Home
last modified time | relevance | path

Searched refs:node (Results 1 – 23 of 23) sorted by relevance

/security/selinux/
Dnetnode.c107 struct sel_netnode *node; in sel_netnode_find() local
121 list_for_each_entry_rcu(node, &sel_netnode_hash[idx].list, list) in sel_netnode_find()
122 if (node->nsec.family == family) in sel_netnode_find()
125 if (node->nsec.addr.ipv4 == *(__be32 *)addr) in sel_netnode_find()
126 return node; in sel_netnode_find()
129 if (ipv6_addr_equal(&node->nsec.addr.ipv6, in sel_netnode_find()
131 return node; in sel_netnode_find()
146 static void sel_netnode_insert(struct sel_netnode *node) in sel_netnode_insert() argument
150 switch (node->nsec.family) { in sel_netnode_insert()
152 idx = sel_netnode_hashfn_ipv4(node->nsec.addr.ipv4); in sel_netnode_insert()
[all …]
Davc.c159 struct avc_node *node; in avc_get_hash_stats() local
171 hlist_for_each_entry_rcu(node, head, list) in avc_get_hash_stats()
333 static int avc_add_xperms_decision(struct avc_node *node, in avc_add_xperms_decision() argument
338 node->ae.xp_node->xp.len++; in avc_add_xperms_decision()
343 list_add(&dest_xpd->xpd_list, &node->ae.xp_node->xpd_head); in avc_add_xperms_decision()
358 static int avc_xperms_populate(struct avc_node *node, in avc_xperms_populate() argument
382 node->ae.xp_node = dest; in avc_xperms_populate()
439 struct avc_node *node = container_of(rhead, struct avc_node, rhead); in avc_node_free() local
440 avc_xperms_free(node->ae.xp_node); in avc_node_free()
441 kmem_cache_free(avc_node_cachep, node); in avc_node_free()
[all …]
DKconfig32 This option enables writing to a selinuxfs node 'disable', which
/security/selinux/ss/
Dconditional.c34 struct cond_expr_node *node = &expr->nodes[i]; in cond_evaluate_expr() local
36 switch (node->expr_type) { in cond_evaluate_expr()
41 s[sp] = p->bool_val_to_struct[node->bool - 1]->state; in cond_evaluate_expr()
92 static void evaluate_cond_node(struct policydb *p, struct cond_node *node) in evaluate_cond_node() argument
98 new_state = cond_evaluate_expr(p, &node->expr); in evaluate_cond_node()
99 if (new_state != node->cur_state) { in evaluate_cond_node()
100 node->cur_state = new_state; in evaluate_cond_node()
104 for (i = 0; i < node->true_list.len; i++) { in evaluate_cond_node()
105 avnode = node->true_list.nodes[i]; in evaluate_cond_node()
112 for (i = 0; i < node->false_list.len; i++) { in evaluate_cond_node()
[all …]
Debitmap.c38 n1 = e1->node; in ebitmap_cmp()
39 n2 = e2->node; in ebitmap_cmp()
58 n = src->node; in ebitmap_cpy()
72 dst->node = new; in ebitmap_cpy()
113 struct ebitmap_node *e_iter = ebmap->node; in ebitmap_netlbl_export()
192 ebmap->node = e_iter; in ebitmap_netlbl_import()
228 n1 = e1->node; in ebitmap_contains()
229 n2 = e2->node; in ebitmap_contains()
268 n = e->node; in ebitmap_get_bit()
283 n = e->node; in ebitmap_set_bit()
[all …]
Debitmap.h41 struct ebitmap_node *node; /* first node in the bitmap */ member
52 for (*n = e->node; *n; *n = (*n)->next) { in ebitmap_start_positive()
83 #define EBITMAP_NODE_INDEX(node, bit) \ argument
84 (((bit) - (node)->startbit) / EBITMAP_UNIT_SIZE)
85 #define EBITMAP_NODE_OFFSET(node, bit) \ argument
86 (((bit) - (node)->startbit) % EBITMAP_UNIT_SIZE)
Dservices.c598 struct avtab_node *node) in services_compute_xperms_drivers() argument
602 if (node->datum.u.xperms->specified == AVTAB_XPERMS_IOCTLDRIVER) { in services_compute_xperms_drivers()
