Home
last modified time | relevance | path

Searched refs:start (Results 1 – 24 of 24) sorted by relevance

/security/apparmor/include/
Dmatch.h124 unsigned int aa_dfa_match_len(struct aa_dfa *dfa, unsigned int start,
126 unsigned int aa_dfa_match(struct aa_dfa *dfa, unsigned int start,
130 unsigned int aa_dfa_match_until(struct aa_dfa *dfa, unsigned int start,
132 unsigned int aa_dfa_matchn_until(struct aa_dfa *dfa, unsigned int start,
153 unsigned int aa_dfa_leftmatch(struct aa_dfa *dfa, unsigned int start,
Dcrypto.h18 int aa_calc_profile_hash(struct aa_profile *profile, u32 version, void *start,
26 void *start, size_t len) in aa_calc_profile_hash() argument
Dpolicy.h76 unsigned int start[AA_CLASS_LAST + 1]; member
220 return profile->policy.start[class]; in PROFILE_MEDIATES()
223 profile->policy.start[0], &class, 1); in PROFILE_MEDIATES()
Dfile.h176 unsigned int start; member
185 unsigned int aa_str_perms(struct aa_dfa *dfa, unsigned int start,
Dlib.h86 unsigned int start) in aa_dfa_null_transition() argument
89 return aa_dfa_next(dfa, start, 0); in aa_dfa_null_transition()
/security/apparmor/
Dmatch.c405 unsigned int aa_dfa_match_len(struct aa_dfa *dfa, unsigned int start, in aa_dfa_match_len() argument
412 unsigned int state = start; in aa_dfa_match_len()
445 unsigned int aa_dfa_match(struct aa_dfa *dfa, unsigned int start, in aa_dfa_match() argument
452 unsigned int state = start; in aa_dfa_match()
516 unsigned int aa_dfa_match_until(struct aa_dfa *dfa, unsigned int start, in aa_dfa_match_until() argument
524 unsigned int state = start, pos; in aa_dfa_match_until()
577 unsigned int aa_dfa_matchn_until(struct aa_dfa *dfa, unsigned int start, in aa_dfa_matchn_until() argument
585 unsigned int state = start, pos; in aa_dfa_matchn_until()
652 static unsigned int leftmatch_fb(struct aa_dfa *dfa, unsigned int start, in leftmatch_fb() argument
660 unsigned int state = start, pos; in leftmatch_fb()
[all …]
Dpolicy_unpack.c70 void *start; member
111 aad(&sa)->iface.pos = e->pos - e->start; in audit_iface()
452 size_t sz = blob - (char *) e->start - in unpack_dfa()
453 ((e->pos - e->start) & 7); in unpack_dfa()
835 if (!unpack_u32(e, &profile->policy.start[0], "start")) in unpack_profile()
837 profile->policy.start[0] = DFA_START; in unpack_profile()
840 profile->policy.start[i] = in unpack_profile()
842 profile->policy.start[0], in unpack_profile()
858 if (!unpack_u32(e, &profile->file.start, "dfa_start")) in unpack_profile()
860 profile->file.start = DFA_START; in unpack_profile()
[all …]
Dcrypto.c61 int aa_calc_profile_hash(struct aa_profile *profile, u32 version, void *start, in aa_calc_profile_hash() argument
86 error = crypto_shash_update(desc, (u8 *) start, len); in aa_calc_profile_hash()
Dmount.c240 static int do_match_mnt(struct aa_dfa *dfa, unsigned int start, in do_match_mnt() argument
250 state = aa_dfa_match(dfa, start, mntpnt); in do_match_mnt()
346 profile->policy.start[AA_CLASS_MOUNT], in match_mnt_path_str()
574 profile->policy.start[AA_CLASS_MOUNT], in profile_umount()
640 profile->policy.start[AA_CLASS_MOUNT], in build_pivotroot()
Dfile.c266 unsigned int aa_str_perms(struct aa_dfa *dfa, unsigned int start, in aa_str_perms() argument
271 state = aa_dfa_match(dfa, start, name); in aa_str_perms()
285 aa_str_perms(profile->file.dfa, profile->file.start, name, cond, perms); in __aa_path_perm()
390 state = aa_str_perms(profile->file.dfa, profile->file.start, lname, in profile_path_link()
420 aa_str_perms(profile->file.dfa, profile->file.start, tname, cond, in profile_path_link()
