| /security/integrity/platform_certs/ |
| A D | efi_parser.c | 49 efi_signature_list_t list; in parse_efi_signature_list() local 52 if (size < sizeof(list)) in parse_efi_signature_list() 55 memcpy(&list, data, sizeof(list)); in parse_efi_signature_list() 58 &list.signature_type, list.signature_list_size, in parse_efi_signature_list() 59 list.signature_header_size, list.signature_size); in parse_efi_signature_list() 61 lsize = list.signature_list_size; in parse_efi_signature_list() 63 esize = list.signature_size; in parse_efi_signature_list() 72 if (lsize < sizeof(list) || in parse_efi_signature_list() 89 data += sizeof(list) + hsize; in parse_efi_signature_list() 90 size -= sizeof(list) + hsize; in parse_efi_signature_list() [all …]
|
| /security/tomoyo/ |
| A D | gc.c | 280 head.list); in tomoyo_del_condition() 453 list)->users)) in tomoyo_try_to_gc() 511 list_for_each_entry_safe(acl, tmp, list, list) { in tomoyo_collect_acl() 536 list) { in tomoyo_collect_entry() 554 list) { in tomoyo_collect_entry() 578 list_for_each_entry_safe(group, tmp, list, head.list) { in tomoyo_collect_entry() 586 &group->head.list); in tomoyo_collect_entry() 595 list_for_each_entry_safe(ptr, tmp, list, list) { in tomoyo_collect_entry() 626 list) { in tomoyo_gc_thread() 629 list_del(&head->list); in tomoyo_gc_thread() [all …]
|
| A D | domain.c | 40 struct list_head *list = param->list; in tomoyo_update_policy() local 44 list_for_each_entry_rcu(entry, list, list, in tomoyo_update_policy() 57 list_add_tail_rcu(&entry->list, list); in tomoyo_update_policy() 105 struct list_head * const list = param->list; in tomoyo_update_domain() local 123 list_for_each_entry_rcu(entry, list, list, in tomoyo_update_domain() 141 list_add_tail_rcu(&entry->list, list); in tomoyo_update_domain() 171 list_for_each_entry_rcu(ptr, list, list, in tomoyo_check_acl() 186 list = &domain->ns->acl_group[i++]; in tomoyo_check_acl() 304 list_for_each_entry_rcu(ptr, list, head.list, in tomoyo_scan_transition() 745 struct list_head *list = in tomoyo_find_next_domain() local [all …]
|
| A D | memory.c | 100 struct list_head *list; in tomoyo_get_group() local 111 list = ¶m->ns->group_list[idx]; in tomoyo_get_group() 112 list_for_each_entry(group, list, head.list) { in tomoyo_get_group() 126 list_add_tail_rcu(&entry->head.list, list); in tomoyo_get_group() 166 list_for_each_entry(ptr, head, head.list) { in tomoyo_get_name() 179 list_add_tail(&ptr->head.list, head); in tomoyo_get_name() 206 list_add_tail_rcu(&tomoyo_kernel_domain.list, &tomoyo_domain_list); in tomoyo_mm_init()
|
| A D | group.c | 81 param->list = &group->member_list; in tomoyo_write_group() 136 list_for_each_entry_rcu(member, &group->member_list, head.list, in tomoyo_path_matches_group() 165 list_for_each_entry_rcu(member, &group->member_list, head.list, in tomoyo_number_matches_group() 196 list_for_each_entry_rcu(member, &group->member_list, head.list, in tomoyo_address_matches_group()
|
