| /security/selinux/ss/ |
| A D | hashtab.c | 146 struct hashtab_node *cur, *tmp, *tail; in hashtab_duplicate() local 162 tmp = kmem_cache_zalloc(hashtab_node_cachep, in hashtab_duplicate() 164 if (!tmp) in hashtab_duplicate() 166 rc = copy(tmp, orig_cur, args); in hashtab_duplicate() 168 kmem_cache_free(hashtab_node_cachep, tmp); in hashtab_duplicate() 171 tmp->next = NULL; in hashtab_duplicate() 173 new->htable[i] = tmp; in hashtab_duplicate() 175 tail->next = tmp; in hashtab_duplicate() 176 tail = tmp; in hashtab_duplicate() 185 for (cur = new->htable[i]; cur; cur = tmp) { in hashtab_duplicate() [all …]
|
| A D | ebitmap.c | 424 struct ebitmap_node *tmp; in ebitmap_read() local 425 tmp = kmem_cache_zalloc(ebitmap_node_cachep, in ebitmap_read() 427 if (!tmp) { in ebitmap_read() 433 tmp->startbit = startbit - (startbit % EBITMAP_SIZE); in ebitmap_read() 435 n->next = tmp; in ebitmap_read() 437 e->node = tmp; in ebitmap_read() 438 n = tmp; in ebitmap_read()
|
| /security/tomoyo/ |
| A D | gc.c | 256 struct tomoyo_acl_info *tmp; in tomoyo_del_domain() local 489 struct tomoyo_acl_head *tmp; in tomoyo_collect_member() local 509 struct tomoyo_acl_info *tmp; in tomoyo_collect_acl() local 511 list_for_each_entry_safe(acl, tmp, list, list) { in tomoyo_collect_acl() 533 struct tomoyo_domain_info *tmp; in tomoyo_collect_entry() local 551 struct tomoyo_shared_acl_head *tmp; in tomoyo_collect_entry() local 565 struct tomoyo_group *tmp; in tomoyo_collect_entry() local 578 list_for_each_entry_safe(group, tmp, list, head.list) { in tomoyo_collect_entry() 593 struct tomoyo_shared_acl_head *tmp; in tomoyo_collect_entry() local 595 list_for_each_entry_safe(ptr, tmp, list, list) { in tomoyo_collect_entry() [all …]
|
| A D | domain.c | 714 ee->tmp = kzalloc(TOMOYO_EXEC_TMPSIZE, GFP_NOFS); in tomoyo_find_next_domain() 715 if (!ee->tmp) { in tomoyo_find_next_domain() 798 cp = strrchr(ee->tmp, ' '); in tomoyo_find_next_domain() 802 strscpy(ee->tmp, domainname, TOMOYO_EXEC_TMPSIZE); in tomoyo_find_next_domain() 804 snprintf(ee->tmp, TOMOYO_EXEC_TMPSIZE - 1, "%s %s", in tomoyo_find_next_domain() 817 snprintf(ee->tmp, TOMOYO_EXEC_TMPSIZE - 1, "<%s>", in tomoyo_find_next_domain() 828 snprintf(ee->tmp, TOMOYO_EXEC_TMPSIZE - 1, "%s %s", in tomoyo_find_next_domain() 850 snprintf(ee->tmp, TOMOYO_EXEC_TMPSIZE - 1, "%s %s", in tomoyo_find_next_domain() 856 domain = tomoyo_assign_domain(ee->tmp, true); in tomoyo_find_next_domain() 860 pr_warn("ERROR: Domain '%s' not ready.\n", ee->tmp); in tomoyo_find_next_domain() [all …]
|
| A D | util.c | 387 char *tmp = *src; in tomoyo_str_starts() local 389 if (strncmp(tmp, find, len)) in tomoyo_str_starts() 391 tmp += len; in tomoyo_str_starts() 392 *src = tmp; in tomoyo_str_starts()
|
| A D | common.c | 2305 struct list_head *tmp; in tomoyo_read_query() local 2315 list_for_each(tmp, &tomoyo_query_list) { in tomoyo_read_query() 2316 struct tomoyo_query *ptr = list_entry(tmp, typeof(*ptr), list); in tomoyo_read_query() 2333 list_for_each(tmp, &tomoyo_query_list) { in tomoyo_read_query() 2334 struct tomoyo_query *ptr = list_entry(tmp, typeof(*ptr), list); in tomoyo_read_query() 2367 struct list_head *tmp; in tomoyo_write_answer() local 2372 list_for_each(tmp, &tomoyo_query_list) { in tomoyo_write_answer() 2373 struct tomoyo_query *ptr = list_entry(tmp, typeof(*ptr), list); in tomoyo_write_answer() 2381 list_for_each(tmp, &tomoyo_query_list) { in tomoyo_write_answer() 2382 struct tomoyo_query *ptr = list_entry(tmp, typeof(*ptr), list); in tomoyo_write_answer()
