Home
last modified time | relevance | path

Searched refs:s (Results 1 – 22 of 22) sorted by relevance

/security/selinux/ss/
Dsidtab.c18 int sidtab_init(struct sidtab *s) in sidtab_init() argument
22 s->htable = kmalloc_array(SIDTAB_SIZE, sizeof(*s->htable), GFP_ATOMIC); in sidtab_init()
23 if (!s->htable) in sidtab_init()
26 s->htable[i] = NULL; in sidtab_init()
27 s->nel = 0; in sidtab_init()
28 s->next_sid = 1; in sidtab_init()
29 s->shutdown = 0; in sidtab_init()
30 spin_lock_init(&s->lock); in sidtab_init()
34 int sidtab_insert(struct sidtab *s, u32 sid, struct context *context) in sidtab_insert() argument
39 if (!s) in sidtab_insert()
[all …]
Dsidtab.h35 int sidtab_init(struct sidtab *s);
36 int sidtab_insert(struct sidtab *s, u32 sid, struct context *context);
37 struct context *sidtab_search(struct sidtab *s, u32 sid);
38 struct context *sidtab_search_force(struct sidtab *s, u32 sid);
40 int sidtab_map(struct sidtab *s,
46 int sidtab_context_to_sid(struct sidtab *s,
51 void sidtab_destroy(struct sidtab *s);
53 void sidtab_shutdown(struct sidtab *s);
Dsymtab.c36 int symtab_init(struct symtab *s, unsigned int size) in symtab_init() argument
38 s->table = hashtab_create(symhash, symcmp, size); in symtab_init()
39 if (!s->table) in symtab_init()
41 s->nprim = 0; in symtab_init()
Dconditional.c30 int s[COND_EXPR_MAXDEPTH]; in cond_evaluate_expr() local
39 s[sp] = p->bool_val_to_struct[cur->bool - 1]->state; in cond_evaluate_expr()
44 s[sp] = !s[sp]; in cond_evaluate_expr()
50 s[sp] |= s[sp + 1]; in cond_evaluate_expr()
56 s[sp] &= s[sp + 1]; in cond_evaluate_expr()
62 s[sp] ^= s[sp + 1]; in cond_evaluate_expr()
68 s[sp] = (s[sp] == s[sp + 1]); in cond_evaluate_expr()
74 s[sp] = (s[sp] != s[sp + 1]); in cond_evaluate_expr()
80 return s[0]; in cond_evaluate_expr()
Dservices.c296 int s[CEXPR_MAXDEPTH]; in constraint_expr_eval() local
303 s[sp] = !s[sp]; in constraint_expr_eval()
308 s[sp] &= s[sp + 1]; in constraint_expr_eval()
313 s[sp] |= s[sp + 1]; in constraint_expr_eval()
334 s[++sp] = ebitmap_get_bit(&r1->dominates, in constraint_expr_eval()
338 s[++sp] = ebitmap_get_bit(&r2->dominates, in constraint_expr_eval()
342 s[++sp] = (!ebitmap_get_bit(&r1->dominates, in constraint_expr_eval()
378 s[++sp] = mls_level_eq(l1, l2); in constraint_expr_eval()
381 s[++sp] = !mls_level_eq(l1, l2); in constraint_expr_eval()
384 s[++sp] = mls_level_dom(l1, l2); in constraint_expr_eval()
[all …]
Dsymtab.h20 int symtab_init(struct symtab *s, unsigned int size);
Debitmap.c270 unsigned int s; in ebitmap_set_bit() local
274 s = find_first_bit(n->maps, EBITMAP_SIZE); in ebitmap_set_bit()
275 if (s < EBITMAP_SIZE) in ebitmap_set_bit()
Dmls.h38 struct sidtab *s,
Dmls.c239 struct sidtab *s, in mls_context_to_sid() argument
265 defcon = sidtab_search(s, def_sid); in mls_context_to_sid()
Dpolicydb.h317 extern int policydb_load_isids(struct policydb *p, struct sidtab *s);
Dpolicydb.c516 static void symtab_hash_eval(struct symtab *s) in symtab_hash_eval() argument