605 xperms->drivers.p[i] |= node->datum.u.xperms->perms.p[i]; in services_compute_xperms_drivers()
606 } else if (node->datum.u.xperms->specified == AVTAB_XPERMS_IOCTLFUNCTION) { in services_compute_xperms_drivers()
609 node->datum.u.xperms->driver); in services_compute_xperms_drivers()
613 if (node->key.specified & AVTAB_XPERMS_ALLOWED) in services_compute_xperms_drivers()
631 struct avtab_node *node; in context_struct_compute_av() local
665 for (node = avtab_search_node(&policydb->te_avtab, in context_struct_compute_av()
667 node; in context_struct_compute_av()
668 node = avtab_search_node_next(node, avkey.specified)) { in context_struct_compute_av()
[all …]
Dservices.h33 struct avtab_node *node);
36 struct avtab_node *node);
Davtab.c249 avtab_search_node_next(struct avtab_node *node, int specified) in avtab_search_node_next() argument
253 if (!node) in avtab_search_node_next()
257 for (cur = node->next; cur; cur = cur->next) { in avtab_search_node_next()
258 if (node->key.source_type == cur->key.source_type && in avtab_search_node_next()
259 node->key.target_type == cur->key.target_type && in avtab_search_node_next()
260 node->key.target_class == cur->key.target_class && in avtab_search_node_next()
264 if (node->key.source_type < cur->key.source_type) in avtab_search_node_next()
266 if (node->key.source_type == cur->key.source_type && in avtab_search_node_next()
267 node->key.target_type < cur->key.target_type) in avtab_search_node_next()
269 if (node->key.source_type == cur->key.source_type && in avtab_search_node_next()
[all …]
Dsidtab.c511 struct sidtab_node_inner *node = entry.ptr_inner; in sidtab_destroy_tree() local
513 if (!node) in sidtab_destroy_tree()
517 sidtab_destroy_tree(node->entries[i], level - 1); in sidtab_destroy_tree()
518 kfree(node); in sidtab_destroy_tree()
520 struct sidtab_node_leaf *node = entry.ptr_leaf; in sidtab_destroy_tree() local
522 if (!node) in sidtab_destroy_tree()
526 sidtab_destroy_entry(&node->entries[i]); in sidtab_destroy_tree()
527 kfree(node); in sidtab_destroy_tree()
Dmls.c41 struct ebitmap_node *node; in mls_compute_context_len() local
55 ebitmap_for_each_positive_bit(e, node, i) { in mls_compute_context_len()
96 struct ebitmap_node *node; in mls_sid_to_context() local
115 ebitmap_for_each_positive_bit(e, node, i) { in mls_sid_to_context()
454 struct ebitmap_node *node; in mls_convert_context() local
471 node, i) { in mls_convert_context()
Davtab.h112 struct avtab_node *avtab_search_node_next(struct avtab_node *node, int specified);
Dpolicydb.c1664 struct ebitmap_node *node; in user_bounds_sanity_check() local
1675 ebitmap_for_each_positive_bit(&user->roles, node, bit) { in user_bounds_sanity_check()
1700 struct ebitmap_node *node; in role_bounds_sanity_check() local
1711 ebitmap_for_each_positive_bit(&role->types, node, bit) { in role_bounds_sanity_check()
2288 c->u.node.addr = nodebuf[0]; /* network order */ in ocontext_read()
2289 c->u.node.mask = nodebuf[1]; /* network order */ in ocontext_read()
3002 static int write_cons_helper(struct policydb *p, struct constraint_node *node, in write_cons_helper() argument
3011 for (c = node; c; c = c->next) { in write_cons_helper()
3325 nodebuf[0] = c->u.node.addr; /* network order */ in ocontext_write()
3326 nodebuf[1] = c->u.node.mask; /* network order */ in ocontext_write()
