Home
last modified time | relevance | path

Searched refs:sp (Results 1 – 7 of 7) sorted by relevance

/security/selinux/ss/
Dconditional.c29 int sp = -1; in cond_evaluate_expr() local
34 if (sp == (COND_EXPR_MAXDEPTH - 1)) in cond_evaluate_expr()
36 sp++; in cond_evaluate_expr()
37 s[sp] = p->bool_val_to_struct[cur->bool - 1]->state; in cond_evaluate_expr()
40 if (sp < 0) in cond_evaluate_expr()
42 s[sp] = !s[sp]; in cond_evaluate_expr()
45 if (sp < 1) in cond_evaluate_expr()
47 sp--; in cond_evaluate_expr()
48 s[sp] |= s[sp + 1]; in cond_evaluate_expr()
51 if (sp < 1) in cond_evaluate_expr()
[all …]
Dservices.c274 int sp = -1; in constraint_expr_eval() local
279 BUG_ON(sp < 0); in constraint_expr_eval()
280 s[sp] = !s[sp]; in constraint_expr_eval()
283 BUG_ON(sp < 1); in constraint_expr_eval()
284 sp--; in constraint_expr_eval()
285 s[sp] &= s[sp + 1]; in constraint_expr_eval()
288 BUG_ON(sp < 1); in constraint_expr_eval()
289 sp--; in constraint_expr_eval()
290 s[sp] |= s[sp + 1]; in constraint_expr_eval()
293 if (sp == (CEXPR_MAXDEPTH - 1)) in constraint_expr_eval()
[all …]
/security/selinux/
Dxfrm.c230 struct sec_path *sp = skb_sec_path(skb); in selinux_xfrm_skb_sid_ingress() local
232 if (sp) { in selinux_xfrm_skb_sid_ingress()
235 for (i = sp->len - 1; i >= 0; i--) { in selinux_xfrm_skb_sid_ingress()
236 struct xfrm_state *x = sp->xvec[i]; in selinux_xfrm_skb_sid_ingress()
408 struct sec_path *sp = skb_sec_path(skb); in selinux_xfrm_sock_rcv_skb() local
411 if (sp) { in selinux_xfrm_sock_rcv_skb()
412 for (i = 0; i < sp->len; i++) { in selinux_xfrm_sock_rcv_skb()
413 struct xfrm_state *x = sp->xvec[i]; in selinux_xfrm_sock_rcv_skb()
/security/tomoyo/
Dutil.c406 unsigned char *sp = buffer; in tomoyo_normalize_line() local
410 while (tomoyo_invalid(*sp)) in tomoyo_normalize_line()
411 sp++; in tomoyo_normalize_line()
412 while (*sp) { in tomoyo_normalize_line()
416 while (tomoyo_valid(*sp)) in tomoyo_normalize_line()
417 *dp++ = *sp++; in tomoyo_normalize_line()
418 while (tomoyo_invalid(*sp)) in tomoyo_normalize_line()
419 sp++; in tomoyo_normalize_line()
/security/keys/
Dkeyring.c676 int sp = 0, slot; in search_nested_keyrings() local
783 if (sp >= KEYRING_SEARCH_MAX_DEPTH) { in search_nested_keyrings()
798 stack[sp].keyring = keyring; in search_nested_keyrings()
799 stack[sp].node = node; in search_nested_keyrings()
800 stack[sp].slot = slot; in search_nested_keyrings()
801 sp++; in search_nested_keyrings()
837 kdebug("not_this_keyring %d", sp); in search_nested_keyrings()
838 if (sp <= 0) { in search_nested_keyrings()
844 sp--; in search_nested_keyrings()
845 keyring = stack[sp].keyring; in search_nested_keyrings()
[all …]
/security/smack/
Dsmackfs.c215 struct smack_rule *sp; in smk_set_access() local
225 list_for_each_entry_rcu(sp, rule_list, list) { in smk_set_access()
226 if (sp->smk_object == srp->smk_object && in smk_set_access()
227 sp->smk_subject == srp->smk_subject) { in smk_set_access()
229 sp->smk_access |= srp->smk_access1; in smk_set_access()
230 sp->smk_access &= ~srp->smk_access2; in smk_set_access()
236 sp = kmem_cache_zalloc(smack_rule_cache, GFP_KERNEL); in smk_set_access()
237 if (sp == NULL) { in smk_set_access()
242 sp->smk_subject = srp->smk_subject; in smk_set_access()
243 sp->smk_object = srp->smk_object; in smk_set_access()
[all …]
Dsmack_lsm.c783 struct superblock_smack *sp = sb->s_security; in smack_set_mnt_opts() local
789 if (sp->smk_flags & SMK_SB_INITIALIZED) in smack_set_mnt_opts()
809 sp->smk_root = skp; in smack_set_mnt_opts()
810 sp->smk_default = skp; in smack_set_mnt_opts()
820 sp->smk_flags |= SMK_SB_UNTRUSTED; in smack_set_mnt_opts()
824 sp->smk_flags |= SMK_SB_INITIALIZED; in smack_set_mnt_opts()
831 sp->smk_default = skp; in smack_set_mnt_opts()
837 sp->smk_floor = skp; in smack_set_mnt_opts()
843 sp->smk_hat = skp; in smack_set_mnt_opts()
849 sp->smk_root = skp; in smack_set_mnt_opts()
[all …]