/security/apparmor/include/ |
D | match.h | 124 unsigned int aa_dfa_match_len(struct aa_dfa *dfa, unsigned int start, 126 unsigned int aa_dfa_match(struct aa_dfa *dfa, unsigned int start, 130 unsigned int aa_dfa_match_until(struct aa_dfa *dfa, unsigned int start, 132 unsigned int aa_dfa_matchn_until(struct aa_dfa *dfa, unsigned int start, 153 unsigned int aa_dfa_leftmatch(struct aa_dfa *dfa, unsigned int start,
|
D | crypto.h | 18 int aa_calc_profile_hash(struct aa_profile *profile, u32 version, void *start, 26 void *start, size_t len) in aa_calc_profile_hash() argument
|
D | policy.h | 76 unsigned int start[AA_CLASS_LAST + 1]; member 220 return profile->policy.start[class]; in PROFILE_MEDIATES() 223 profile->policy.start[0], &class, 1); in PROFILE_MEDIATES()
|
D | file.h | 176 unsigned int start; member 185 unsigned int aa_str_perms(struct aa_dfa *dfa, unsigned int start,
|
D | lib.h | 86 unsigned int start) in aa_dfa_null_transition() argument 89 return aa_dfa_next(dfa, start, 0); in aa_dfa_null_transition()
|
/security/apparmor/ |
D | match.c | 405 unsigned int aa_dfa_match_len(struct aa_dfa *dfa, unsigned int start, in aa_dfa_match_len() argument 412 unsigned int state = start; in aa_dfa_match_len() 445 unsigned int aa_dfa_match(struct aa_dfa *dfa, unsigned int start, in aa_dfa_match() argument 452 unsigned int state = start; in aa_dfa_match() 516 unsigned int aa_dfa_match_until(struct aa_dfa *dfa, unsigned int start, in aa_dfa_match_until() argument 524 unsigned int state = start, pos; in aa_dfa_match_until() 577 unsigned int aa_dfa_matchn_until(struct aa_dfa *dfa, unsigned int start, in aa_dfa_matchn_until() argument 585 unsigned int state = start, pos; in aa_dfa_matchn_until() 652 static unsigned int leftmatch_fb(struct aa_dfa *dfa, unsigned int start, in leftmatch_fb() argument 660 unsigned int state = start, pos; in leftmatch_fb() [all …]
|
D | policy_unpack.c | 70 void *start; member 111 aad(&sa)->iface.pos = e->pos - e->start; in audit_iface() 452 size_t sz = blob - (char *) e->start - in unpack_dfa() 453 ((e->pos - e->start) & 7); in unpack_dfa() 835 if (!unpack_u32(e, &profile->policy.start[0], "start")) in unpack_profile() 837 profile->policy.start[0] = DFA_START; in unpack_profile() 840 profile->policy.start[i] = in unpack_profile() 842 profile->policy.start[0], in unpack_profile() 858 if (!unpack_u32(e, &profile->file.start, "dfa_start")) in unpack_profile() 860 profile->file.start = DFA_START; in unpack_profile() [all …]
|
D | crypto.c | 61 int aa_calc_profile_hash(struct aa_profile *profile, u32 version, void *start, in aa_calc_profile_hash() argument 86 error = crypto_shash_update(desc, (u8 *) start, len); in aa_calc_profile_hash()
|
D | mount.c | 240 static int do_match_mnt(struct aa_dfa *dfa, unsigned int start, in do_match_mnt() argument 250 state = aa_dfa_match(dfa, start, mntpnt); in do_match_mnt() 346 profile->policy.start[AA_CLASS_MOUNT], in match_mnt_path_str() 574 profile->policy.start[AA_CLASS_MOUNT], in profile_umount() 640 profile->policy.start[AA_CLASS_MOUNT], in build_pivotroot()
|
D | file.c | 266 unsigned int aa_str_perms(struct aa_dfa *dfa, unsigned int start, in aa_str_perms() argument 271 state = aa_dfa_match(dfa, start, name); in aa_str_perms() 285 aa_str_perms(profile->file.dfa, profile->file.start, name, cond, perms); in __aa_path_perm() 390 state = aa_str_perms(profile->file.dfa, profile->file.start, lname, in profile_path_link() 420 aa_str_perms(profile->file.dfa, profile->file.start, tname, cond, in profile_path_link()
|