| A D | common.c | 1018 head->r.domain = &domain->list; in tomoyo_select_domain() 1119 struct list_head *list, char *data, in tomoyo_write_domain2() argument 1124 .list = list, in tomoyo_write_domain2() 1590 struct list_head *list) in tomoyo_read_domain2() argument 1592 list_for_each_cookie(head->r.acl, list) { in tomoyo_read_domain2() 1594 list_entry(head->r.acl, typeof(*ptr), list); in tomoyo_read_domain2() 1795 list_for_each_cookie(head->r.group, list) { in tomoyo_read_group() 1854 list_for_each_cookie(head->r.acl, list) { in tomoyo_read_policy() 1944 struct list_head list; member 2233 list_del(&entry.list); in tomoyo_supervisor() [all …]
|
| /security/selinux/ |
| A D | netport.c | 40 struct list_head list; member 46 struct list_head list; member 83 list_for_each_entry_rcu(port, &sel_netport_hash[idx].list, list) in sel_netport_find() 105 list_add_rcu(&port->list, &sel_netport_hash[idx].list); in sel_netport_insert() 110 list_tail_rcu(&sel_netport_hash[idx].list), in sel_netport_insert() 112 struct sel_netport, list); in sel_netport_insert() 113 list_del_rcu(&tail->list); in sel_netport_insert() 212 &sel_netport_hash[idx].list, list) { in sel_netport_flush() 213 list_del_rcu(&port->list); in sel_netport_flush() 229 INIT_LIST_HEAD(&sel_netport_hash[iter].list); in sel_netport_init()
|
| A D | ibpkey.c | 34 struct list_head list; member 39 struct list_head list; member 76 list_for_each_entry_rcu(pkey, &sel_ib_pkey_hash[idx].list, list) { in sel_ib_pkey_find() 101 list_add_rcu(&pkey->list, &sel_ib_pkey_hash[idx].list); in sel_ib_pkey_insert() 107 list_tail_rcu(&sel_ib_pkey_hash[idx].list), in sel_ib_pkey_insert() 109 struct sel_ib_pkey, list); in sel_ib_pkey_insert() 110 list_del_rcu(&tail->list); in sel_ib_pkey_insert() 212 &sel_ib_pkey_hash[idx].list, list) { in sel_ib_pkey_flush() 213 list_del_rcu(&pkey->list); in sel_ib_pkey_flush() 229 INIT_LIST_HEAD(&sel_ib_pkey_hash[iter].list); in sel_ib_pkey_init()
|
| A D | netnode.c | 41 struct list_head list; member 47 struct list_head list; member 120 list_for_each_entry_rcu(node, &sel_netnode_hash[idx].list, list) in sel_netnode_find() 163 list_add_rcu(&node->list, &sel_netnode_hash[idx].list); in sel_netnode_insert() 168 list_tail_rcu(&sel_netnode_hash[idx].list), in sel_netnode_insert() 170 struct sel_netnode, list); in sel_netnode_insert() 171 list_del_rcu(&tail->list); in sel_netnode_insert() 284 &sel_netnode_hash[idx].list, list) { in sel_netnode_flush() 285 list_del_rcu(&node->list); in sel_netnode_flush() 301 INIT_LIST_HEAD(&sel_netnode_hash[iter].list); in sel_netnode_init()
|
| A D | netif.c | 33 struct list_head list; member 73 list_for_each_entry_rcu(netif, &sel_netif_hash[idx], list) in sel_netif_find() 98 list_add_rcu(&netif->list, &sel_netif_hash[idx]); in sel_netif_insert() 114 list_del_rcu(&netif->list); in sel_netif_destroy() 248 list_for_each_entry(netif, &sel_netif_hash[idx], list) in sel_netif_flush()
|
| A D | avc.c | 57 struct hlist_node list; /* anchored in avc_cache->slots[i] */ member 158 hlist_for_each_entry_rcu(node, head, list) in avc_get_hash_stats() 439 hlist_del_rcu(&node->list); in avc_node_delete() 454 hlist_replace_rcu(&old->list, &new->list); in avc_node_replace() 477 hlist_for_each_entry(node, head, list) { in avc_reclaim_node() 502 INIT_HLIST_NODE(&node->list); in avc_alloc_node() 529 hlist_for_each_entry_rcu(node, head, list) { in avc_search_node() 632 hlist_for_each_entry(pos, head, list) { in avc_insert() 640 hlist_add_head_rcu(&node->list, head); in avc_insert() 855 hlist_for_each_entry(pos, head, list) { in avc_update_node() [all …]