Ddomain.c194 unsigned int start, bool subns, u32 request, in label_components_match() argument
207 state = match_component(profile, tp, stack, start); in label_components_match()
223 state = match_component(profile, tp, stack, start); in label_components_match()
288 u32 request, unsigned int start, in change_profile_perms() argument
298 return label_match(profile, target, stack, start, true, request, perms); in change_profile_perms()
626 unsigned int state = profile->file.start; in profile_transition()
748 unsigned int state = profile->file.start; in profile_onexec()
1289 profile->file.start, perms); in change_profile_perms_wrapper()
Dipc.c201 profile->policy.start[AA_CLASS_SIGNAL], in profile_signal_perm()
Dlib.c388 profile->policy.start[AA_CLASS_LABEL], in aa_profile_match_label()
Dlabel.c1365 struct aa_label *label, unsigned int start, in label_components_match() argument
1378 state = match_component(profile, tp, start); in label_components_match()
1394 state = match_component(profile, tp, start); in label_components_match()
Dapparmorfs.c621 state = aa_dfa_match_len(dfa, profile->file.start, in profile_query_cb()
632 state = aa_dfa_match_len(dfa, profile->policy.start[0], in profile_query_cb()
2175 .start = p_start,
/security/tomoyo/
Dutil.c156 char *start = param->data; in tomoyo_get_domainname() local
157 char *pos = start; in tomoyo_get_domainname()
167 if (tomoyo_correct_domain(start)) in tomoyo_get_domainname()
168 return tomoyo_get_name(start); in tomoyo_get_domainname()
435 const char *const start = string; in tomoyo_correct_word2() local
464 if (string - 3 < start || *(string - 3) != '/') in tomoyo_correct_word2()
Dcondition.c259 static const struct tomoyo_path_info *tomoyo_get_dqword(char *start) in tomoyo_get_dqword() argument
261 char *cp = start + strlen(start) - 1; in tomoyo_get_dqword()
263 if (cp == start || *start++ != '"' || *cp != '"') in tomoyo_get_dqword()
266 if (*start && !tomoyo_correct_word(start)) in tomoyo_get_dqword()
268 return tomoyo_get_name(start); in tomoyo_get_dqword()
Dcommon.c1983 char *start = str; in tomoyo_truncate() local
1988 return strlen(start) + 1; in tomoyo_truncate()
2836 char *start = ""; in tomoyo_load_builtin_policy() local
2840 start = tomoyo_builtin_profile; in tomoyo_load_builtin_policy()
2845 start = tomoyo_builtin_exception_policy; in tomoyo_load_builtin_policy()
2850 start = tomoyo_builtin_domain_policy; in tomoyo_load_builtin_policy()
2855 start = tomoyo_builtin_manager; in tomoyo_load_builtin_policy()
2860 start = tomoyo_builtin_stat; in tomoyo_load_builtin_policy()
2866 char *end = strchr(start, '\n'); in tomoyo_load_builtin_policy()
2871 tomoyo_normalize_line(start); in tomoyo_load_builtin_policy()
[all …]
DKconfig54 loading the variant part of policy. Since you can start using
/security/integrity/ima/
Dima_fs.c191 .start = ima_measurements_start,
257 .start = ima_measurements_start,
373 .start = ima_policy_start,
/security/keys/
Dproc.c22 .start = proc_keys_start,
34 .start = proc_key_users_start,
/security/smack/
Dsmackfs.c631 .start = load2_seq_start,
799 .start = cipso_seq_start,
991 .start = cipso_seq_start,
1067 .start = net4addr_seq_start,
1331 .start = net6addr_seq_start,
1895 .start = onlycap_seq_start,
2234 .start = load_self_seq_start,
2365 .start = load2_seq_start,
2442 .start = load_self2_seq_start,
2714 .start = relabel_self_seq_start,
/security/selinux/
DKconfig55 kernel will start in permissive mode (log everything, deny nothing)
Dselinuxfs.c1578 .start = sel_avc_stats_seq_start,