| /security/selinux/ss/ |
| A D | ebitmap.h | 91 u32 index = EBITMAP_NODE_INDEX(n, bit); in ebitmap_node_get_bit() local 94 BUG_ON(index >= EBITMAP_UNIT_NUMS); in ebitmap_node_get_bit() 95 if ((n->maps[index] & (EBITMAP_BIT << ofs))) in ebitmap_node_get_bit() 102 u32 index = EBITMAP_NODE_INDEX(n, bit); in ebitmap_node_set_bit() local 105 BUG_ON(index >= EBITMAP_UNIT_NUMS); in ebitmap_node_set_bit() 106 n->maps[index] |= (EBITMAP_BIT << ofs); in ebitmap_node_set_bit() 111 u32 index = EBITMAP_NODE_INDEX(n, bit); in ebitmap_node_clr_bit() local 114 BUG_ON(index >= EBITMAP_UNIT_NUMS); in ebitmap_node_clr_bit() 115 n->maps[index] &= ~(EBITMAP_BIT << ofs); in ebitmap_node_clr_bit()
|
| A D | sidtab.c | 32 #define index_to_sid(index) ((index) + SECINITSID_NUM + 1) argument 184 static struct sidtab_entry *sidtab_do_lookup(struct sidtab *s, u32 index, in sidtab_do_lookup() argument 188 u32 level, capacity_shift, leaf_index = index / SIDTAB_LEAF_ENTRIES; in sidtab_do_lookup() 191 level = sidtab_level_from_count(index + 1); in sidtab_do_lookup() 222 return &entry->ptr_leaf->entries[index % SIDTAB_LEAF_ENTRIES]; in sidtab_do_lookup() 225 static struct sidtab_entry *sidtab_lookup(struct sidtab *s, u32 index) in sidtab_lookup() argument 230 if (index >= count) in sidtab_lookup() 233 return sidtab_do_lookup(s, index, 0); in sidtab_lookup()
|
| A D | services.c | 470 int index; in security_dump_masked_av() local 510 for (index = 0; index < 32; index++) { in security_dump_masked_av() 511 u32 mask = (1 << index); in security_dump_masked_av() 518 permission_names[index] in security_dump_masked_av() 519 ? permission_names[index] : "????"); in security_dump_masked_av() 868 u32 index; in security_bounded_transition() local 900 index = new_entry->context.type; in security_bounded_transition() 915 index = type->bounds; in security_bounded_transition() 2418 size_t index, u32 *out_sid) in ocontext_to_sid() argument 3170 int security_get_bool_value(u32 index) in security_get_bool_value() argument [all …]
|
| A D | ebitmap.c | 366 u32 mapunit, count, startbit, index, i; in ebitmap_read() local 457 index = (startbit - n->startbit) / EBITMAP_UNIT_SIZE; in ebitmap_read() 459 n->maps[index++] = map & (-1UL); in ebitmap_read()
|
| /security/apparmor/ |
| A D | policy_compat.c | 27 u32 index = 0; in dfa_map_xindex() local 30 index |= AA_X_UNSAFE; in dfa_map_xindex() 32 index |= AA_X_INHERIT; in dfa_map_xindex() 34 index |= AA_X_UNCONFINED; in dfa_map_xindex() 37 index |= AA_X_UNCONFINED; in dfa_map_xindex() 39 index |= AA_X_NAME; in dfa_map_xindex() 41 index |= AA_X_NAME | AA_X_CHILD; in dfa_map_xindex() 43 index |= AA_X_TABLE; in dfa_map_xindex() 44 index |= old_index - 4; in dfa_map_xindex() 47 return index; in dfa_map_xindex()
|
| A D | file.c | 185 unsigned int index = ACCEPT_TABLE(rules->dfa)[state]; in aa_lookup_condperms() local 192 return &(rules->perms[index]); in aa_lookup_condperms() 193 return &(rules->perms[index + 1]); in aa_lookup_condperms() 196 return &(rules->perms[index]); in aa_lookup_condperms()
|
| A D | domain.c | 523 int index = xindex & AA_X_INDEX_MASK; in x_table_lookup() local 532 for (next = rules->file->trans.table[index]; next; in x_table_lookup()