521 hash_eval(s[i].table, symtab_name[i]); in symtab_hash_eval()
898 int policydb_load_isids(struct policydb *p, struct sidtab *s) in policydb_load_isids() argument
903 rc = sidtab_init(s); in policydb_load_isids()
918 rc = sidtab_insert(s, c->sid[0], &c->context[0]); in policydb_load_isids()
/security/smack/
Dsmackfs.c561 static void *smk_seq_start(struct seq_file *s, loff_t *pos, in smk_seq_start() argument
578 static void *smk_seq_next(struct seq_file *s, void *v, loff_t *pos, in smk_seq_next() argument
589 static void smk_seq_stop(struct seq_file *s, void *v) in smk_seq_stop() argument
594 static void smk_rule_show(struct seq_file *s, struct smack_rule *srp, int max) in smk_rule_show() argument
609 seq_printf(s, "%s %s", in smk_rule_show()
613 seq_putc(s, ' '); in smk_rule_show()
616 seq_putc(s, 'r'); in smk_rule_show()
618 seq_putc(s, 'w'); in smk_rule_show()
620 seq_putc(s, 'x'); in smk_rule_show()
622 seq_putc(s, 'a'); in smk_rule_show()
[all …]
Dsmack_lsm.c78 static void smk_bu_mode(int mode, char *s) in smk_bu_mode() argument
83 s[i++] = 'r'; in smk_bu_mode()
85 s[i++] = 'w'; in smk_bu_mode()
87 s[i++] = 'x'; in smk_bu_mode()
89 s[i++] = 'a'; in smk_bu_mode()
91 s[i++] = 't'; in smk_bu_mode()
93 s[i++] = 'l'; in smk_bu_mode()
95 s[i++] = '-'; in smk_bu_mode()
96 s[i] = '\0'; in smk_bu_mode()
4109 u32 s = 0; /* 0 is the invalid secid */ in smack_socket_getpeersec_dgram() local
[all …]
/security/keys/
Dtrusted.h63 static inline void dump_sess(struct osapsess *s) in dump_sess() argument
66 16, 1, &s->handle, 4, 0); in dump_sess()
69 16, 1, &s->secret, SHA1_DIGEST_SIZE, 0); in dump_sess()
72 16, 1, &s->enonce, SHA1_DIGEST_SIZE, 0); in dump_sess()
92 static inline void dump_sess(struct osapsess *s) in dump_sess() argument
Dtrusted.c394 static int osap(struct tpm_buf *tb, struct osapsess *s, in osap() argument
417 s->handle = LOAD32(tb->data, TPM_DATA_OFFSET); in osap()
418 memcpy(s->enonce, &(tb->data[TPM_DATA_OFFSET + sizeof(uint32_t)]), in osap()
422 return TSS_rawhmac(s->secret, key, SHA1_DIGEST_SIZE, TPM_NONCE_SIZE, in osap()
/security/tomoyo/
Dmemory.c50 const size_t s = ksize(ptr); in tomoyo_memory_ok() local
51 tomoyo_memory_used[TOMOYO_MEMORY_POLICY] += s; in tomoyo_memory_ok()
56 tomoyo_memory_used[TOMOYO_MEMORY_POLICY] -= s; in tomoyo_memory_ok()
/security/integrity/
Ddigsig_asymmetric.c111 pks.s = hdr->sig; in asymmetric_verify()
/security/
DKconfig.hardening13 on the function calling complexity of a given workload's
Ddevice_cgroup.c55 static inline struct dev_cgroup *css_to_devcgroup(struct cgroup_subsys_state *s) in css_to_devcgroup() argument
57 return s ? container_of(s, struct dev_cgroup, css) : NULL; in css_to_devcgroup()
DKconfig222 program is wish to be run. The "real" application's name will
/security/integrity/evm/
DKconfig9 EVM protects a file's security extended attributes against
/security/integrity/ima/
DKconfig37 a TPM's quote after a soft boot, the IMA measurement list of the