D | domain.c | 194 unsigned int start, bool subns, u32 request, in label_components_match() argument 207 state = match_component(profile, tp, stack, start); in label_components_match() 223 state = match_component(profile, tp, stack, start); in label_components_match() 288 u32 request, unsigned int start, in change_profile_perms() argument 298 return label_match(profile, target, stack, start, true, request, perms); in change_profile_perms() 626 unsigned int state = profile->file.start; in profile_transition() 748 unsigned int state = profile->file.start; in profile_onexec() 1289 profile->file.start, perms); in change_profile_perms_wrapper()
|
D | ipc.c | 201 profile->policy.start[AA_CLASS_SIGNAL], in profile_signal_perm()
|
D | lib.c | 388 profile->policy.start[AA_CLASS_LABEL], in aa_profile_match_label()
|
D | label.c | 1365 struct aa_label *label, unsigned int start, in label_components_match() argument 1378 state = match_component(profile, tp, start); in label_components_match() 1394 state = match_component(profile, tp, start); in label_components_match()
|
D | apparmorfs.c | 621 state = aa_dfa_match_len(dfa, profile->file.start, in profile_query_cb() 632 state = aa_dfa_match_len(dfa, profile->policy.start[0], in profile_query_cb() 2175 .start = p_start,
|
/security/tomoyo/ |
D | util.c | 156 char *start = param->data; in tomoyo_get_domainname() local 157 char *pos = start; in tomoyo_get_domainname() 167 if (tomoyo_correct_domain(start)) in tomoyo_get_domainname() 168 return tomoyo_get_name(start); in tomoyo_get_domainname() 435 const char *const start = string; in tomoyo_correct_word2() local 464 if (string - 3 < start || *(string - 3) != '/') in tomoyo_correct_word2()
|
D | condition.c | 259 static const struct tomoyo_path_info *tomoyo_get_dqword(char *start) in tomoyo_get_dqword() argument 261 char *cp = start + strlen(start) - 1; in tomoyo_get_dqword() 263 if (cp == start || *start++ != '"' || *cp != '"') in tomoyo_get_dqword() 266 if (*start && !tomoyo_correct_word(start)) in tomoyo_get_dqword() 268 return tomoyo_get_name(start); in tomoyo_get_dqword()
|
D | common.c | 1983 char *start = str; in tomoyo_truncate() local 1988 return strlen(start) + 1; in tomoyo_truncate() 2836 char *start = ""; in tomoyo_load_builtin_policy() local 2840 start = tomoyo_builtin_profile; in tomoyo_load_builtin_policy() 2845 start = tomoyo_builtin_exception_policy; in tomoyo_load_builtin_policy() 2850 start = tomoyo_builtin_domain_policy; in tomoyo_load_builtin_policy() 2855 start = tomoyo_builtin_manager; in tomoyo_load_builtin_policy() 2860 start = tomoyo_builtin_stat; in tomoyo_load_builtin_policy() 2866 char *end = strchr(start, '\n'); in tomoyo_load_builtin_policy() 2871 tomoyo_normalize_line(start); in tomoyo_load_builtin_policy() [all …]
|
D | Kconfig | 54 loading the variant part of policy. Since you can start using
|
/security/integrity/ima/ |
D | ima_fs.c | 191 .start = ima_measurements_start, 257 .start = ima_measurements_start, 373 .start = ima_policy_start,
|
/security/keys/ |
D | proc.c | 22 .start = proc_keys_start, 34 .start = proc_key_users_start,
|
/security/smack/ |
D | smackfs.c | 631 .start = load2_seq_start, 799 .start = cipso_seq_start, 991 .start = cipso_seq_start, 1067 .start = net4addr_seq_start, 1331 .start = net6addr_seq_start, 1895 .start = onlycap_seq_start, 2234 .start = load_self_seq_start, 2365 .start = load2_seq_start, 2442 .start = load_self2_seq_start, 2714 .start = relabel_self_seq_start,
|
/security/selinux/ |
D | Kconfig | 55 kernel will start in permissive mode (log everything, deny nothing)
|
D | selinuxfs.c | 1578 .start = sel_avc_stats_seq_start,
|