|
| A D | common.h | 629 char *tmp; /* Size is TOMOYO_EXEC_TMPSIZE bytes */ member
|
| A D | condition.c | 111 char *arg_ptr = ee->tmp; in tomoyo_scan_bprm()
|
| /security/selinux/ |
| A D | netlink.c | 70 sk_buff_data_t tmp; in selnl_notify() local 80 tmp = skb->tail; in selnl_notify() 85 nlh->nlmsg_len = skb->tail - tmp; in selnl_notify()
|
| A D | avc.c | 236 struct avc_xperms_decision_node *xpd_node, *tmp; in avc_xperms_free() local 241 list_for_each_entry_safe(xpd_node, tmp, &xp_node->xpd_head, xpd_list) { in avc_xperms_free()
|
| /security/apparmor/ |
| A D | policy_unpack.c | 399 const char *tmp; in aa_unpack_strdup() local 620 u32 tmp = 0; in unpack_rlimits() local 623 rules->rlimits.mask = tmp; in unpack_rlimits() 856 u32 tmp; in unpack_profile() local 910 profile->attach.xmatch_len = tmp; in unpack_profile() 937 if (!aa_unpack_u32(e, &tmp, NULL)) in unpack_profile() 939 if (tmp & PACKED_FLAG_HAT) in unpack_profile() 941 if (tmp & PACKED_FLAG_DEBUG1) in unpack_profile() 943 if (tmp & PACKED_FLAG_DEBUG2) in unpack_profile() 963 if (tmp) in unpack_profile() [all …]
|
| A D | policy.c | 213 struct aa_profile *profile, *tmp; in __aa_profile_list_release() local 975 struct aa_profile *child, *tmp; in __replace_profile() local 1094 struct aa_load_ent *ent, *tmp; in aa_replace_profiles() local 1150 struct aa_loaddata *tmp; in aa_replace_profiles() local 1152 tmp = __aa_get_loaddata(rawdata_ent); in aa_replace_profiles() 1154 if (tmp) { in aa_replace_profiles() 1156 udata = tmp; in aa_replace_profiles() 1255 list_for_each_entry_safe(ent, tmp, &lh, list) { in aa_replace_profiles() 1318 list_for_each_entry(tmp, &lh, list) { in aa_replace_profiles() 1319 if (tmp == ent) { in aa_replace_profiles() [all …]
|
| A D | label.c | 75 struct aa_label *tmp; in __aa_proxy_redirect() local 85 aa_put_label(tmp); in __aa_proxy_redirect() 295 aa_put_profile(tmp); in aa_vec_unique() 306 vec[pos] = tmp; in aa_vec_unique() 1355 struct aa_perms tmp; in label_components_match() local 1374 aa_perms_accum(perms, &tmp); in label_components_match() 1383 aa_perms_accum(perms, &tmp); in label_components_match() 2026 struct aa_label *new, *tmp; in __label_update() local 2061 AA_BUG(tmp == label); in __label_update() 2076 __label_remove(label, tmp); in __label_update() [all …]
|
| A D | capability.c | 207 aa_state_t tmp; in aa_profile_capget() local 209 tmp = aa_dfa_next(rules->policy->dfa, state, i); in aa_profile_capget() 210 perms = *aa_lookup_perms(rules->policy, tmp); in aa_profile_capget()
|
| A D | task.c | 65 struct aa_label *tmp = ctx->nnp; in aa_replace_current_label() local 67 ctx->nnp = aa_get_newest_label(tmp); in aa_replace_current_label() 68 aa_put_label(tmp); in aa_replace_current_label()
|
| A D | policy_ns.c | 350 struct aa_ns *ns, *tmp; in __ns_list_release() local 352 list_for_each_entry_safe(ns, tmp, head, base.list) in __ns_list_release()
|
