/security/selinux/ |
D | netnode.c | 107 struct sel_netnode *node; in sel_netnode_find() local 121 list_for_each_entry_rcu(node, &sel_netnode_hash[idx].list, list) in sel_netnode_find() 122 if (node->nsec.family == family) in sel_netnode_find() 125 if (node->nsec.addr.ipv4 == *(__be32 *)addr) in sel_netnode_find() 126 return node; in sel_netnode_find() 129 if (ipv6_addr_equal(&node->nsec.addr.ipv6, in sel_netnode_find() 131 return node; in sel_netnode_find() 146 static void sel_netnode_insert(struct sel_netnode *node) in sel_netnode_insert() argument 150 switch (node->nsec.family) { in sel_netnode_insert() 152 idx = sel_netnode_hashfn_ipv4(node->nsec.addr.ipv4); in sel_netnode_insert() [all …]
|
D | avc.c | 153 struct avc_node *node; in avc_get_hash_stats() local 165 hlist_for_each_entry_rcu(node, head, list) in avc_get_hash_stats() 326 static int avc_add_xperms_decision(struct avc_node *node, in avc_add_xperms_decision() argument 331 node->ae.xp_node->xp.len++; in avc_add_xperms_decision() 336 list_add(&dest_xpd->xpd_list, &node->ae.xp_node->xpd_head); in avc_add_xperms_decision() 351 static int avc_xperms_populate(struct avc_node *node, in avc_xperms_populate() argument 375 node->ae.xp_node = dest; in avc_xperms_populate() 432 struct avc_node *node = container_of(rhead, struct avc_node, rhead); in avc_node_free() local 433 avc_xperms_free(node->ae.xp_node); in avc_node_free() 434 kmem_cache_free(avc_node_cachep, node); in avc_node_free() [all …]
|
D | Kconfig | 32 This option enables writing to a selinuxfs node 'disable', which
|
/security/selinux/ss/ |
D | conditional.c | 88 int evaluate_cond_node(struct policydb *p, struct cond_node *node) in evaluate_cond_node() argument 93 new_state = cond_evaluate_expr(p, node->expr); in evaluate_cond_node() 94 if (new_state != node->cur_state) { in evaluate_cond_node() 95 node->cur_state = new_state; in evaluate_cond_node() 99 for (cur = node->true_list; cur; cur = cur->next) { in evaluate_cond_node() 101 cur->node->key.specified &= ~AVTAB_ENABLED; in evaluate_cond_node() 103 cur->node->key.specified |= AVTAB_ENABLED; in evaluate_cond_node() 106 for (cur = node->false_list; cur; cur = cur->next) { in evaluate_cond_node() 109 cur->node->key.specified &= ~AVTAB_ENABLED; in evaluate_cond_node() 111 cur->node->key.specified |= AVTAB_ENABLED; in evaluate_cond_node() [all …]
|
D | ebitmap.c | 37 n1 = e1->node; in ebitmap_cmp() 38 n2 = e2->node; in ebitmap_cmp() 57 n = src->node; in ebitmap_cpy() 71 dst->node = new; in ebitmap_cpy() 94 struct ebitmap_node *e_iter = ebmap->node; in ebitmap_netlbl_export() 173 ebmap->node = e_iter; in ebitmap_netlbl_import() 209 n1 = e1->node; in ebitmap_contains() 210 n2 = e2->node; in ebitmap_contains() 249 n = e->node; in ebitmap_get_bit() 264 n = e->node; in ebitmap_set_bit() [all …]
|
D | ebitmap.h | 41 struct ebitmap_node *node; /* first node in the bitmap */ member 52 for (*n = e->node; *n; *n = (*n)->next) { in ebitmap_start_positive() 83 #define EBITMAP_NODE_INDEX(node, bit) \ argument 84 (((bit) - (node)->startbit) / EBITMAP_UNIT_SIZE) 85 #define EBITMAP_NODE_OFFSET(node, bit) \ argument 86 (((bit) - (node)->startbit) % EBITMAP_UNIT_SIZE)
|