[all …]
Dpolicydb.h185 } node; /* node information */ member
/security/integrity/platform_certs/
Dload_powerpc.c56 struct device_node *node; in load_powerpc_certs() local
62 node = of_find_compatible_node(NULL, NULL, "ibm,edk2-compat-v1"); in load_powerpc_certs()
63 if (!node) in load_powerpc_certs()
92 of_node_put(node); in load_powerpc_certs()
/security/yama/
Dyama_lsm.c34 struct list_head node; member
121 list_for_each_entry_rcu(relation, &ptracer_relations, node) { in yama_relation_cleanup()
123 list_del_rcu(&relation->node); in yama_relation_cleanup()
156 list_for_each_entry_rcu(relation, &ptracer_relations, node) { in yama_ptracer_add()
160 list_replace_rcu(&relation->node, &added->node); in yama_ptracer_add()
166 list_add_rcu(&added->node, &ptracer_relations); in yama_ptracer_add()
186 list_for_each_entry_rcu(relation, &ptracer_relations, node) { in yama_ptracer_del()
328 list_for_each_entry_rcu(relation, &ptracer_relations, node) { in ptracer_exception_found()
/security/apparmor/
Dlabel.c407 RB_CLEAR_NODE(&label->node); in aa_label_init()
606 rb_erase(&label->node, &ls->root); in __label_remove()
641 rb_replace_node(&old->node, &new->node, &ls->root); in __label_replace()
677 struct aa_label *this = rb_entry(*new, struct aa_label, node); in __label_insert()
701 rb_link_node(&label->node, parent, new); in __label_insert()
702 rb_insert_color(&label->node, &ls->root); in __label_insert()
722 struct rb_node *node; in __vec_find() local
728 node = vec_labelset(vec, n)->root.rb_node; in __vec_find()
729 while (node) { in __vec_find()
730 struct aa_label *this = rb_entry(node, struct aa_label, node); in __vec_find()
[all …]
/security/integrity/
Diint.c127 struct rb_node *node, *parent = NULL; in integrity_inode_get() local
167 node = &iint->rb_node; in integrity_inode_get()
169 rb_link_node(node, parent, p); in integrity_inode_get()
170 rb_insert_color(node, &integrity_iint_tree); in integrity_inode_get()
/security/keys/
Dkeyring.c668 struct assoc_array_node *node; in search_nested_keyrings() member
673 struct assoc_array_node *node; in search_nested_keyrings() local
746 node = assoc_array_ptr_to_node(ptr); in search_nested_keyrings()
750 node = assoc_array_ptr_to_node(ptr); in search_nested_keyrings()
751 ptr = node->slots[0]; in search_nested_keyrings()
765 node = assoc_array_ptr_to_node(ptr); in search_nested_keyrings()
773 ptr = READ_ONCE(node->slots[slot]); in search_nested_keyrings()
775 if (assoc_array_ptr_is_meta(ptr) && node->back_pointer) in search_nested_keyrings()
799 stack[sp].node = node; in search_nested_keyrings()
811 ptr = READ_ONCE(node->back_pointer); in search_nested_keyrings()
[all …]
Dkey.c64 user = rb_entry(parent, struct key_user, node); in key_user_lookup()
102 rb_link_node(&candidate->node, parent, p); in key_user_lookup()
103 rb_insert_color(&candidate->node, &key_user_tree); in key_user_lookup()
123 rb_erase(&user->node, &key_user_tree); in key_user_put()
1207 rb_link_node(&root_key_user.node, in key_init()
1211 rb_insert_color(&root_key_user.node, in key_init()
Dproc.c255 struct key_user *user = rb_entry(n, struct key_user, node); in __key_user_next()
306 struct key_user *user = rb_entry(_p, struct key_user, node); in proc_key_users_show()
Dinternal.h55 struct rb_node node; member
/security/apparmor/include/
Dlabel.h127 struct rb_node node; member