| A D | domain.c | 198 struct aa_perms tmp; in label_components_match() local 216 tmp = *(aa_lookup_condperms(current_fsuid(), rules->file, state, in label_components_match() 218 aa_apply_modes_to_perms(profile, &tmp); in label_components_match() 219 aa_perms_accum(perms, &tmp); in label_components_match() 226 tmp = *(aa_lookup_condperms(current_fsuid(), rules->file, state, in label_components_match() 228 aa_apply_modes_to_perms(profile, &tmp); in label_components_match() 229 aa_perms_accum(perms, &tmp); in label_components_match()
|
| A D | apparmorfs.c | 616 struct aa_perms tmp = { }; in profile_query_cb() local 628 tmp = *(aa_lookup_condperms(current_fsuid(), in profile_query_cb() 646 tmp = *aa_lookup_perms(rules->policy, state); in profile_query_cb() 648 aa_apply_modes_to_perms(profile, &tmp); in profile_query_cb() 649 aa_perms_accum_raw(perms, &tmp); in profile_query_cb() 1908 struct aa_loaddata *ent, *tmp; in __aa_fs_list_remove_rawdata() local 1912 list_for_each_entry_safe(ent, tmp, &ns->rawdata_list, list) in __aa_fs_list_remove_rawdata()
|
| /security/ |
| A D | device_cgroup.c | 64 struct dev_exception_item *ex, *tmp, *new; in dev_exceptions_copy() local 78 list_for_each_entry_safe(ex, tmp, dest, list) { in dev_exceptions_copy() 87 struct dev_exception_item *ex, *tmp; in dev_exceptions_move() local 91 list_for_each_entry_safe(ex, tmp, orig, list) { in dev_exceptions_move() 134 struct dev_exception_item *walk, *tmp; in dev_exception_rm() local 138 list_for_each_entry_safe(walk, tmp, &dev_cgroup->exceptions, list) { in dev_exception_rm() 156 struct dev_exception_item *ex, *tmp; in __dev_exception_clean() local 158 list_for_each_entry_safe(ex, tmp, &dev_cgroup->exceptions, list) { in __dev_exception_clean() 532 struct list_head *this, *tmp; in revalidate_active_exceptions() local 534 list_for_each_safe(this, tmp, &devcg->exceptions) { in revalidate_active_exceptions()
|
| /security/integrity/evm/ |
| A D | evm_secfs.c | 183 struct xattr_list *xattr, *tmp; in evm_write_xattrs() local 252 list_for_each_entry(tmp, &evm_config_xattrnames, list) { in evm_write_xattrs() 253 if (strcmp(xattr->name, tmp->name) == 0) { in evm_write_xattrs() 255 if (!tmp->enabled) { in evm_write_xattrs() 256 tmp->enabled = true; in evm_write_xattrs()
|
| /security/apparmor/include/ |
| A D | policy_unpack.h | 151 struct aa_loaddata *tmp = __aa_get_loaddata(data); in aa_get_loaddata() local 153 AA_BUG(data && !tmp); in aa_get_loaddata() 155 return tmp; in aa_get_loaddata()
|
| A D | label.h | 409 struct aa_label *tmp; in aa_get_newest_label() local 417 tmp = aa_get_label_rcu(&l->proxy->label); in aa_get_newest_label() 418 AA_BUG(!tmp); in aa_get_newest_label() 420 return tmp; in aa_get_newest_label()
|
| /security/integrity/ima/ |
| A D | ima_queue_keys.c | 135 struct ima_key_entry *entry, *tmp; in ima_process_queued_keys() local 160 list_for_each_entry_safe(entry, tmp, &ima_keys, list) { in ima_process_queued_keys()
|
| /security/loadpin/ |
| A D | loadpin.c | 369 struct dm_verity_loadpin_trusted_root_digest *trd, *tmp; in read_trusted_verity_root_digests() local 371 list_for_each_entry_safe(trd, tmp, &dm_verity_loadpin_trusted_root_digests, node) { in read_trusted_verity_root_digests()
|
| /security/safesetid/ |
| A D | securityfs.c | 76 struct hlist_node *tmp; in __release_ruleset() local 78 hash_for_each_safe(pol->rules, bucket, tmp, rule, next) in __release_ruleset()
|