|
| /security/smack/ |
| A D | smackfs.c | 541 list = rcu_dereference(list_next_rcu(list))) { in smk_seq_start() 555 list = rcu_dereference(list_next_rcu(list)); in smk_seq_next() 557 return (list == head) ? NULL : list; in smk_seq_next() 607 list_entry_rcu(list, struct smack_known, list); in load_seq_show() 754 list_entry_rcu(list, struct smack_known, list); in cipso_seq_show() 1108 list_add_rcu(&new->list, &m->list); in smk_net4addr_insert() 1114 list_add_rcu(&new->list, &m->list); in smk_net4addr_insert() 1312 list_entry(list, struct smk_net6addr, list); in net6addr_seq_show() 1369 list_add_rcu(&new->list, &m->list); in smk_net6addr_insert() 1375 list_add_rcu(&new->list, &m->list); in smk_net6addr_insert() [all …]
|
| A D | smack.h | 67 struct list_head list; member 138 struct list_head list; member 148 struct list_head list; member 160 struct list_head list; member 173 struct list_head list; member 184 struct list_head list; member 296 void smk_destroy_label_list(struct list_head *list);
|
| /security/ |
| A D | device_cgroup.c | 39 struct list_head list; member 68 list_for_each_entry(ex, orig, list) { in dev_exceptions_copy() 72 list_add_tail(&new->list, dest); in dev_exceptions_copy() 78 list_for_each_entry_safe(ex, tmp, dest, list) { in dev_exceptions_copy() 79 list_del(&ex->list); in dev_exceptions_copy() 91 list_for_each_entry_safe(ex, tmp, orig, list) { in dev_exceptions_move() 92 list_move_tail(&ex->list, dest); in dev_exceptions_move() 148 list_del_rcu(&walk->list); in dev_exception_rm() 159 list_del_rcu(&ex->list); in __dev_exception_clean() 332 list_for_each_entry_rcu(ex, exceptions, list) { in match_exception() [all …]
|
| /security/integrity/ima/ |
| A D | ima_queue_keys.c | 89 INIT_LIST_HEAD(&entry->list); in ima_alloc_key_entry() 116 list_add_tail(&entry->list, &ima_keys); in ima_queue_key() 160 list_for_each_entry_safe(entry, tmp, &ima_keys, list) { in ima_process_queued_keys() 169 list_del(&entry->list); in ima_process_queued_keys()
|
| A D | Kconfig | 19 Measurement Architecture(IMA) maintains a list of hash 26 an aggregate integrity value over this list inside the 36 bool "Enable carrying the IMA measurement list across a soft boot" 41 a TPM's quote after a soft boot, the IMA measurement list of the 44 Depending on the IMA policy, the measurement list can grow to 54 measurement list. If unsure, use the default 10. 69 The original 'ima' measurement list template contains a 71 limited to 255 characters. The 'ima-ng' measurement list 92 list, integrity appraisal and audit log. The compiled default
|
| A D | ima_policy.c | 99 struct list_head list; member 448 list_replace_rcu(&entry->list, &nentry->list); in ima_lsm_update_rule() 756 list_for_each_entry_rcu(entry, ima_rules_tmp, list) { in ima_match_policy() 883 list_add_tail(&entry->list, &ima_policy_rules); in add_rules() 925 INIT_LIST_HEAD(&arch_policy_entry[i].list); in ima_init_arch_policy() 1946 INIT_LIST_HEAD(&entry->list); in ima_parse_add_rule() 1957 list_add_tail(&entry->list, &ima_temp_rules); in ima_parse_add_rule() 1975 list_del(&entry->list); in ima_delete_rules() 2021 entry = list_entry_rcu(entry->list.next, struct ima_rule_entry, list); in ima_policy_next() 2025 return (&entry->list == &ima_default_rules || in ima_policy_next() [all …]
