Home
last modified time | relevance | path

Searched refs:sp (Results 1 – 7 of 7) sorted by relevance

/security/selinux/ss/
A Dconditional.c39 sp++; in cond_evaluate_expr()
45 s[sp] = !s[sp]; in cond_evaluate_expr()
50 sp--; in cond_evaluate_expr()
51 s[sp] |= s[sp + 1]; in cond_evaluate_expr()
56 sp--; in cond_evaluate_expr()
57 s[sp] &= s[sp + 1]; in cond_evaluate_expr()
62 sp--; in cond_evaluate_expr()
63 s[sp] ^= s[sp + 1]; in cond_evaluate_expr()
68 sp--; in cond_evaluate_expr()
69 s[sp] = (s[sp] == s[sp + 1]); in cond_evaluate_expr()
[all …]
A Dservices.c277 int sp = -1; in constraint_expr_eval() local
282 BUG_ON(sp < 0); in constraint_expr_eval()
283 s[sp] = !s[sp]; in constraint_expr_eval()
286 BUG_ON(sp < 1); in constraint_expr_eval()
287 sp--; in constraint_expr_eval()
288 s[sp] &= s[sp + 1]; in constraint_expr_eval()
291 BUG_ON(sp < 1); in constraint_expr_eval()
292 sp--; in constraint_expr_eval()
293 s[sp] |= s[sp + 1]; in constraint_expr_eval()
384 s[++sp] = (val1 == val2); in constraint_expr_eval()
[all …]
/security/selinux/
A Dxfrm.c225 struct sec_path *sp = skb_sec_path(skb); in selinux_xfrm_skb_sid_ingress() local
227 if (sp) { in selinux_xfrm_skb_sid_ingress()
230 for (i = sp->len - 1; i >= 0; i--) { in selinux_xfrm_skb_sid_ingress()
231 struct xfrm_state *x = sp->xvec[i]; in selinux_xfrm_skb_sid_ingress()
403 struct sec_path *sp = skb_sec_path(skb); in selinux_xfrm_sock_rcv_skb() local
406 if (sp) { in selinux_xfrm_sock_rcv_skb()
407 for (i = 0; i < sp->len; i++) { in selinux_xfrm_sock_rcv_skb()
408 struct xfrm_state *x = sp->xvec[i]; in selinux_xfrm_sock_rcv_skb()
/security/tomoyo/
A Dutil.c408 unsigned char *sp = buffer; in tomoyo_normalize_line() local
412 while (tomoyo_invalid(*sp)) in tomoyo_normalize_line()
413 sp++; in tomoyo_normalize_line()
414 while (*sp) { in tomoyo_normalize_line()
418 while (tomoyo_valid(*sp)) in tomoyo_normalize_line()
419 *dp++ = *sp++; in tomoyo_normalize_line()
420 while (tomoyo_invalid(*sp)) in tomoyo_normalize_line()
421 sp++; in tomoyo_normalize_line()
/security/keys/
A Dkeyring.c676 int sp = 0, slot; in search_nested_keyrings() local
801 stack[sp].keyring = keyring; in search_nested_keyrings()
802 stack[sp].node = node; in search_nested_keyrings()
803 stack[sp].slot = slot; in search_nested_keyrings()
804 sp++; in search_nested_keyrings()
841 if (sp <= 0) { in search_nested_keyrings()
847 sp--; in search_nested_keyrings()
848 keyring = stack[sp].keyring; in search_nested_keyrings()
849 node = stack[sp].node; in search_nested_keyrings()
850 slot = stack[sp].slot + 1; in search_nested_keyrings()
[all …]
/security/smack/
A Dsmackfs.c216 struct smack_rule *sp; in smk_set_access() local
227 if (sp->smk_object == srp->smk_object && in smk_set_access()
228 sp->smk_subject == srp->smk_subject) { in smk_set_access()
230 sp->smk_access |= srp->smk_access1; in smk_set_access()
231 sp->smk_access &= ~srp->smk_access2; in smk_set_access()
238 if (sp == NULL) { in smk_set_access()
243 sp->smk_subject = srp->smk_subject; in smk_set_access()
244 sp->smk_object = srp->smk_object; in smk_set_access()
247 list_add_rcu(&sp->list, rule_list); in smk_set_access()
2511 struct smack_rule *sp; in smk_write_revoke_subj() local
[all …]
A Dsmack_lsm.c793 if (sp->smk_flags & SMK_SB_INITIALIZED) in smack_set_mnt_opts()
806 sp->smk_root = skp; in smack_set_mnt_opts()
807 sp->smk_default = skp; in smack_set_mnt_opts()
817 sp->smk_flags |= SMK_SB_UNTRUSTED; in smack_set_mnt_opts()
821 sp->smk_flags |= SMK_SB_INITIALIZED; in smack_set_mnt_opts()
828 sp->smk_default = skp; in smack_set_mnt_opts()
834 sp->smk_floor = skp; in smack_set_mnt_opts()
840 sp->smk_hat = skp; in smack_set_mnt_opts()
846 sp->smk_root = skp; in smack_set_mnt_opts()
852 sp->smk_root = skp; in smack_set_mnt_opts()
[all …]

Completed in 29 milliseconds