Searched refs:ebitmap_get_bit (Results 1 – 4 of 4) sorted by relevance
/linux-4.4.14/security/selinux/ss/ |
D | services.c | 320 s[++sp] = ebitmap_get_bit(&r1->dominates, in constraint_expr_eval() 324 s[++sp] = ebitmap_get_bit(&r2->dominates, in constraint_expr_eval() 328 s[++sp] = (!ebitmap_get_bit(&r1->dominates, in constraint_expr_eval() 330 !ebitmap_get_bit(&r2->dominates, in constraint_expr_eval() 426 s[++sp] = ebitmap_get_bit(&e->names, val1 - 1); in constraint_expr_eval() 429 s[++sp] = !ebitmap_get_bit(&e->names, val1 - 1); in constraint_expr_eval() 1107 if (ebitmap_get_bit(&policydb.permissive_map, scontext->type)) in security_compute_av() 1153 if (ebitmap_get_bit(&policydb.permissive_map, scontext->type)) in security_compute_av_user() 1555 if (!ebitmap_get_bit(&p->filename_trans_ttypes, ttype)) in filename_compute_type() 1993 selinux_policycap_netpeer = ebitmap_get_bit(&policydb.policycaps, in security_load_policycaps() [all …]
|
D | ebitmap.h | 127 int ebitmap_get_bit(struct ebitmap *e, unsigned long bit);
|
D | ebitmap.c | 239 int ebitmap_get_bit(struct ebitmap *e, unsigned long bit) in ebitmap_get_bit() function
|
D | policydb.c | 967 if (!ebitmap_get_bit(&role->types, c->type - 1)) in policydb_context_isvalid() 978 if (!ebitmap_get_bit(&usrdatum->roles, c->role - 1)) in policydb_context_isvalid() 1697 if (ebitmap_get_bit(&upper->roles, bit)) in user_bounds_sanity_check() 1734 if (ebitmap_get_bit(&upper->types, bit)) in role_bounds_sanity_check()
|