| /security/smack/ |
| A D | smack_access.c | 292 string[i++] = 'r'; in smack_str_from_perm() 294 string[i++] = 'w'; in smack_str_from_perm() 296 string[i++] = 'x'; in smack_str_from_perm() 298 string[i++] = 'a'; in smack_str_from_perm() 300 string[i++] = 't'; in smack_str_from_perm() 302 string[i++] = 'l'; in smack_str_from_perm() 304 string[i++] = 'b'; in smack_str_from_perm() 307 string[i] = '\0'; in smack_str_from_perm() 435 hash = full_name_hash(NULL, string, strlen(string)); in smk_find_entry() 469 if (string[i] > '~' || string[i] <= ' ' || string[i] == '/' || in smk_parse_smack() [all …]
|
| A D | smack.h | 287 int smack_str_from_perm(char *string, int access); 289 char *smk_parse_smack(const char *string, int len);
|
| A D | smackfs.c | 261 static int smk_perm_from_str(const char *string) in smk_perm_from_str() argument 266 for (cp = string; ; cp++) in smk_perm_from_str()
|
| A D | smack_lsm.c | 718 rc = smack_add_opt(opt, param->string, &fc->security); in smack_fs_context_parse_param() 720 param->string = NULL; in smack_fs_context_parse_param()
|
| /security/apparmor/ |
| A D | procattr.c | 31 int aa_getprocattr(struct aa_label *label, char **string, bool newline) in aa_getprocattr() argument 47 *string = kmalloc(len + 2, GFP_KERNEL); in aa_getprocattr() 48 if (!*string) { in aa_getprocattr() 53 len = aa_label_snxprint(*string, len + 2, current_ns, label, in aa_getprocattr() 62 (*string)[len++] = '\n'; in aa_getprocattr() 63 (*string)[len] = 0; in aa_getprocattr()
|
| A D | policy_unpack_test.c | 234 const char *string = NULL; in policy_unpack_test_unpack_str_with_null_name() local 238 size = aa_unpack_str(puf->e, &string, NULL); in policy_unpack_test_unpack_str_with_null_name() 247 const char *string = NULL; in policy_unpack_test_unpack_str_with_name() local 259 const char *string = NULL; in policy_unpack_test_unpack_str_out_of_bounds() local 275 char *string = NULL; in policy_unpack_test_unpack_strdup_with_null_name() local 287 kfree(string); in policy_unpack_test_unpack_strdup_with_null_name() 293 char *string = NULL; in policy_unpack_test_unpack_strdup_with_name() local 304 kfree(string); in policy_unpack_test_unpack_strdup_with_name() 311 char *string = NULL; in policy_unpack_test_unpack_strdup_out_of_bounds() local 320 KUNIT_EXPECT_NULL(test, string); in policy_unpack_test_unpack_strdup_out_of_bounds() [all …]
|
| A D | policy_unpack.c | 373 VISIBLE_IF_KUNIT int aa_unpack_str(struct aa_ext *e, const char **string, const char *name) in aa_unpack_str() argument 378 *string = NULL; in aa_unpack_str() 385 *string = src_str; in aa_unpack_str() 397 VISIBLE_IF_KUNIT int aa_unpack_strdup(struct aa_ext *e, char **string, const char *name) in aa_unpack_strdup() argument 402 *string = NULL; in aa_unpack_strdup() 407 *string = kmemdup(tmp, res, GFP_KERNEL); in aa_unpack_strdup() 408 if (!*string) { in aa_unpack_strdup()
|
| A D | apparmorfs.c | 1011 seq_printf(seq, "%s\n", fs_file->v.string); in aa_sfs_seq_show()
|
| /security/tomoyo/ |
| A D | util.c | 116 const char *cp = strstr(string, keyword); in tomoyo_permstr() 119 return cp == string || *(cp - 1) == '/'; in tomoyo_permstr() 438 const char *const start = string; in tomoyo_correct_word2() 444 unsigned char c = *string++; in tomoyo_correct_word2() 449 c = *string++; in tomoyo_correct_word2() 456 d = *string++; in tomoyo_correct_word2() 457 e = *string++; in tomoyo_correct_word2() 484 if (string - 3 < start || *(string - 3) != '/') in tomoyo_correct_word2() 489 if (*string != '/') in tomoyo_correct_word2() 518 bool tomoyo_correct_word(const char *string) in tomoyo_correct_word() argument [all …]
|
| A D | gc.c | 71 static bool tomoyo_name_used_by_io_buffer(const char *string) in tomoyo_name_used_by_io_buffer() argument 74 const size_t size = strlen(string) + 1; in tomoyo_name_used_by_io_buffer() 87 if (w < string || w > string + size) in tomoyo_name_used_by_io_buffer()
|
| A D | Kconfig | 57 string "Location of userspace policy loader" 67 string "Trigger for calling userspace policy loader"
|
| A D | common.c | 251 static void tomoyo_set_string(struct tomoyo_io_buffer *head, const char *string) in tomoyo_set_string() argument 254 head->r.w[head->r.w_pos++] = string; in tomoyo_set_string() 545 static s8 tomoyo_find_yesno(const char *string, const char *find) in tomoyo_find_yesno() argument 547 const char *cp = strstr(string, find); in tomoyo_find_yesno() 568 static void tomoyo_set_uint(unsigned int *i, const char *string, in tomoyo_set_uint() argument 571 const char *cp = strstr(string, find); in tomoyo_set_uint()
|
| A D | common.h | 935 bool tomoyo_correct_word(const char *string); 952 bool tomoyo_permstr(const char *string, const char *keyword);
|
| /security/apparmor/include/ |
| A D | policy_unpack.h | 177 int aa_unpack_str(struct aa_ext *e, const char **string, const char *name); 178 int aa_unpack_strdup(struct aa_ext *e, char **string, const char *name);
|
| A D | apparmorfs.h | 33 char *string; member 48 .v_type = AA_SFS_TYPE_STRING, .v.string = (_value), \
|
| A D | procattr.h | 14 int aa_getprocattr(struct aa_label *label, char **string, bool newline);
|
| /security/selinux/ |
| A D | Kconfig | 62 int "SELinux SID to context string translation cache size" 66 This option defines the size of the internal SID -> context string 67 cache, which improves the performance of context to string
|
| A D | hooks.c | 2855 return selinux_add_opt(opt, param->string, &fc->security); in selinux_fs_context_parse_param()
|
| /security/ |
| A D | Kconfig | 208 STATIC_USERMODEHELPER_PATH to an empty string. 211 string "Path to the static usermode helper binary" 221 specify an empty string here (i.e. ""). 271 string "Ordered list of enabled LSMs"
|
| A D | Kconfig.hardening | 222 Detect overflows of buffers in common string and memory functions
|
| /security/integrity/evm/ |
| A D | Kconfig | 72 string "EVM X509 certificate path"
|
| /security/integrity/ima/ |
| A D | Kconfig | 83 string 118 string 287 string "IMA X509 certificate path"
|
| /security/ipe/ |
| A D | Kconfig | 26 string "Integrity policy to apply on system startup"
|