Searched refs:pol (Results 1 – 9 of 9) sorted by relevance
| /security/safesetid/ |
| A D | securityfs.c | 80 kfree(pol->policy_str); in __release_ruleset() 81 kfree(pol); in __release_ruleset() 90 if (pol->type == UID) in insert_rule() 150 if (!pol) in handle_policy_update() 152 pol->policy_str = NULL; in handle_policy_update() 154 hash_init(pol->rules); in handle_policy_update() 216 pol = rcu_replace_pointer(safesetid_setuid_rules, pol, in handle_policy_update() 221 pol = rcu_replace_pointer(safesetid_setgid_rules, pol, in handle_policy_update() 233 if (pol) in handle_policy_update() 234 release_ruleset(pol); in handle_policy_update() [all …]
|
| A D | lsm.c | 70 struct setid_ruleset *pol; in setid_policy_lookup() local 74 pol = rcu_dereference(safesetid_setuid_rules); in setid_policy_lookup() 76 pol = rcu_dereference(safesetid_setgid_rules); in setid_policy_lookup() 83 if (pol) { in setid_policy_lookup() 84 pol->type = new_type; in setid_policy_lookup() 85 result = _setid_policy_lookup(pol, src, dst); in setid_policy_lookup()
|
| /security/ipe/ |
| A D | policy_tests.c | 250 struct ipe_policy *pol; in ipe_parser_unsigned_test() local 255 KUNIT_EXPECT_EQ(test, PTR_ERR(pol), p->errno); in ipe_parser_unsigned_test() 259 KUNIT_ASSERT_NOT_ERR_OR_NULL(test, pol); in ipe_parser_unsigned_test() 260 KUNIT_EXPECT_NOT_ERR_OR_NULL(test, pol->parsed); in ipe_parser_unsigned_test() 261 KUNIT_EXPECT_STREQ(test, pol->text, p->policy); in ipe_parser_unsigned_test() 262 KUNIT_EXPECT_PTR_EQ(test, NULL, pol->pkcs7); in ipe_parser_unsigned_test() 263 KUNIT_EXPECT_EQ(test, 0, pol->pkcs7len); in ipe_parser_unsigned_test() 265 ipe_free_policy(pol); in ipe_parser_unsigned_test() 278 struct ipe_policy *pol = NULL; in ipe_parser_widestring_test() local 281 KUNIT_EXPECT_TRUE(test, IS_ERR_OR_NULL(pol)); in ipe_parser_widestring_test() [all …]
|
| A D | eval.c | 319 struct ipe_policy *pol = NULL; in ipe_evaluate_event() local 328 pol = rcu_dereference(ipe_active_policy); in ipe_evaluate_event() 329 if (!pol) { in ipe_evaluate_event() 335 if (pol->parsed->global_default_action == IPE_ACTION_INVALID) { in ipe_evaluate_event() 339 action = pol->parsed->global_default_action; in ipe_evaluate_event() 345 rules = &pol->parsed->rules[ctx->op]; in ipe_evaluate_event() 367 action = pol->parsed->global_default_action; in ipe_evaluate_event()
|
| A D | policy.h | 92 void ipe_free_policy(struct ipe_policy *pol);
|
| /security/selinux/ss/ |
| A D | avtab.c | 339 int avtab_read_item(struct avtab *a, struct policy_file *fp, struct policydb *pol, in avtab_read_item() argument 352 unsigned int set, vers = pol->policyvers; in avtab_read_item() 440 if (!policydb_type_isvalid(pol, key.source_type) || in avtab_read_item() 441 !policydb_type_isvalid(pol, key.target_type) || in avtab_read_item() 442 !policydb_class_isvalid(pol, key.target_class)) { in avtab_read_item() 497 !policydb_type_isvalid(pol, datum.u.data)) { in avtab_read_item() 510 int avtab_read(struct avtab *a, struct policy_file *fp, struct policydb *pol) in avtab_read() argument 533 rc = avtab_read_item(a, fp, pol, avtab_insertf, NULL, false); in avtab_read()
|
| A D | avtab.h | 109 int avtab_read_item(struct avtab *a, struct policy_file *fp, struct policydb *pol, 114 int avtab_read(struct avtab *a, struct policy_file *fp, struct policydb *pol);
|
| A D | mls.c | 230 int mls_context_to_sid(struct policydb *pol, char oldc, char *scontext, in mls_context_to_sid() argument 240 if (!pol->mls_enabled) { in mls_context_to_sid() 289 levdatum = symtab_search(&pol->p_levels, sensitivity); in mls_context_to_sid() 308 catdatum = symtab_search(&pol->p_cats, cur_cat); in mls_context_to_sid() 321 rngdatum = symtab_search(&pol->p_cats, rngptr); in mls_context_to_sid()
|
| A D | services.c | 96 static int selinux_set_mapping(struct policydb *pol, in selinux_set_mapping() argument 128 p_out->value = string_to_security_class(pol, p_in->name); in selinux_set_mapping() 132 if (pol->reject_unknown) in selinux_set_mapping() 146 p_out->perms[k] = string_to_av_perm(pol, p_out->value, in selinux_set_mapping() 151 if (pol->reject_unknown) in selinux_set_mapping() 163 pol->allow_unknown ? "allowed" : "denied"); in selinux_set_mapping() 1474 static int string_to_context_struct(struct policydb *pol, in string_to_context_struct() argument 1503 usrdatum = symtab_search(&pol->p_users, scontextp); in string_to_context_struct() 1519 role = symtab_search(&pol->p_roles, scontextp); in string_to_context_struct() 1531 typdatum = symtab_search(&pol->p_types, scontextp); in string_to_context_struct() [all …]
|
Completed in 21 milliseconds