/security/selinux/ss/ |
D | policydb.c | 184 static int perm_destroy(void *key, void *datum, void *p) in perm_destroy() argument 187 kfree(datum); in perm_destroy() 191 static int common_destroy(void *key, void *datum, void *p) in common_destroy() argument 196 if (datum) { in common_destroy() 197 comdatum = datum; in common_destroy() 201 kfree(datum); in common_destroy() 218 static int cls_destroy(void *key, void *datum, void *p) in cls_destroy() argument 225 if (datum) { in cls_destroy() 226 cladatum = datum; in cls_destroy() 256 kfree(datum); in cls_destroy() [all …]
|
D | avtab.c | 71 const struct avtab_key *key, const struct avtab_datum *datum) in avtab_insert_node() argument 86 *xperms = *(datum->u.xperms); in avtab_insert_node() 87 newnode->datum.u.xperms = xperms; in avtab_insert_node() 89 newnode->datum.u.data = datum->u.data; in avtab_insert_node() 107 const struct avtab_datum *datum) in avtab_insert() argument 140 newnode = avtab_insert_node(h, hvalue, prev, cur, key, datum); in avtab_insert() 153 const struct avtab_datum *datum) in avtab_insert_nonunique() argument 180 return avtab_insert_node(h, hvalue, prev, cur, key, datum); in avtab_insert_nonunique() 199 return &cur->datum; in avtab_search() 294 temp->datum.u.xperms); in avtab_destroy() [all …]
|
D | conditional.c | 177 int cond_destroy_bool(void *key, void *datum, void *p) in cond_destroy_bool() argument 180 kfree(datum); in cond_destroy_bool() 184 int cond_index_bool(void *key, void *datum, void *datap) in cond_index_bool() argument 189 booldatum = datum; in cond_index_bool() 449 int cond_write_bool(void *vkey, void *datum, void *ptr) in cond_write_bool() argument 452 struct cond_bool_datum *booldatum = datum; in cond_write_bool() 588 avd->allowed |= node->datum.u.data; in cond_compute_av() 596 avd->auditdeny &= node->datum.u.data; in cond_compute_av() 599 avd->auditallow |= node->datum.u.data; in cond_compute_av() 621 &orig->nodes[i]->datum); in cond_dup_av_list() [all …]
|
D | hashtab.h | 28 void *datum; member 51 void *key, void *datum); 61 static inline int hashtab_insert(struct hashtab *h, void *key, void *datum, in hashtab_insert() argument 87 key, datum); in hashtab_insert() 111 return cur->datum; in hashtab_search()
|
D | hashtab.c | 50 void *key, void *datum) in __hashtab_insert() argument 58 newnode->datum = datum; in __hashtab_insert() 96 ret = apply(cur->key, cur->datum, args); in hashtab_map() 177 destroy(cur->key, cur->datum, args); in hashtab_duplicate()
|
D | conditional.h | 68 int cond_destroy_bool(void *key, void *datum, void *p); 70 int cond_index_bool(void *key, void *datum, void *datap); 74 int cond_write_bool(void *key, void *datum, void *ptr);
|
D | symtab.c | 46 int symtab_insert(struct symtab *s, char *name, void *datum) in symtab_insert() argument 48 return hashtab_insert(&s->table, name, datum, symtab_key_params); in symtab_insert()
|
D | avtab.h | 79 struct avtab_datum datum; member 109 const struct avtab_datum *datum);
|
D | services.c | 604 if (node->datum.u.xperms->specified == AVTAB_XPERMS_IOCTLDRIVER) { in services_compute_xperms_drivers() 607 xperms->drivers.p[i] |= node->datum.u.xperms->perms.p[i]; in services_compute_xperms_drivers() 608 } else if (node->datum.u.xperms->specified == AVTAB_XPERMS_IOCTLFUNCTION) { in services_compute_xperms_drivers() 611 node->datum.u.xperms->driver); in services_compute_xperms_drivers() 670 avd->allowed |= node->datum.u.data; in context_struct_compute_av() 672 avd->auditallow |= node->datum.u.data; in context_struct_compute_av() 674 avd->auditdeny &= node->datum.u.data; in context_struct_compute_av() 968 if (node->datum.u.xperms->specified == AVTAB_XPERMS_IOCTLFUNCTION) { in services_compute_xperms_decision() 969 if (xpermd->driver != node->datum.u.xperms->driver) in services_compute_xperms_decision() 971 } else if (node->datum.u.xperms->specified == AVTAB_XPERMS_IOCTLDRIVER) { in services_compute_xperms_decision() [all …]
|
D | symtab.h | 22 int symtab_insert(struct symtab *s, char *name, void *datum);
|