| /linux/security/apparmor/ |
| H A D | policy_compat.c | 53 #define dfa_user_allow(dfa, state) (((ACCEPT_TABLE(dfa)[state]) & 0x7f) | \ argument 54 ((ACCEPT_TABLE(dfa)[state]) & 0x80000000)) 55 #define dfa_user_xbits(dfa, state) (((ACCEPT_TABLE(dfa)[state]) >> 7) & 0x7f) argument 56 #define dfa_user_audit(dfa, state) ((ACCEPT_TABLE2(dfa)[state]) & 0x7f) argument 57 #define dfa_user_quiet(dfa, state) (((ACCEPT_TABLE2(dfa)[state]) >> 7) & 0x7f) argument 58 #define dfa_user_xindex(dfa, state) \ argument 59 (dfa_map_xindex(ACCEPT_TABLE(dfa)[state] & 0x3fff)) 61 #define dfa_other_allow(dfa, state) ((((ACCEPT_TABLE(dfa)[state]) >> 14) & \ argument 63 ((ACCEPT_TABLE(dfa)[state]) & 0x80000000)) 64 #define dfa_other_xbits(dfa, state) \ argument [all …]
|
| H A D | match.c | 153 static int verify_dfa(struct aa_dfa *dfa) in verify_dfa() argument 158 state_count = dfa->tables[YYTD_ID_BASE]->td_lolen; in verify_dfa() 159 trans_count = dfa->tables[YYTD_ID_NXT]->td_lolen; in verify_dfa() 163 if (!(BASE_TABLE(dfa)[i] & MATCH_FLAG_DIFF_ENCODE) && in verify_dfa() 164 (DEFAULT_TABLE(dfa)[i] >= state_count)) in verify_dfa() 166 if (BASE_TABLE(dfa)[i] & MATCH_FLAGS_INVALID) { in verify_dfa() 170 if ((BASE_TABLE(dfa)[i] & MATCH_FLAG_DIFF_ENCODE)) { in verify_dfa() 171 if (!(dfa->flags & YYTH_FLAG_DIFF_ENCODE)) { in verify_dfa() 176 if ((BASE_TABLE(dfa)[i] & MATCH_FLAG_OOB_TRANSITION)) { in verify_dfa() 177 if (base_idx(BASE_TABLE(dfa)[i]) < dfa->max_oob) { in verify_dfa() [all …]
|
| H A D | policy_unpack.c | 429 struct aa_dfa *dfa = NULL; in unpack_dfa() local 443 dfa = aa_dfa_unpack(blob + pad, size - pad, flags); in unpack_dfa() 445 if (IS_ERR(dfa)) in unpack_dfa() 446 return dfa; in unpack_dfa() 450 return dfa; in unpack_dfa() 747 pdb->dfa = unpack_dfa(e, flags); in unpack_pdb() 748 if (IS_ERR(pdb->dfa)) { in unpack_pdb() 749 error = PTR_ERR(pdb->dfa); in unpack_pdb() 750 pdb->dfa = NULL; in unpack_pdb() 753 } else if (!pdb->dfa) { in unpack_pdb() [all …]
|
| H A D | mount.c | 199 static aa_state_t match_mnt_flags(struct aa_dfa *dfa, aa_state_t state, in match_mnt_flags() argument 206 state = aa_dfa_next(dfa, state, i + 1); in match_mnt_flags() 234 AA_BUG(!policy->dfa); in do_match_mnt() 238 state = aa_dfa_match(policy->dfa, start, mntpnt); in do_match_mnt() 239 state = aa_dfa_null_transition(policy->dfa, state); in do_match_mnt() 244 state = aa_dfa_match(policy->dfa, state, devname); in do_match_mnt() 245 state = aa_dfa_null_transition(policy->dfa, state); in do_match_mnt() 250 state = aa_dfa_match(policy->dfa, state, type); in do_match_mnt() 251 state = aa_dfa_null_transition(policy->dfa, state); in do_match_mnt() 255 state = match_mnt_flags(policy->dfa, state, flags); in do_match_mnt() [all …]
|
| H A D | af_unix.c | 69 static aa_state_t match_addr(struct aa_dfa *dfa, aa_state_t state, in match_addr() argument 74 state = aa_dfa_match_len(dfa, state, addr->sun_path, in match_addr() 77 state = aa_dfa_match_len(dfa, state, ANONYMOUS_ADDR, 1); in match_addr() 79 state = aa_dfa_null_transition(dfa, state); in match_addr() 94 state = match_addr(policy->dfa, state, addr, addrlen); in match_to_local() 97 state = aa_dfa_null_transition(policy->dfa, state); in match_to_local() 147 state = aa_dfa_match_len(policy->dfa, state, &cmd, 1); in match_to_cmd() 164 state = match_addr(policy->dfa, state, peer_addr, peer_addrlen); in match_to_peer() 184 state = aa_dfa_match(rule->policy->dfa, state, in match_label() 309 state = aa_dfa_match_len(rules->policy->dfa, state, in profile_listen_perm() [all …]
