| /security/apparmor/ |
| A D | policy_unpack_test.c | 68 e->start = buf; in build_aa_ext_struct() 69 e->end = e->start + buf_size; in build_aa_ext_struct() 70 e->pos = e->start; in build_aa_ext_struct() 76 buf = e->start + TEST_STRING_BUF_OFFSET; in build_aa_ext_struct() 80 buf = e->start + TEST_NAMED_U32_BUF_OFFSET; in build_aa_ext_struct() 87 buf = e->start + TEST_NAMED_U64_BUF_OFFSET; in build_aa_ext_struct() 94 buf = e->start + TEST_NAMED_BLOB_BUF_OFFSET; in build_aa_ext_struct() 217 void *start; in policy_unpack_test_unpack_blob_out_of_bounds() local 221 start = puf->e->pos; in policy_unpack_test_unpack_blob_out_of_bounds() 260 void *start = puf->e->pos; in policy_unpack_test_unpack_str_out_of_bounds() local [all …]
|
| A D | match.c | 450 aa_state_t aa_dfa_match_len(struct aa_dfa *dfa, aa_state_t start, in aa_dfa_match_len() argument 457 aa_state_t state = start; in aa_dfa_match_len() 496 aa_state_t state = start; in aa_dfa_match() 576 aa_state_t aa_dfa_match_until(struct aa_dfa *dfa, aa_state_t start, in aa_dfa_match_until() argument 584 aa_state_t state = start, pos; in aa_dfa_match_until() 637 aa_state_t aa_dfa_matchn_until(struct aa_dfa *dfa, aa_state_t start, in aa_dfa_matchn_until() argument 645 aa_state_t state = start, pos; in aa_dfa_matchn_until() 713 static aa_state_t leftmatch_fb(struct aa_dfa *dfa, aa_state_t start, in leftmatch_fb() argument 721 aa_state_t state = start, pos; in leftmatch_fb() 794 aa_state_t aa_dfa_leftmatch(struct aa_dfa *dfa, aa_state_t start, in aa_dfa_leftmatch() argument [all …]
|
| A D | policy_unpack.c | 70 ad.iface.pos = e->pos - e->start; in audit_iface() 438 size_t sz = blob - (char *) e->start - in unpack_dfa() 439 ((e->pos - e->start) & 7); in unpack_dfa() 767 pdb->start[0] = DFA_START; in unpack_pdb() 773 pdb->start[i] = aa_dfa_next(pdb->dfa, pdb->start[0], in unpack_pdb() 1038 rules->policy->start[AA_CLASS_FILE] = in unpack_profile() 1040 rules->policy->start[0], in unpack_profile() 1464 .start = udata->data, in aa_unpack() 1471 void *start; in aa_unpack() local 1476 start = e.pos; in aa_unpack() [all …]
|
| A D | crypto.c | 36 int aa_calc_profile_hash(struct aa_profile *profile, u32 version, void *start, in aa_calc_profile_hash() argument 51 sha256_update(&sctx, (u8 *)start, len); in aa_calc_profile_hash()
|
| A D | domain.c | 192 aa_state_t start, bool subns, u32 request, in label_components_match() argument 206 state = match_component(profile, tp, stack, start); in label_components_match() 223 state = match_component(profile, tp, stack, start); in label_components_match() 290 u32 request, aa_state_t start, in change_profile_perms() argument 300 return label_match(profile, target, stack, start, true, request, perms); in change_profile_perms() 426 attach->xmatch->start[AA_CLASS_XMATCH], in find_attach() 669 aa_state_t state = rules->file->start[AA_CLASS_FILE]; in profile_transition() 799 aa_state_t state = rules->file->start[AA_CLASS_FILE]; in profile_onexec() 1362 rules->file->start[AA_CLASS_FILE], in change_profile_perms_wrapper()
|
| A D | mount.c | 226 static int do_match_mnt(struct aa_policydb *policy, aa_state_t start, in do_match_mnt() argument 238 state = aa_dfa_match(policy->dfa, start, mntpnt); in do_match_mnt() 337 rules->policy->start[AA_CLASS_MOUNT], in match_mnt_path_str() 623 rules->policy->start[AA_CLASS_MOUNT], in profile_umount() 696 rules->policy->start[AA_CLASS_MOUNT], in build_pivotroot()
|
| A D | file.c | 209 aa_state_t aa_str_perms(struct aa_policydb *file_rules, aa_state_t start, in aa_str_perms() argument 214 state = aa_dfa_match(file_rules->dfa, start, name); in aa_str_perms() 232 aa_str_perms(rules->file, rules->file->start[AA_CLASS_FILE], in __aa_path_perm() 349 rules->file->start[AA_CLASS_FILE], lname, in profile_path_link() 379 aa_str_perms(rules->file, rules->file->start[AA_CLASS_FILE], in profile_path_link()
|
| A D | lib.c | 395 rules->policy->start[AA_CLASS_LABEL], in aa_profile_match_label()
