/linux/security/apparmor/ |
A D | match.c | 221 if (base_idx(BASE_TABLE(dfa)[i]) < dfa->max_oob) { in verify_dfa() 273 if (dfa) { in dfa_free() 278 dfa->tables[i] = NULL; in dfa_free() 280 kfree(dfa); in dfa_free() 291 dfa_free(dfa); in aa_dfa_free_kref() 313 if (!dfa) in aa_dfa_unpack() 316 kref_init(&dfa->count); in aa_dfa_unpack() 347 dfa->max_oob = 1; in aa_dfa_unpack() 401 return dfa; in aa_dfa_unpack() 405 dfa_free(dfa); in aa_dfa_unpack() [all …]
|
A D | mount.c | 200 state = aa_dfa_next(dfa, state, i + 1); in match_mnt_flags() 217 .allow = dfa_user_allow(dfa, state), in compute_mnt_perms() 218 .audit = dfa_user_audit(dfa, state), in compute_mnt_perms() 219 .quiet = dfa_user_quiet(dfa, state), in compute_mnt_perms() 220 .xindex = dfa_user_xindex(dfa, state), in compute_mnt_perms() 246 AA_BUG(!dfa); in do_match_mnt() 261 state = aa_dfa_match(dfa, state, type); in do_match_mnt() 269 *perms = compute_mnt_perms(dfa, state); in do_match_mnt() 279 state = aa_dfa_match(dfa, state, data); in do_match_mnt() 282 *perms = compute_mnt_perms(dfa, state); in do_match_mnt() [all …]
|
A D | file.c | 226 perms.allow = map_old_perms(dfa_user_allow(dfa, state)); in aa_compute_fperms() 227 perms.audit = map_old_perms(dfa_user_audit(dfa, state)); in aa_compute_fperms() 228 perms.quiet = map_old_perms(dfa_user_quiet(dfa, state)); in aa_compute_fperms() 229 perms.xindex = dfa_user_xindex(dfa, state); in aa_compute_fperms() 231 perms.allow = map_old_perms(dfa_other_allow(dfa, state)); in aa_compute_fperms() 232 perms.audit = map_old_perms(dfa_other_audit(dfa, state)); in aa_compute_fperms() 234 perms.xindex = dfa_other_xindex(dfa, state); in aa_compute_fperms() 239 if (ACCEPT_TABLE(dfa)[state] & 0x80000000) in aa_compute_fperms() 241 if (ACCEPT_TABLE(dfa)[state] & 0x40000000) in aa_compute_fperms() 262 state = aa_dfa_match(dfa, start, name); in aa_str_perms() [all …]
|
A D | policy_unpack.c | 446 struct aa_dfa *dfa = NULL; in unpack_dfa() local 462 if (IS_ERR(dfa)) in unpack_dfa() 463 return dfa; in unpack_dfa() 467 return dfa; in unpack_dfa() 832 profile->policy.dfa = NULL; in unpack_profile() 855 if (IS_ERR(profile->file.dfa)) { in unpack_profile() 857 profile->file.dfa = NULL; in unpack_profile() 860 } else if (profile->file.dfa) { in unpack_profile() 864 } else if (profile->policy.dfa && in unpack_profile() 866 profile->file.dfa = aa_get_dfa(profile->policy.dfa); in unpack_profile() [all …]
|
A D | lib.c | 325 void aa_compute_perms(struct aa_dfa *dfa, unsigned int state, in aa_compute_perms() argument 329 .allow = dfa_user_allow(dfa, state), in aa_compute_perms() 330 .audit = dfa_user_audit(dfa, state), in aa_compute_perms() 331 .quiet = dfa_user_quiet(dfa, state), in aa_compute_perms() 337 perms->allow |= map_other(dfa_other_allow(dfa, state)); in aa_compute_perms() 338 perms->audit |= map_other(dfa_other_audit(dfa, state)); in aa_compute_perms() 339 perms->quiet |= map_other(dfa_other_quiet(dfa, state)); in aa_compute_perms() 387 state = aa_dfa_next(profile->policy.dfa, in aa_profile_match_label()
|
A D | domain.c | 106 state = aa_dfa_match(profile->file.dfa, state, "&"); in match_component() 108 return aa_dfa_match(profile->file.dfa, state, tp->base.hname); in match_component() 112 state = aa_dfa_match_len(profile->file.dfa, state, ":", 1); in match_component() 113 state = aa_dfa_match(profile->file.dfa, state, ns_name); in match_component() 114 state = aa_dfa_match_len(profile->file.dfa, state, ":", 1); in match_component() 115 return aa_dfa_match(profile->file.dfa, state, tp->base.hname); in match_component() 161 state = aa_dfa_match(profile->file.dfa, state, "//&"); in label_compound_match() 166 *perms = aa_compute_fperms(profile->file.dfa, state, &cond); in label_compound_match() 219 tmp = aa_compute_fperms(profile->file.dfa, state, &cond); in label_components_match() 228 tmp = aa_compute_fperms(profile->file.dfa, state, &cond); in label_components_match() [all …]
|
A D | net.c | 126 state = aa_dfa_match_len(profile->policy.dfa, state, (char *) &buffer, in aa_profile_af_perm() 128 aa_compute_perms(profile->policy.dfa, state, &perms); in aa_profile_af_perm()
|
