| /security/apparmor/ |
| A D | policy_compat.c | 58 #define dfa_user_xindex(dfa, state) \ argument 64 #define dfa_other_xbits(dfa, state) \ argument 67 #define dfa_other_quiet(dfa, state) \ argument 101 aa_state_t state) in compute_fperms_allow() 113 aa_state_t state) in compute_fperms_user() 128 aa_state_t state) in compute_fperms_other() 153 aa_state_t state; in compute_fperms() local 178 int state; in compute_xmatch_perms() local 211 aa_state_t state, in compute_perms_entry() 252 unsigned int state; in compute_perms() local [all …]
|
| A D | match.c | 420 #define match_char(state, def, base, next, check, C) \ argument 457 aa_state_t state = start; in aa_dfa_match_len() local 496 aa_state_t state = start; in aa_dfa_match() local 528 aa_state_t aa_dfa_next(struct aa_dfa *dfa, aa_state_t state, const char c) in aa_dfa_next() 546 aa_state_t aa_dfa_outofband_transition(struct aa_dfa *dfa, aa_state_t state) in aa_dfa_outofband_transition() 584 aa_state_t state = start, pos; in aa_dfa_match_until() local 645 aa_state_t state = start, pos; in aa_dfa_matchn_until() local 692 static bool is_loop(struct match_workbuf *wb, aa_state_t state, in is_loop() 721 aa_state_t state = start, pos; in leftmatch_fb() local
|
| A D | af_unix.c | 69 static aa_state_t match_addr(struct aa_dfa *dfa, aa_state_t state, in match_addr() 85 aa_state_t state, u32 request, in match_to_local() 123 aa_state_t state, u32 request, in match_to_sk() 173 struct aa_ruleset *rule, aa_state_t state, in match_label() 206 aa_state_t state; in profile_create_perm() local 231 aa_state_t state; in profile_sk_perm() local 259 aa_state_t state; in profile_bind_perm() local 290 aa_state_t state; in profile_listen_perm() local 327 aa_state_t state; in profile_accept_perm() local 357 aa_state_t state; in profile_opt_perm() local [all …]
|
| A D | net.c | 166 aa_state_t state, u32 request, in aa_do_perms() 189 aa_state_t state, u32 request) in early_match() 199 static aa_state_t aa_dfa_match_be16(struct aa_dfa *dfa, aa_state_t state, in aa_dfa_match_be16() 224 aa_state_t aa_match_to_prot(struct aa_policydb *policy, aa_state_t state, in aa_match_to_prot() 256 aa_state_t state; in aa_profile_af_perm() local
|
| A D | domain.c | 94 bool stack, aa_state_t state) in match_component() 130 aa_state_t state, bool subns, u32 request, in label_compound_match() 200 aa_state_t state = 0; in label_components_match() local 255 bool stack, aa_state_t state, bool subns, u32 request, in label_match() 312 struct aa_profile *profile, aa_state_t state) in aa_xattrs_match() 422 aa_state_t state; in find_attach() local 669 aa_state_t state = rules->file->start[AA_CLASS_FILE]; in profile_transition() local 799 aa_state_t state = rules->file->start[AA_CLASS_FILE]; in profile_onexec() local
|
| A D | capability.c | 125 aa_state_t state; in profile_capable() local 197 aa_state_t state; in aa_profile_capget() local
|
| A D | mount.c | 199 static aa_state_t match_mnt_flags(struct aa_dfa *dfa, aa_state_t state, in match_mnt_flags() 231 aa_state_t state; in do_match_mnt() local 608 aa_state_t state; in profile_umount() local 672 aa_state_t state; in build_pivotroot() local
|
| A D | ipc.c | 85 aa_state_t state; in profile_signal_perm() local
|
| A D | file.c | 183 aa_state_t state, struct path_cond *cond) in aa_lookup_condperms() 213 aa_state_t state; in aa_str_perms() local 330 aa_state_t state; in profile_path_link() local
|
| A D | task.c | 327 aa_state_t state; in aa_profile_ns_perm() local
|
| A D | label.c | 1256 aa_state_t state) in match_component() 1290 aa_state_t state, bool subns, u32 request, in label_compound_match() 1356 aa_state_t state = 0; in label_components_match() local 1409 struct aa_label *label, aa_state_t state, bool subns, in aa_label_match()
|
| A D | lib.c | 392 aa_state_t state; in aa_profile_match_label() local
|
| A D | lsm.c | 631 unsigned int state; in profile_uring() local 2357 const struct nf_hook_state *state) in apparmor_ip_postroute()
|
| A D | apparmorfs.c | 617 aa_state_t state = DFA_NOMATCH; in profile_query_cb() local
|
| /security/smack/ |
| A D | smack_netfilter.c | 23 const struct nf_hook_state *state) in smack_ip_output()
|
| /security/keys/ |
| A D | gc.c | 140 short state = key->state; in key_gc_unused_keys() local
|
| A D | proc.c | 161 short state; in proc_keys_show() local
|
| A D | keyring.c | 579 short state = READ_ONCE(key->state); in keyring_search_iterator() local
|
| /security/lockdown/ |
| A D | lockdown.c | 125 char *state; in lockdown_write() local
|
| /security/apparmor/include/ |
| A D | policy.h | 134 aa_state_t state) in aa_lookup_perms() 325 aa_state_t state = RULE_MEDIATES(rules, AA_CLASS_NETV9); in RULE_MEDIATES_NET() local
|
| A D | label.h | 320 aa_state_t state; in aa_label_strn_split() local 332 aa_state_t state; in aa_label_str_split() local
|
| /security/selinux/ss/ |
| A D | services.c | 2217 struct selinux_state *state = &selinux_state; in selinux_policy_cancel() local 2241 struct selinux_state *state = &selinux_state; in selinux_policy_commit() local 2309 struct selinux_state *state = &selinux_state; in security_load_policy() local 3100 struct selinux_state *state = &selinux_state; in security_set_bools() local 3586 struct selinux_state *state = &selinux_state; in selinux_audit_rule_init() local 3711 struct selinux_state *state = &selinux_state; in selinux_audit_rule_match() local 4032 struct selinux_state *state = &selinux_state; in security_read_policy() local 4062 struct selinux_state *state = &selinux_state; in security_read_state_kernel() local
|
| A D | policydb.h | 148 int state; member
|
| /security/selinux/ |
| A D | hooks.c | 5822 const struct nf_hook_state *state) in selinux_ip_forward() 5877 const struct nf_hook_state *state) in selinux_ip_output() 5920 const struct nf_hook_state *state) in selinux_ip_postroute_compat() 5950 const struct nf_hook_state *state) in selinux_ip_postroute()
|