policy_start() local 986 if (!l--) { in ima_policy_start()
|
/security/smack/ |
D | smack_lsm.c | 1982 struct list_head *l; in smack_cred_free() local 1991 list_for_each_safe(l, n, &tsp->smk_rules) { in smack_cred_free() 1992 rp = list_entry(l, struct smack_rule, list); in smack_cred_free()
|