Home
last modified time | relevance | path

Searched refs:node (Results 1 – 23 of 23) sorted by relevance

/security/selinux/
Dnetnode.c107 struct sel_netnode *node; in sel_netnode_find() local
121 list_for_each_entry_rcu(node, &sel_netnode_hash[idx].list, list) in sel_netnode_find()
122 if (node->nsec.family == family) in sel_netnode_find()
125 if (node->nsec.addr.ipv4 == *(__be32 *)addr) in sel_netnode_find()
126 return node; in sel_netnode_find()
129 if (ipv6_addr_equal(&node->nsec.addr.ipv6, in sel_netnode_find()
131 return node; in sel_netnode_find()
146 static void sel_netnode_insert(struct sel_netnode *node) in sel_netnode_insert() argument
150 switch (node->nsec.family) { in sel_netnode_insert()
152 idx = sel_netnode_hashfn_ipv4(node->nsec.addr.ipv4); in sel_netnode_insert()
[all …]
Davc.c153 struct avc_node *node; in avc_get_hash_stats() local
165 hlist_for_each_entry_rcu(node, head, list) in avc_get_hash_stats()
326 static int avc_add_xperms_decision(struct avc_node *node, in avc_add_xperms_decision() argument
331 node->ae.xp_node->xp.len++; in avc_add_xperms_decision()
336 list_add(&dest_xpd->xpd_list, &node->ae.xp_node->xpd_head); in avc_add_xperms_decision()
351 static int avc_xperms_populate(struct avc_node *node, in avc_xperms_populate() argument
375 node->ae.xp_node = dest; in avc_xperms_populate()
432 struct avc_node *node = container_of(rhead, struct avc_node, rhead); in avc_node_free() local
433 avc_xperms_free(node->ae.xp_node); in avc_node_free()
434 kmem_cache_free(avc_node_cachep, node); in avc_node_free()
[all …]
DKconfig32 This option enables writing to a selinuxfs node 'disable', which
/security/selinux/ss/
Dconditional.c88 int evaluate_cond_node(struct policydb *p, struct cond_node *node) in evaluate_cond_node() argument
93 new_state = cond_evaluate_expr(p, node->expr); in evaluate_cond_node()
94 if (new_state != node->cur_state) { in evaluate_cond_node()
95 node->cur_state = new_state; in evaluate_cond_node()
99 for (cur = node->true_list; cur; cur = cur->next) { in evaluate_cond_node()
101 cur->node->key.specified &= ~AVTAB_ENABLED; in evaluate_cond_node()
103 cur->node->key.specified |= AVTAB_ENABLED; in evaluate_cond_node()
106 for (cur = node->false_list; cur; cur = cur->next) { in evaluate_cond_node()
109 cur->node->key.specified &= ~AVTAB_ENABLED; in evaluate_cond_node()
111 cur->node->key.specified |= AVTAB_ENABLED; in evaluate_cond_node()
[all …]
Debitmap.c37 n1 = e1->node; in ebitmap_cmp()
38 n2 = e2->node; in ebitmap_cmp()
57 n = src->node; in ebitmap_cpy()
71 dst->node = new; in ebitmap_cpy()
94 struct ebitmap_node *e_iter = ebmap->node; in ebitmap_netlbl_export()
173 ebmap->node = e_iter; in ebitmap_netlbl_import()
209 n1 = e1->node; in ebitmap_contains()
210 n2 = e2->node; in ebitmap_contains()
249 n = e->node; in ebitmap_get_bit()
264 n = e->node; in ebitmap_set_bit()
[all …]
Debitmap.h41 struct ebitmap_node *node; /* first node in the bitmap */ member
52 for (*n = e->node; *n; *n = (*n)->next) { in ebitmap_start_positive()
83 #define EBITMAP_NODE_INDEX(node, bit) \ argument
84 (((bit) - (node)->startbit) / EBITMAP_UNIT_SIZE)
85 #define EBITMAP_NODE_OFFSET(node, bit) \ argument
86 (((bit) - (node)->startbit) % EBITMAP_UNIT_SIZE)
Dservices.c590 struct avtab_node *node) in services_compute_xperms_drivers() argument
