/security/apparmor/include/ |
D | file.h | 105 u16 index = 0; in dfa_map_xindex() local 108 index |= AA_X_UNSAFE; in dfa_map_xindex() 110 index |= AA_X_INHERIT; in dfa_map_xindex() 112 index |= AA_X_UNCONFINED; in dfa_map_xindex() 115 index |= AA_X_UNCONFINED; in dfa_map_xindex() 117 index |= AA_X_NAME; in dfa_map_xindex() 119 index |= AA_X_NAME | AA_X_CHILD; in dfa_map_xindex() 121 index |= AA_X_TABLE; in dfa_map_xindex() 122 index |= old_index - 4; in dfa_map_xindex() 125 return index; in dfa_map_xindex()
|
/security/selinux/ss/ |
D | ebitmap.h | 84 unsigned int index = EBITMAP_NODE_INDEX(n, bit); in ebitmap_node_get_bit() local 87 BUG_ON(index >= EBITMAP_UNIT_NUMS); in ebitmap_node_get_bit() 88 if ((n->maps[index] & (EBITMAP_BIT << ofs))) in ebitmap_node_get_bit() 96 unsigned int index = EBITMAP_NODE_INDEX(n, bit); in ebitmap_node_set_bit() local 99 BUG_ON(index >= EBITMAP_UNIT_NUMS); in ebitmap_node_set_bit() 100 n->maps[index] |= (EBITMAP_BIT << ofs); in ebitmap_node_set_bit() 106 unsigned int index = EBITMAP_NODE_INDEX(n, bit); in ebitmap_node_clr_bit() local 109 BUG_ON(index >= EBITMAP_UNIT_NUMS); in ebitmap_node_clr_bit() 110 n->maps[index] &= ~(EBITMAP_BIT << ofs); in ebitmap_node_clr_bit()
|
D | ebitmap.c | 353 u32 mapunit, count, startbit, index; in ebitmap_read() local 435 index = (startbit - n->startbit) / EBITMAP_UNIT_SIZE; in ebitmap_read() 437 n->maps[index++] = map & (-1UL); in ebitmap_read()
|
D | services.c | 474 int index; in security_dump_masked_av() local 514 for (index = 0; index < 32; index++) { in security_dump_masked_av() 515 u32 mask = (1 << index); in security_dump_masked_av() 522 permission_names[index] in security_dump_masked_av() 523 ? permission_names[index] : "????"); in security_dump_masked_av() 859 int index; in security_bounded_transition() local 885 index = new_context->type; in security_bounded_transition() 888 index - 1); in security_bounded_transition() 901 index = type->bounds; in security_bounded_transition()
|
/security/tomoyo/ |
D | condition.c | 24 static bool tomoyo_argv(const unsigned int index, const char *arg_ptr, in tomoyo_argv() argument 33 if (index != argv->index) in tomoyo_argv() 290 if (tomoyo_parse_ulong(&argv->index, &left) != in tomoyo_parse_argv() 812 const u8 index = j ? right : left; in tomoyo_condition() local 814 switch (index) { in tomoyo_condition() 925 switch (index) { in tomoyo_condition() 968 switch (index) { in tomoyo_condition() 1019 switch (index) { in tomoyo_condition()
|
D | util.c | 973 const u8 index) in tomoyo_get_mode() argument 981 mode = p->config[index]; in tomoyo_get_mode() 983 mode = p->config[tomoyo_index2category[index] in tomoyo_get_mode() 1000 struct tomoyo_domain_info *domain, const u8 index) in tomoyo_init_request_info() argument 1009 r->type = index; in tomoyo_init_request_info() 1010 r->mode = tomoyo_get_mode(domain->ns, profile, index); in tomoyo_init_request_info()
|
D | common.c | 730 u8 index; in tomoyo_read_profile() local 737 index = head->r.index; in tomoyo_read_profile() 738 profile = ns->profile_ptr[index]; in tomoyo_read_profile() 747 for ( ; head->r.index < TOMOYO_MAX_PROFILES; in tomoyo_read_profile() 748 head->r.index++) in tomoyo_read_profile() 749 if (ns->profile_ptr[head->r.index]) in tomoyo_read_profile() 751 if (head->r.index == TOMOYO_MAX_PROFILES) { in tomoyo_read_profile() 763 tomoyo_io_printf(head, "%u-COMMENT=", index); in tomoyo_read_profile() 767 tomoyo_io_printf(head, "%u-PREFERENCE={ ", index); in tomoyo_read_profile() 779 tomoyo_io_printf(head, "%u-%s", index, "CONFIG"); in tomoyo_read_profile() [all …]
|
D | common.h | 604 unsigned long index; member 804 u16 index; member 967 const u8 index); 970 const u8 index); 1030 const u8 index); 1054 void tomoyo_update_stat(const u8 index);
|
D | audit.c | 324 const u8 profile, const u8 index, in tomoyo_get_audit() argument 329 const u8 category = tomoyo_index2category[index] + in tomoyo_get_audit() 340 mode = p->config[index]; in tomoyo_get_audit()
|
/security/selinux/ |
D | selinuxfs.c | 1045 unsigned index = file_inode(filep)->i_ino & SEL_INO_MASK; in sel_read_bool() local 1051 if (index >= bool_num || strcmp(name, bool_pending_names[index])) in sel_read_bool() 1059 cur_enforcing = security_get_bool_value(index); in sel_read_bool() 1065 bool_pending_values[index]); in sel_read_bool() 1079 unsigned index = file_inode(filep)->i_ino & SEL_INO_MASK; in sel_write_bool() local 1089 if (index >= bool_num || strcmp(name, bool_pending_names[index])) in sel_write_bool() 1117 bool_pending_values[index] = new_value; in sel_write_bool() 1633 static int sel_make_class_dir_entries(char *classname, int index, in sel_make_class_dir_entries() argument 1649 inode->i_ino = sel_class_to_ino(index); in sel_make_class_dir_entries() 1656 rc = sel_make_perm_files(classname, index, dentry); in sel_make_class_dir_entries()
|
/security/apparmor/ |
D | policy_unpack.c | 652 int index, xtype; in verify_xindex() local 654 index = xindex & AA_X_INDEX_MASK; in verify_xindex() 655 if (xtype == AA_X_TABLE && index > table_size) in verify_xindex()
|
D | domain.c | 250 int index = xindex & AA_X_INDEX_MASK; in x_table_lookup() local 254 for (name = profile->file.trans.table[index]; !new_profile && name; in x_table_lookup()
|
/security/integrity/ima/ |
D | Kconfig | 37 IMA_MEASURE_PCR_IDX determines the TPM PCR register index
|
/security/keys/ |
D | keyring.c | 28 #define rcu_deref_link_locked(klist, index, keyring) \ argument 30 (klist)->keys[index], \
|
/security/smack/ |
D | smackfs.c | 541 if (s->index == 0) in smk_seq_start() 551 if (s->index == 0) in smk_seq_start()
|