|
| /security/tomoyo/ |
| A D | condition.c | 25 static bool tomoyo_argv(const unsigned int index, const char *arg_ptr, in tomoyo_argv() argument 36 if (index != argv->index) in tomoyo_argv() 302 if (tomoyo_parse_ulong(&argv->index, &left) != in tomoyo_parse_argv() 836 const u8 index = j ? right : left; in tomoyo_condition() local 839 switch (index) { in tomoyo_condition() 951 switch (index) { in tomoyo_condition() 994 switch (index) { in tomoyo_condition() 1045 switch (index) { in tomoyo_condition()
|
| A D | common.c | 738 u8 index; in tomoyo_read_profile() local 746 index = head->r.index; in tomoyo_read_profile() 747 profile = ns->profile_ptr[index]; in tomoyo_read_profile() 757 head->r.index++) in tomoyo_read_profile() 758 if (ns->profile_ptr[head->r.index]) in tomoyo_read_profile() 806 index, in tomoyo_read_profile() 819 head->r.index++; in tomoyo_read_profile() 1632 head->r.index = 0; in tomoyo_read_domain() 1637 i = head->r.index++; in tomoyo_read_domain() 1644 head->r.index = 0; in tomoyo_read_domain() [all …]
|
| A D | util.c | 993 const u8 index) in tomoyo_get_mode() argument 1001 mode = p->config[index]; in tomoyo_get_mode() 1003 mode = p->config[tomoyo_index2category[index] in tomoyo_get_mode() 1020 struct tomoyo_domain_info *domain, const u8 index) in tomoyo_init_request_info() argument 1030 r->type = index; in tomoyo_init_request_info() 1031 r->mode = tomoyo_get_mode(domain->ns, profile, index); in tomoyo_init_request_info()
|
| A D | audit.c | 329 const u8 profile, const u8 index, in tomoyo_get_audit() argument 334 const u8 category = tomoyo_index2category[index] + in tomoyo_get_audit() 346 mode = p->config[index]; in tomoyo_get_audit()
|
| A D | common.h | 608 unsigned long index; member 809 u16 index; member 977 const u8 index); 980 const u8 index); 1063 void tomoyo_update_stat(const u8 index);
|
| /security/selinux/include/ |
| A D | conditional.h | 21 int security_get_bool_value(u32 index);
|
| /security/selinux/ |
| A D | selinuxfs.c | 1210 unsigned index = file_inode(filep)->i_ino & SEL_INO_MASK; in sel_read_bool() local 1216 if (index >= fsi->bool_num || strcmp(name, in sel_read_bool() 1217 fsi->bool_pending_names[index])) in sel_read_bool() 1225 cur_enforcing = security_get_bool_value(index); in sel_read_bool() 1231 fsi->bool_pending_values[index]); in sel_read_bool() 1250 unsigned index = file_inode(filep)->i_ino & SEL_INO_MASK; in sel_write_bool() local 1273 if (index >= fsi->bool_num || strcmp(name, in sel_write_bool() 1274 fsi->bool_pending_names[index])) in sel_write_bool() 1284 fsi->bool_pending_values[index] = new_value; in sel_write_bool() 1814 char *classname, int index, in sel_make_class_dir_entries() argument [all …]
|
| /security/apparmor/include/ |
| A D | policy.h | 136 unsigned int index = ACCEPT_TABLE(policy->dfa)[state]; in aa_lookup_perms() local 141 return &(policy->perms[index]); in aa_lookup_perms()
|
| /security/integrity/ima/ |
| A D | Kconfig | 52 IMA_MEASURE_PCR_IDX determines the TPM PCR register index
|
| /security/ |
| A D | Kconfig.hardening | 79 (index 0), and sizes (0 length), so it is therefore more
|