Home
last modified time | relevance | path

Searched refs:pol (Results 1 – 9 of 9) sorted by relevance

/security/safesetid/
A Dsecurityfs.c80 kfree(pol->policy_str); in __release_ruleset()
81 kfree(pol); in __release_ruleset()
90 if (pol->type == UID) in insert_rule()
150 if (!pol) in handle_policy_update()
152 pol->policy_str = NULL; in handle_policy_update()
154 hash_init(pol->rules); in handle_policy_update()
216 pol = rcu_replace_pointer(safesetid_setuid_rules, pol, in handle_policy_update()
221 pol = rcu_replace_pointer(safesetid_setgid_rules, pol, in handle_policy_update()
233 if (pol) in handle_policy_update()
234 release_ruleset(pol); in handle_policy_update()
[all …]
A Dlsm.c70 struct setid_ruleset *pol; in setid_policy_lookup() local
74 pol = rcu_dereference(safesetid_setuid_rules); in setid_policy_lookup()
76 pol = rcu_dereference(safesetid_setgid_rules); in setid_policy_lookup()
83 if (pol) { in setid_policy_lookup()
84 pol->type = new_type; in setid_policy_lookup()
85 result = _setid_policy_lookup(pol, src, dst); in setid_policy_lookup()
/security/ipe/
A Dpolicy_tests.c250 struct ipe_policy *pol; in ipe_parser_unsigned_test() local
255 KUNIT_EXPECT_EQ(test, PTR_ERR(pol), p->errno); in ipe_parser_unsigned_test()
259 KUNIT_ASSERT_NOT_ERR_OR_NULL(test, pol); in ipe_parser_unsigned_test()
260 KUNIT_EXPECT_NOT_ERR_OR_NULL(test, pol->parsed); in ipe_parser_unsigned_test()
261 KUNIT_EXPECT_STREQ(test, pol->text, p->policy); in ipe_parser_unsigned_test()
262 KUNIT_EXPECT_PTR_EQ(test, NULL, pol->pkcs7); in ipe_parser_unsigned_test()
263 KUNIT_EXPECT_EQ(test, 0, pol->pkcs7len); in ipe_parser_unsigned_test()
265 ipe_free_policy(pol); in ipe_parser_unsigned_test()
278 struct ipe_policy *pol = NULL; in ipe_parser_widestring_test() local
281 KUNIT_EXPECT_TRUE(test, IS_ERR_OR_NULL(pol)); in ipe_parser_widestring_test()
[all …]
A Deval.c319 struct ipe_policy *pol = NULL; in ipe_evaluate_event() local
328 pol = rcu_dereference(ipe_active_policy); in ipe_evaluate_event()
329 if (!pol) { in ipe_evaluate_event()
335 if (pol->parsed->global_default_action == IPE_ACTION_INVALID) { in ipe_evaluate_event()
339 action = pol->parsed->global_default_action; in ipe_evaluate_event()
345 rules = &pol->parsed->rules[ctx->op]; in ipe_evaluate_event()
367 action = pol->parsed->global_default_action; in ipe_evaluate_event()
A Dpolicy.h92 void ipe_free_policy(struct ipe_policy *pol);
/security/selinux/ss/
A Davtab.c339 int avtab_read_item(struct avtab *a, struct policy_file *fp, struct policydb *pol, in avtab_read_item() argument
352 unsigned int set, vers = pol->policyvers; in avtab_read_item()
440 if (!policydb_type_isvalid(pol, key.source_type) || in avtab_read_item()
441 !policydb_type_isvalid(pol, key.target_type) || in avtab_read_item()
442 !policydb_class_isvalid(pol, key.target_class)) { in avtab_read_item()
497 !policydb_type_isvalid(pol, datum.u.data)) { in avtab_read_item()
510 int avtab_read(struct avtab *a, struct policy_file *fp, struct policydb *pol) in avtab_read() argument
533 rc = avtab_read_item(a, fp, pol, avtab_insertf, NULL, false); in avtab_read()
A Davtab.h109 int avtab_read_item(struct avtab *a, struct policy_file *fp, struct policydb *pol,
114 int avtab_read(struct avtab *a, struct policy_file *fp, struct policydb *pol);
A Dmls.c230 int mls_context_to_sid(struct policydb *pol, char oldc, char *scontext, in mls_context_to_sid() argument
240 if (!pol->mls_enabled) { in mls_context_to_sid()
289 levdatum = symtab_search(&pol->p_levels, sensitivity); in mls_context_to_sid()
308 catdatum = symtab_search(&pol->p_cats, cur_cat); in mls_context_to_sid()
321 rngdatum = symtab_search(&pol->p_cats, rngptr); in mls_context_to_sid()
A Dservices.c96 static int selinux_set_mapping(struct policydb *pol, in selinux_set_mapping() argument
128 p_out->value = string_to_security_class(pol, p_in->name); in selinux_set_mapping()
132 if (pol->reject_unknown) in selinux_set_mapping()
146 p_out->perms[k] = string_to_av_perm(pol, p_out->value, in selinux_set_mapping()
151 if (pol->reject_unknown) in selinux_set_mapping()
163 pol->allow_unknown ? "allowed" : "denied"); in selinux_set_mapping()
1474 static int string_to_context_struct(struct policydb *pol, in string_to_context_struct() argument
1503 usrdatum = symtab_search(&pol->p_users, scontextp); in string_to_context_struct()
1519 role = symtab_search(&pol->p_roles, scontextp); in string_to_context_struct()
1531 typdatum = symtab_search(&pol->p_types, scontextp); in string_to_context_struct()
[all …]

Completed in 21 milliseconds