D | services.c | 590 struct avtab_node *node) in services_compute_xperms_drivers() argument 594 if (node->datum.u.xperms->specified == AVTAB_XPERMS_IOCTLDRIVER) { in services_compute_xperms_drivers() 597 xperms->drivers.p[i] |= node->datum.u.xperms->perms.p[i]; in services_compute_xperms_drivers() 598 } else if (node->datum.u.xperms->specified == AVTAB_XPERMS_IOCTLFUNCTION) { in services_compute_xperms_drivers() 601 node->datum.u.xperms->driver); in services_compute_xperms_drivers() 605 if (node->key.specified & AVTAB_XPERMS_ALLOWED) in services_compute_xperms_drivers() 623 struct avtab_node *node; in context_struct_compute_av() local 657 for (node = avtab_search_node(&policydb->te_avtab, in context_struct_compute_av() 659 node; in context_struct_compute_av() 660 node = avtab_search_node_next(node, avkey.specified)) { in context_struct_compute_av() [all …]
|
D | sidtab.c | 447 struct sidtab_node_inner *node = entry.ptr_inner; in sidtab_destroy_tree() local 449 if (!node) in sidtab_destroy_tree() 453 sidtab_destroy_tree(node->entries[i], level - 1); in sidtab_destroy_tree() 454 kfree(node); in sidtab_destroy_tree() 456 struct sidtab_node_leaf *node = entry.ptr_leaf; in sidtab_destroy_tree() local 458 if (!node) in sidtab_destroy_tree() 462 context_destroy(&node->entries[i].context); in sidtab_destroy_tree() 463 kfree(node); in sidtab_destroy_tree()
|
D | avtab.c | 249 avtab_search_node_next(struct avtab_node *node, int specified) in avtab_search_node_next() argument 253 if (!node) in avtab_search_node_next() 257 for (cur = node->next; cur; cur = cur->next) { in avtab_search_node_next() 258 if (node->key.source_type == cur->key.source_type && in avtab_search_node_next() 259 node->key.target_type == cur->key.target_type && in avtab_search_node_next() 260 node->key.target_class == cur->key.target_class && in avtab_search_node_next() 264 if (node->key.source_type < cur->key.source_type) in avtab_search_node_next() 266 if (node->key.source_type == cur->key.source_type && in avtab_search_node_next() 267 node->key.target_type < cur->key.target_type) in avtab_search_node_next() 269 if (node->key.source_type == cur->key.source_type && in avtab_search_node_next() [all …]
|
D | services.h | 37 struct avtab_node *node); 40 struct avtab_node *node);
|
D | conditional.h | 42 struct avtab_node *node; member 78 int evaluate_cond_node(struct policydb *p, struct cond_node *node);
|
D | mls.c | 41 struct ebitmap_node *node; in mls_compute_context_len() local 55 ebitmap_for_each_positive_bit(e, node, i) { in mls_compute_context_len() 96 struct ebitmap_node *node; in mls_sid_to_context() local 115 ebitmap_for_each_positive_bit(e, node, i) { in mls_sid_to_context() 454 struct ebitmap_node *node; in mls_convert_context() local 470 node, i) { in mls_convert_context()
|
D | avtab.h | 111 struct avtab_node *avtab_search_node_next(struct avtab_node *node, int specified);
|
D | policydb.c | 1653 struct ebitmap_node *node; in user_bounds_sanity_check() local 1664 ebitmap_for_each_positive_bit(&user->roles, node, bit) { in user_bounds_sanity_check() 1689 struct ebitmap_node *node; in role_bounds_sanity_check() local 1700 ebitmap_for_each_positive_bit(&role->types, node, bit) { in role_bounds_sanity_check() 2145 c->u.node.addr = nodebuf[0]; /* network order */ in ocontext_read() 2146 c->u.node.mask = nodebuf[1]; /* network order */ in ocontext_read() 2815 static int write_cons_helper(struct policydb *p, struct constraint_node *node, in write_cons_helper() argument 2824 for (c = node; c; c = c->next) { in write_cons_helper() 3141 nodebuf[0] = c->u.node.addr; /* network order */ in ocontext_write() 3142 nodebuf[1] = c->u.node.mask; /* network order */ in ocontext_write()
