Lines Matching refs:entry
87 struct netlbl_dom_map *entry = kzalloc(sizeof(*entry), GFP_KERNEL);
89 if (!entry)
91 entry->def.type = nla_get_u32(info->attrs[NLBL_MGMT_A_PROTOCOL]);
94 entry->domain = kmalloc(tmp_size, GFP_KERNEL);
95 if (entry->domain == NULL) {
99 nla_strlcpy(entry->domain,
103 /* NOTE: internally we allow/use a entry->def.type value of
108 switch (entry->def.type) {
111 entry->family =
114 entry->family = AF_UNSPEC;
124 entry->family = AF_INET;
125 entry->def.cipso = cipsov4;
136 entry->family = AF_INET6;
137 entry->def.calipso = calipso;
144 if ((entry->family == AF_INET && info->attrs[NLBL_MGMT_A_IPV6ADDR]) ||
145 (entry->family == AF_INET6 && info->attrs[NLBL_MGMT_A_IPV4ADDR]))
183 map->def.type = entry->def.type;
191 entry->family = AF_INET;
192 entry->def.type = NETLBL_NLTYPE_ADDRSELECT;
193 entry->def.addrsel = addrmap;
234 map->def.type = entry->def.type;
242 entry->family = AF_INET6;
243 entry->def.type = NETLBL_NLTYPE_ADDRSELECT;
244 entry->def.addrsel = addrmap;
248 ret_val = netlbl_domhsh_add(entry, audit_info);
264 kfree(entry->domain);
266 kfree(entry);
271 * netlbl_mgmt_listentry - List a NetLabel/LSM domain map entry
273 * @entry: the map entry
282 struct netlbl_dom_map *entry)
292 if (entry->domain != NULL) {
294 NLBL_MGMT_A_DOMAIN, entry->domain);
299 ret_val = nla_put_u16(skb, NLBL_MGMT_A_FAMILY, entry->family);
303 switch (entry->def.type) {
309 netlbl_af4list_foreach_rcu(iter4, &entry->def.addrsel->list4) {
345 netlbl_af6list_foreach_rcu(iter6, &entry->def.addrsel->list6) {
384 entry->def.type);
388 entry->def.type);
392 entry->def.cipso->doi);
396 entry->def.type);
400 entry->def.calipso->doi);
469 * @entry: the domain mapping hash table entry
479 static int netlbl_mgmt_listall_cb(struct netlbl_dom_map *entry, void *arg)
491 ret_val = netlbl_mgmt_listentry(cb_arg->skb, entry);
601 struct netlbl_dom_map *entry;
618 entry = netlbl_domhsh_getentry(NULL, family);
619 if (entry == NULL) {
623 ret_val = netlbl_mgmt_listentry(ans_skb, entry);