594 if (node->datum.u.xperms->specified == AVTAB_XPERMS_IOCTLDRIVER) { in services_compute_xperms_drivers()
597 xperms->drivers.p[i] |= node->datum.u.xperms->perms.p[i]; in services_compute_xperms_drivers()
598 } else if (node->datum.u.xperms->specified == AVTAB_XPERMS_IOCTLFUNCTION) { in services_compute_xperms_drivers()
601 node->datum.u.xperms->driver); in services_compute_xperms_drivers()
605 if (node->key.specified & AVTAB_XPERMS_ALLOWED) in services_compute_xperms_drivers()
623 struct avtab_node *node; in context_struct_compute_av() local
657 for (node = avtab_search_node(&policydb->te_avtab, in context_struct_compute_av()
659 node; in context_struct_compute_av()
660 node = avtab_search_node_next(node, avkey.specified)) { in context_struct_compute_av()
[all …]
Dsidtab.c447 struct sidtab_node_inner *node = entry.ptr_inner; in sidtab_destroy_tree() local
449 if (!node) in sidtab_destroy_tree()
453 sidtab_destroy_tree(node->entries[i], level - 1); in sidtab_destroy_tree()
454 kfree(node); in sidtab_destroy_tree()
456 struct sidtab_node_leaf *node = entry.ptr_leaf; in sidtab_destroy_tree() local
458 if (!node) in sidtab_destroy_tree()
462 context_destroy(&node->entries[i].context); in sidtab_destroy_tree()
463 kfree(node); in sidtab_destroy_tree()
Davtab.c249 avtab_search_node_next(struct avtab_node *node, int specified) in avtab_search_node_next() argument
253 if (!node) in avtab_search_node_next()
257 for (cur = node->next; cur; cur = cur->next) { in avtab_search_node_next()
258 if (node->key.source_type == cur->key.source_type && in avtab_search_node_next()
259 node->key.target_type == cur->key.target_type && in avtab_search_node_next()
260 node->key.target_class == cur->key.target_class && in avtab_search_node_next()
264 if (node->key.source_type < cur->key.source_type) in avtab_search_node_next()
266 if (node->key.source_type == cur->key.source_type && in avtab_search_node_next()
267 node->key.target_type < cur->key.target_type) in avtab_search_node_next()
269 if (node->key.source_type == cur->key.source_type && in avtab_search_node_next()
[all …]
Dservices.h37 struct avtab_node *node);
40 struct avtab_node *node);
Dconditional.h42 struct avtab_node *node; member
78 int evaluate_cond_node(struct policydb *p, struct cond_node *node);
Dmls.c41 struct ebitmap_node *node; in mls_compute_context_len() local
55 ebitmap_for_each_positive_bit(e, node, i) { in mls_compute_context_len()
96 struct ebitmap_node *node; in mls_sid_to_context() local
115 ebitmap_for_each_positive_bit(e, node, i) { in mls_sid_to_context()
454 struct ebitmap_node *node; in mls_convert_context() local
470 node, i) { in mls_convert_context()
Davtab.h111 struct avtab_node *avtab_search_node_next(struct avtab_node *node, int specified);
Dpolicydb.c1653 struct ebitmap_node *node; in user_bounds_sanity_check() local
1664 ebitmap_for_each_positive_bit(&user->roles, node, bit) { in user_bounds_sanity_check()
1689 struct ebitmap_node *node; in role_bounds_sanity_check() local
1700 ebitmap_for_each_positive_bit(&role->types, node, bit) { in role_bounds_sanity_check()
2145 c->u.node.addr = nodebuf[0]; /* network order */ in ocontext_read()
2146 c->u.node.mask = nodebuf[1]; /* network order */ in ocontext_read()
2815 static int write_cons_helper(struct policydb *p, struct constraint_node *node, in write_cons_helper() argument