|
D | policydb.h | 181 } node; /* node information */ member
|
/security/yama/ |
D | yama_lsm.c | 34 struct list_head node; member 121 list_for_each_entry_rcu(relation, &ptracer_relations, node) { in yama_relation_cleanup() 123 list_del_rcu(&relation->node); in yama_relation_cleanup() 156 list_for_each_entry_rcu(relation, &ptracer_relations, node) { in yama_ptracer_add() 160 list_replace_rcu(&relation->node, &added->node); in yama_ptracer_add() 166 list_add_rcu(&added->node, &ptracer_relations); in yama_ptracer_add() 186 list_for_each_entry_rcu(relation, &ptracer_relations, node) { in yama_ptracer_del() 328 list_for_each_entry_rcu(relation, &ptracer_relations, node) { in ptracer_exception_found()
|
/security/apparmor/ |
D | label.c | 412 RB_CLEAR_NODE(&label->node); in aa_label_init() 578 rb_erase(&label->node, &ls->root); in __label_remove() 613 rb_replace_node(&old->node, &new->node, &ls->root); in __label_replace() 649 struct aa_label *this = rb_entry(*new, struct aa_label, node); in __label_insert() 673 rb_link_node(&label->node, parent, new); in __label_insert() 674 rb_insert_color(&label->node, &ls->root); in __label_insert() 694 struct rb_node *node; in __vec_find() local 700 node = vec_labelset(vec, n)->root.rb_node; in __vec_find() 701 while (node) { in __vec_find() 702 struct aa_label *this = rb_entry(node, struct aa_label, node); in __vec_find() [all …]
|
/security/integrity/ |
D | iint.c | 98 struct rb_node *node, *parent = NULL; in integrity_inode_get() local 123 node = &iint->rb_node; in integrity_inode_get() 125 rb_link_node(node, parent, p); in integrity_inode_get() 126 rb_insert_color(node, &integrity_iint_tree); in integrity_inode_get()
|
/security/keys/ |
D | keyring.c | 672 struct assoc_array_node *node; in search_nested_keyrings() member 677 struct assoc_array_node *node; in search_nested_keyrings() local 750 node = assoc_array_ptr_to_node(ptr); in search_nested_keyrings() 754 node = assoc_array_ptr_to_node(ptr); in search_nested_keyrings() 755 ptr = node->slots[0]; in search_nested_keyrings() 769 node = assoc_array_ptr_to_node(ptr); in search_nested_keyrings() 777 ptr = READ_ONCE(node->slots[slot]); in search_nested_keyrings() 779 if (assoc_array_ptr_is_meta(ptr) && node->back_pointer) in search_nested_keyrings() 803 stack[sp].node = node; in search_nested_keyrings() 815 ptr = READ_ONCE(node->back_pointer); in search_nested_keyrings() [all …]
|
D | key.c | 63 user = rb_entry(parent, struct key_user, node); in key_user_lookup() 101 rb_link_node(&candidate->node, parent, p); in key_user_lookup() 102 rb_insert_color(&candidate->node, &key_user_tree); in key_user_lookup() 122 rb_erase(&user->node, &key_user_tree); in key_user_put() 1190 rb_link_node(&root_key_user.node, in key_init() 1194 rb_insert_color(&root_key_user.node, in key_init()
|
D | proc.c | 253 struct key_user *user = rb_entry(n, struct key_user, node); in __key_user_next() 304 struct key_user *user = rb_entry(_p, struct key_user, node); in proc_key_users_show()
|
D | internal.h | 52 struct rb_node node; member
|
/security/apparmor/include/ |
D | label.h | 127 struct rb_node node; member
|