A D | label.c | 1275 return aa_dfa_match(profile->policy.dfa, state, tp->base.hname); in match_component() 1279 state = aa_dfa_match_len(profile->policy.dfa, state, ":", 1); in match_component() 1280 state = aa_dfa_match(profile->policy.dfa, state, ns_name); in match_component() 1281 state = aa_dfa_match_len(profile->policy.dfa, state, ":", 1); in match_component() 1282 return aa_dfa_match(profile->policy.dfa, state, tp->base.hname); in match_component() 1326 state = aa_dfa_match(profile->policy.dfa, state, "//&"); in label_compound_match() 1331 aa_compute_perms(profile->policy.dfa, state, perms); in label_compound_match() 1382 aa_compute_perms(profile->policy.dfa, state, &tmp); in label_components_match() 1391 aa_compute_perms(profile->policy.dfa, state, &tmp); in label_components_match()
|
A D | policy_ns.c | 111 ns->unconfined->file.dfa = aa_get_dfa(nulldfa); in alloc_ns() 112 ns->unconfined->policy.dfa = aa_get_dfa(nulldfa); in alloc_ns()
|
A D | apparmorfs.c | 612 struct aa_dfa *dfa; in profile_query_cb() local 617 if (profile->file.dfa && *match_str == AA_CLASS_FILE) { in profile_query_cb() 618 dfa = profile->file.dfa; in profile_query_cb() 619 state = aa_dfa_match_len(dfa, profile->file.start, in profile_query_cb() 624 tmp = aa_compute_fperms(dfa, state, &cond); in profile_query_cb() 626 } else if (profile->policy.dfa) { in profile_query_cb() 629 dfa = profile->policy.dfa; in profile_query_cb() 630 state = aa_dfa_match_len(dfa, profile->policy.start[0], in profile_query_cb() 633 aa_compute_perms(dfa, state, &tmp); in profile_query_cb()
|
A D | policy.c | 234 aa_put_dfa(profile->policy.dfa); in aa_free_profile() 547 profile->file.dfa = aa_get_dfa(nulldfa); in aa_new_null_profile() 548 profile->policy.dfa = aa_get_dfa(nulldfa); in aa_new_null_profile()
|
A D | ipc.c | 200 state = aa_dfa_next(profile->policy.dfa, in profile_signal_perm()
|
/linux/security/apparmor/include/ |
A D | file.h | 143 #define dfa_user_allow(dfa, state) (((ACCEPT_TABLE(dfa)[state]) & 0x7f) | \ argument 144 ((ACCEPT_TABLE(dfa)[state]) & 0x80000000)) 145 #define dfa_user_audit(dfa, state) ((ACCEPT_TABLE2(dfa)[state]) & 0x7f) argument 146 #define dfa_user_quiet(dfa, state) (((ACCEPT_TABLE2(dfa)[state]) >> 7) & 0x7f) argument 147 #define dfa_user_xindex(dfa, state) \ argument 150 #define dfa_other_allow(dfa, state) ((((ACCEPT_TABLE(dfa)[state]) >> 14) & \ argument 153 #define dfa_other_audit(dfa, state) (((ACCEPT_TABLE2(dfa)[state]) >> 14) & 0x7f) argument 154 #define dfa_other_quiet(dfa, state) \ argument 156 #define dfa_other_xindex(dfa, state) \ argument 177 struct aa_dfa *dfa; member [all …]
|
A D | match.h | 129 unsigned int aa_dfa_match_len(struct aa_dfa *dfa, unsigned int start, 131 unsigned int aa_dfa_match(struct aa_dfa *dfa, unsigned int start, 133 unsigned int aa_dfa_next(struct aa_dfa *dfa, unsigned int state, 135 unsigned int aa_dfa_outofband_transition(struct aa_dfa *dfa, 169 static inline struct aa_dfa *aa_get_dfa(struct aa_dfa *dfa) in aa_get_dfa() argument 171 if (dfa) in aa_get_dfa() 172 kref_get(&(dfa->count)); in aa_get_dfa() 174 return dfa; in aa_get_dfa() 183 static inline void aa_put_dfa(struct aa_dfa *dfa) in aa_put_dfa() argument 185 if (dfa) in aa_put_dfa() [all …]
|
A D | policy.h | 75 struct aa_dfa *dfa; member 222 return aa_dfa_match_len(profile->policy.dfa, in PROFILE_MEDIATES() 233 return aa_dfa_match_len(profile->policy.dfa, state, (char *) &be_af, 2); in PROFILE_MEDIATES_AF()
|
A D | lib.h | 85 static inline unsigned int aa_dfa_null_transition(struct aa_dfa *dfa, in aa_dfa_null_transition() argument 89 return aa_dfa_next(dfa, start, 0); in aa_dfa_null_transition()
|
A D | perms.h | 144 void aa_compute_perms(struct aa_dfa *dfa, unsigned int state,
|
/linux/arch/mips/include/asm/octeon/ |
A D | cvmx-npi-defs.h | 2240 uint64_t dfa:1; member 2254 uint64_t dfa:1; 2309 uint64_t dfa:1; member 2323 uint64_t dfa:1; 2380 uint64_t dfa:1; member 2394 uint64_t dfa:1; 2447 uint64_t dfa:1; member 2461 uint64_t dfa:1;
|
A D | cvmx-npei-defs.h | 3732 uint64_t dfa:1; member 3746 uint64_t dfa:1;
|
/linux/drivers/staging/octeon/ |
A D | octeon-stubs.h | 1031 uint64_t dfa:1; member 1066 uint64_t dfa:1; member 1101 uint64_t dfa:1; member 1132 uint64_t dfa:1; member
|