|
| A D | label.c | 1349 struct aa_label *label, aa_state_t start, in label_components_match() argument 1362 state = match_component(profile, rules, tp, start); in label_components_match() 1378 state = match_component(profile, rules, tp, start); in label_components_match()
|
| A D | apparmorfs.c | 623 rules->file->start[AA_CLASS_FILE], in profile_query_cb() 643 rules->policy->start[0], in profile_query_cb() 2292 .start = p_start,
|
| /security/apparmor/include/ |
| A D | match.h | 127 aa_state_t aa_dfa_match_len(struct aa_dfa *dfa, aa_state_t start, 129 aa_state_t aa_dfa_match(struct aa_dfa *dfa, aa_state_t start, 133 aa_state_t aa_dfa_match_until(struct aa_dfa *dfa, aa_state_t start, 135 aa_state_t aa_dfa_matchn_until(struct aa_dfa *dfa, aa_state_t start, 153 aa_state_t aa_dfa_leftmatch(struct aa_dfa *dfa, aa_state_t start,
|
| A D | crypto.h | 18 int aa_calc_profile_hash(struct aa_profile *profile, u32 version, void *start, 26 void *start, size_t len) in aa_calc_profile_hash() argument
|
| A D | policy.h | 97 aa_state_t start[AA_CLASS_LAST + 1]; member 308 return rules->policy->start[class]; in RULE_MEDIATES() 311 rules->policy->start[0], &class, 1); in RULE_MEDIATES()
|
| A D | lib.h | 111 aa_state_t start) in aa_dfa_null_transition() argument 114 return aa_dfa_next(dfa, start, 0); in aa_dfa_null_transition()
|
| A D | policy_unpack.h | 84 void *start; member
|
| A D | file.h | 83 aa_state_t aa_str_perms(struct aa_policydb *file_rules, aa_state_t start,
|
| /security/tomoyo/ |
| A D | condition.c | 259 static const struct tomoyo_path_info *tomoyo_get_dqword(char *start) in tomoyo_get_dqword() argument 261 char *cp = start + strlen(start) - 1; in tomoyo_get_dqword() 263 if (cp == start || *start++ != '"' || *cp != '"') in tomoyo_get_dqword() 266 if (*start && !tomoyo_correct_word(start)) in tomoyo_get_dqword() 268 return tomoyo_get_name(start); in tomoyo_get_dqword()
|
| A D | util.c | 158 char *start = param->data; in tomoyo_get_domainname() local 159 char *pos = start; in tomoyo_get_domainname() 169 if (tomoyo_correct_domain(start)) in tomoyo_get_domainname() 170 return tomoyo_get_name(start); in tomoyo_get_domainname() 438 const char *const start = string; in tomoyo_correct_word2() local 484 if (string - 3 < start || *(string - 3) != '/') in tomoyo_correct_word2()
|
| A D | common.c | 1975 char *start = str; in tomoyo_truncate() local 1980 return strlen(start) + 1; in tomoyo_truncate() 2936 char *start = ""; in tomoyo_load_builtin_policy() local 2940 start = tomoyo_builtin_profile; in tomoyo_load_builtin_policy() 2955 start = tomoyo_builtin_manager; in tomoyo_load_builtin_policy() 2960 start = tomoyo_builtin_stat; in tomoyo_load_builtin_policy() 2966 char *end = strchr(start, '\n'); in tomoyo_load_builtin_policy() 2971 tomoyo_normalize_line(start); in tomoyo_load_builtin_policy() 2972 head.write_buf = start; in tomoyo_load_builtin_policy() 2973 tomoyo_parse_policy(&head, start); in tomoyo_load_builtin_policy() [all …]
|
| A D | Kconfig | 52 loading the variant part of policy. Since you can start using
|
| /security/integrity/ima/ |
| A D | ima_fs.c | 199 .start = ima_measurements_start, 274 .start = ima_measurements_start, 388 .start = ima_policy_start,
|
| /security/keys/ |
| A D | proc.c | 22 .start = proc_keys_start, 34 .start = proc_key_users_start,
|
| /security/smack/ |
| A D | smackfs.c | 616 .start = load2_seq_start, 784 .start = cipso_seq_start, 984 .start = cipso_seq_start, 1060 .start = net4addr_seq_start, 1322 .start = net6addr_seq_start, 1885 .start = onlycap_seq_start, 2226 .start = load_self_seq_start, 2358 .start = load2_seq_start, 2435 .start = load_self2_seq_start, 2707 .start = relabel_self_seq_start,
|
| /security/loadpin/ |
| A D | Kconfig | 39 start with the line:
|
| /security/selinux/ |
| A D | Kconfig | 34 kernel will start in permissive mode (log everything, deny nothing)
|