2824 for (c = node; c; c = c->next) { in write_cons_helper()
3141 nodebuf[0] = c->u.node.addr; /* network order */ in ocontext_write()
3142 nodebuf[1] = c->u.node.mask; /* network order */ in ocontext_write()
Dpolicydb.h181 } node; /* node information */ member
/security/yama/
Dyama_lsm.c34 struct list_head node; member
121 list_for_each_entry_rcu(relation, &ptracer_relations, node) { in yama_relation_cleanup()
123 list_del_rcu(&relation->node); in yama_relation_cleanup()
156 list_for_each_entry_rcu(relation, &ptracer_relations, node) { in yama_ptracer_add()
160 list_replace_rcu(&relation->node, &added->node); in yama_ptracer_add()
166 list_add_rcu(&added->node, &ptracer_relations); in yama_ptracer_add()
186 list_for_each_entry_rcu(relation, &ptracer_relations, node) { in yama_ptracer_del()
328 list_for_each_entry_rcu(relation, &ptracer_relations, node) { in ptracer_exception_found()
/security/apparmor/
Dlabel.c412 RB_CLEAR_NODE(&label->node); in aa_label_init()
578 rb_erase(&label->node, &ls->root); in __label_remove()
613 rb_replace_node(&old->node, &new->node, &ls->root); in __label_replace()
649 struct aa_label *this = rb_entry(*new, struct aa_label, node); in __label_insert()
673 rb_link_node(&label->node, parent, new); in __label_insert()
674 rb_insert_color(&label->node, &ls->root); in __label_insert()
694 struct rb_node *node; in __vec_find() local
700 node = vec_labelset(vec, n)->root.rb_node; in __vec_find()
701 while (node) { in __vec_find()
702 struct aa_label *this = rb_entry(node, struct aa_label, node); in __vec_find()
[all …]
/security/integrity/
Diint.c98 struct rb_node *node, *parent = NULL; in integrity_inode_get() local
123 node = &iint->rb_node; in integrity_inode_get()
125 rb_link_node(node, parent, p); in integrity_inode_get()
126 rb_insert_color(node, &integrity_iint_tree); in integrity_inode_get()
/security/keys/
Dkeyring.c672 struct assoc_array_node *node; in search_nested_keyrings() member
677 struct assoc_array_node *node; in search_nested_keyrings() local
750 node = assoc_array_ptr_to_node(ptr); in search_nested_keyrings()
754 node = assoc_array_ptr_to_node(ptr); in search_nested_keyrings()
755 ptr = node->slots[0]; in search_nested_keyrings()
769 node = assoc_array_ptr_to_node(ptr); in search_nested_keyrings()
777 ptr = READ_ONCE(node->slots[slot]); in search_nested_keyrings()
779 if (assoc_array_ptr_is_meta(ptr) && node->back_pointer) in search_nested_keyrings()
803 stack[sp].node = node; in search_nested_keyrings()
815 ptr = READ_ONCE(node->back_pointer); in search_nested_keyrings()
[all …]
Dkey.c63 user = rb_entry(parent, struct key_user, node); in key_user_lookup()
101 rb_link_node(&candidate->node, parent, p); in key_user_lookup()
102 rb_insert_color(&candidate->node, &key_user_tree); in key_user_lookup()
122 rb_erase(&user->node, &key_user_tree); in key_user_put()
1190 rb_link_node(&root_key_user.node, in key_init()
1194 rb_insert_color(&root_key_user.node, in key_init()
Dproc.c253 struct key_user *user = rb_entry(n, struct key_user, node); in __key_user_next()
304 struct key_user *user = rb_entry(_p, struct key_user, node); in proc_key_users_show()
Dinternal.h52 struct rb_node node; member
/security/apparmor/include/
Dlabel.h127 struct rb_node node; member