|
| /security/apparmor/ |
| A D | policy.c | 150 AA_BUG(!list); in __add_profile() 155 list_add_rcu(&profile->base.list, list); in __add_profile() 181 list_del_rcu(&profile->base.list); in __list_remove_profile() 950 list_for_each_entry(ent, lh, list) { in __list_lookup_parent() 984 list_del_init(&child->base.list); in __replace_profile() 1010 if (list_empty(&new->base.list)) { in __replace_profile() 1012 list_replace_rcu(&old->base.list, &new->base.list); in __replace_profile() 1113 list_for_each_entry(ent, &lh, list) { in aa_replace_profiles() 1163 list_for_each_entry(ent, &lh, list) { in aa_replace_profiles() 1256 list_del_init(&ent->list); in aa_replace_profiles() [all …]
|
| A D | policy_ns.c | 240 list_add_rcu(&ns->base.list, &parent->sub_ns); in __aa_create_ns() 337 list_del_rcu(&ns->base.list); in __aa_remove_ns() 352 list_for_each_entry_safe(ns, tmp, head, base.list) in __ns_list_release()
|
| /security/selinux/ss/ |
| A D | conditional.c | 321 struct cond_av_list *list, in cond_read_av_list() argument 337 list->nodes = kcalloc(len, sizeof(*list->nodes), GFP_KERNEL); in cond_read_av_list() 338 if (!list->nodes) in cond_read_av_list() 344 data.dst = &list->nodes[i]; in cond_read_av_list() 348 kfree(list->nodes); in cond_read_av_list() 349 list->nodes = NULL; in cond_read_av_list() 354 list->len = len; in cond_read_av_list() 477 static int cond_write_av_list(struct policydb *p, struct cond_av_list *list, in cond_write_av_list() argument 484 buf[0] = cpu_to_le32(list->len); in cond_write_av_list() 489 for (i = 0; i < list->len; i++) { in cond_write_av_list() [all …]
|
| A D | sidtab.c | 66 hash_for_each_possible_rcu(s->context_to_sid, entry, list, hash) { in context_to_sid() 109 hash_add(s->context_to_sid, &isid->entry.list, hash); in sidtab_set_initial() 126 hash_for_each_rcu(sidtab->context_to_sid, i, entry, list) { in sidtab_hash_stats() 343 hash_add_rcu(target->context_to_sid, &dst_convert->list, in sidtab_context_to_sid() 355 hash_add_rcu(s->context_to_sid, &dst->list, dst->hash); in sidtab_context_to_sid() 373 hash_add_rcu(s->context_to_sid, &entry->list, entry->hash); in sidtab_convert_hashtable()
|
| /security/integrity/evm/ |
| A D | evm_secfs.c | 141 list_for_each_entry(xattr, &evm_config_xattrnames, list) { in evm_read_xattrs() 154 list_for_each_entry(xattr, &evm_config_xattrnames, list) { in evm_read_xattrs() 252 list_for_each_entry(tmp, &evm_config_xattrnames, list) { in evm_write_xattrs() 263 list_add_tail_rcu(&xattr->list, &evm_config_xattrnames); in evm_write_xattrs()
|
| /security/loadpin/ |
| A D | Kconfig | 30 that use dm-verity. LoadPin maintains a list of verity root 32 considered trusted if its root digest is found in the list 35 The list of trusted verity can be populated through an ioctl
|
| /security/apparmor/include/ |
| A D | policy_unpack.h | 21 struct list_head list; member 101 struct list_head list; member
|
| A D | lib.h | 168 struct list_head list; member 203 list_for_each_entry_rcu(policy, head, list) { in __policy_find() 228 list_for_each_entry_rcu(policy, head, list) { in __policy_strn_find()
|