| /security/apparmor/ |
| A D | match.c | 64 if (table) { in unpack_table() 87 return table; in unpack_table() 89 kvfree(table); in unpack_table() 346 if (!table) in aa_dfa_unpack() 380 dfa->tables[table->td_id] = table; in aa_dfa_unpack() 381 data += table_size(table->td_lolen, table->td_flags); in aa_dfa_unpack() 382 size -= table_size(table->td_lolen, table->td_flags); in aa_dfa_unpack() 393 table = remap_data16_to_data32(table); in aa_dfa_unpack() 394 if (!table) in aa_dfa_unpack() 397 dfa->tables[table->td_id] = table; in aa_dfa_unpack() [all …]
|
| A D | policy_compat.c | 155 struct aa_perms *table; in compute_fperms() local 161 table = kvcalloc(state_count * 2, sizeof(struct aa_perms), GFP_KERNEL); in compute_fperms() 162 if (!table) in compute_fperms() 167 table[state * 2] = compute_fperms_user(dfa, state); in compute_fperms() 168 table[state * 2 + 1] = compute_fperms_other(dfa, state); in compute_fperms() 171 return table; in compute_fperms() 254 struct aa_perms *table; in compute_perms() local 260 table = kvcalloc(state_count, sizeof(struct aa_perms), GFP_KERNEL); in compute_perms() 261 if (!table) in compute_perms() 267 table[state] = compute_perms_entry(dfa, state, version); in compute_perms() [all …]
|
| A D | lib.c | 55 for (entry = table; entry->str != NULL; entry++) { in val_table_find_ent() 92 const struct val_table_ent *table, u32 mask) in val_mask_to_str() argument 97 for (ent = table; ent->str; ent++) { in val_mask_to_str() 130 n[i] = t->table[i]; in aa_resize_str_table() 132 kfree_sensitive(t->table[i]); in aa_resize_str_table() 135 kfree_sensitive(t->table); in aa_resize_str_table() 136 t->table = n; in aa_resize_str_table() 151 if (!t->table) in aa_free_str_table() 155 kfree_sensitive(t->table[i]); in aa_free_str_table() 156 kfree_sensitive(t->table); in aa_free_str_table() [all …]
|
| A D | policy_unpack.c | 463 char **table = NULL; in unpack_trans_table() local 478 table = kcalloc(size, sizeof(char *), GFP_KERNEL); in unpack_trans_table() 479 if (!table) in unpack_trans_table() 482 strs->table = table; in unpack_trans_table() 492 table[i] = str; in unpack_trans_table() 803 if (!pdb->dfa && pdb->trans.table) in unpack_pdb()
|
| A D | lsm.c | 2306 static int apparmor_dointvec(const struct ctl_table *table, int write, in apparmor_dointvec() argument 2314 return proc_dointvec(table, write, buffer, lenp, ppos); in apparmor_dointvec()
|
| A D | domain.c | 532 for (next = rules->file->trans.table[index]; next; in x_table_lookup()
|
| /security/selinux/ss/ |
| A D | symtab.c | 45 return hashtab_init(&s->table, size); in symtab_init() 50 return hashtab_insert(&s->table, name, datum, symtab_key_params); in symtab_insert() 55 return hashtab_search(&s->table, name, symtab_key_params); in symtab_search()
|
| A D | symtab.h | 17 struct hashtab table; /* hash table (keyed on a string) */ member
|
| A D | conditional.c | 719 rc = hashtab_duplicate(&newdb->p_bools.table, &orig->p_bools.table, in duplicate_policydb_bools() 726 hashtab_map(&newdb->p_bools.table, cond_bools_index, cond_bool_array); in duplicate_policydb_bools() 736 hashtab_map(&p->p_bools.table, cond_bools_destroy, NULL); in cond_policydb_destroy_dup() 737 hashtab_destroy(&p->p_bools.table); in cond_policydb_destroy_dup()
|
| A D | policydb.c | 203 hashtab_map(&comdatum->permissions.table, perm_destroy, NULL); in common_destroy() 204 hashtab_destroy(&comdatum->permissions.table); in common_destroy() 233 hashtab_destroy(&cladatum->permissions.table); in cls_destroy() 702 hash_eval(&s[i].table, symtab_name[i], NULL); in symtab_hash_eval() 772 rc = hashtab_map(&p->symtab[i].table, index_f[i], p); in policydb_index() 793 hashtab_map(&p->symtab[i].table, destroy_f[i], NULL); in policydb_destroy() 794 hashtab_destroy(&p->symtab[i].table); in policydb_destroy() 3008 buf[3] = cpu_to_le32(comdatum->permissions.table.nel); in common_write() 3116 buf[4] = cpu_to_le32(cladatum->permissions.table.nel); in class_write() 3753 buf[1] = cpu_to_le32(p->symtab[i].table.nel); in policydb_write() [all …]
|
| A D | services.c | 483 hashtab_map(&common_dat->permissions.table, in security_dump_masked_av() 487 if (hashtab_map(&tclass_dat->permissions.table, in security_dump_masked_av() 3439 rc = hashtab_map(&policydb->p_classes.table, get_classes_callback, in security_get_classes() 3491 rc = hashtab_map(&match->comdatum->permissions.table, in security_get_permissions() 3497 rc = hashtab_map(&match->permissions.table, get_permissions_callback, in security_get_permissions()
|
| /security/ |
| A D | min_addr.c | 32 int mmap_min_addr_handler(const struct ctl_table *table, int write, in mmap_min_addr_handler() argument 40 ret = proc_doulongvec_minmax(table, write, buffer, lenp, ppos); in mmap_min_addr_handler()
|
| /security/apparmor/include/ |
| A D | lib.h | 124 char **table; member 127 void aa_free_str_table(struct aa_str_table *table);
|
| /security/yama/ |
| A D | yama_lsm.c | 432 static int yama_dointvec_minmax(const struct ctl_table *table, int write, in yama_dointvec_minmax() argument 441 table_copy = *table; in yama_dointvec_minmax()
|