|
| H A D | domain.c | 100 state = aa_dfa_match(rules->file->dfa, state, "&"); in match_component() 102 return aa_dfa_match(rules->file->dfa, state, tp->base.hname); in match_component() 106 state = aa_dfa_match_len(rules->file->dfa, state, ":", 1); in match_component() 107 state = aa_dfa_match(rules->file->dfa, state, ns_name); in match_component() 108 state = aa_dfa_match_len(rules->file->dfa, state, ":", 1); in match_component() 109 return aa_dfa_match(rules->file->dfa, state, tp->base.hname); in match_component() 156 state = aa_dfa_match(rules->file->dfa, state, "//&"); in label_compound_match() 325 state = aa_dfa_outofband_transition(attach->xmatch->dfa, state); in aa_xattrs_match() 339 state = aa_dfa_null_transition(attach->xmatch->dfa, in aa_xattrs_match() 342 state = aa_dfa_match_len(attach->xmatch->dfa, state, in aa_xattrs_match() [all …]
|
| H A D | net.c | 199 static aa_state_t aa_dfa_match_be16(struct aa_dfa *dfa, aa_state_t state, in aa_dfa_match_be16() argument 204 return aa_dfa_match_len(dfa, state, (char *) &buffer, 2); in aa_dfa_match_be16() 228 state = aa_dfa_match_be16(policy->dfa, state, (u16)af); in aa_match_to_prot() 233 state = aa_dfa_match_be16(policy->dfa, state, (u16)type); in aa_match_to_prot() 238 state = aa_dfa_match_be16(policy->dfa, state, (u16)protocol); in aa_match_to_prot()
|
| H A D | capability.c | 134 state = aa_dfa_next(rules->policy->dfa, state, cap >> 5); in profile_capable() 209 tmp = aa_dfa_next(rules->policy->dfa, state, i); in aa_profile_capget()
|
| H A D | file.c | 185 unsigned int index = ACCEPT_TABLE(rules->dfa)[state]; in aa_lookup_condperms() 190 if ((ACCEPT_TABLE2(rules->dfa)[state] & ACCEPT_FLAG_OWNER)) { in aa_lookup_condperms() 214 state = aa_dfa_match(file_rules->dfa, start, name); in aa_str_perms() 356 state = aa_dfa_null_transition(rules->file->dfa, state); in profile_path_link()
|
| H A D | ipc.c | 96 state = aa_dfa_next(rules->policy->dfa, state, ad->signal); in profile_signal_perm()
|
| H A D | label.c | 1261 return aa_dfa_match(rules->policy->dfa, state, tp->base.hname); in match_component() 1265 state = aa_dfa_match_len(rules->policy->dfa, state, ":", 1); in match_component() 1266 state = aa_dfa_match(rules->policy->dfa, state, ns_name); in match_component() 1267 state = aa_dfa_match_len(rules->policy->dfa, state, ":", 1); in match_component() 1268 return aa_dfa_match(rules->policy->dfa, state, tp->base.hname); in match_component() 1314 state = aa_dfa_match(rules->policy->dfa, state, "//&"); in label_compound_match()
|
| H A D | lib.c | 394 state = aa_dfa_next(rules->policy->dfa, in aa_profile_match_label()
|
| H A D | apparmorfs.c | 626 if (rules->file->dfa && *match_str == AA_CLASS_FILE) { in profile_query_cb() 627 state = aa_dfa_match_len(rules->file->dfa, in profile_query_cb() 636 } else if (rules->policy->dfa) { in profile_query_cb() 647 state = aa_dfa_match_len(rules->policy->dfa, in profile_query_cb() 1112 else if (profile->attach.xmatch->dfa) in seq_profile_attach_show()
|
| H A D | policy.c | 105 aa_put_dfa(pdb->dfa); in aa_free_pdb()
|
| H A D | lsm.c | 2458 nullpdb->dfa = aa_get_dfa(nulldfa); in aa_setup_dfa_engine()
|
| /linux/security/apparmor/include/ |
| H A D | match.h | 127 aa_state_t aa_dfa_match_len(struct aa_dfa *dfa, aa_state_t start, 129 aa_state_t aa_dfa_match(struct aa_dfa *dfa, aa_state_t start, 131 aa_state_t aa_dfa_next(struct aa_dfa *dfa, aa_state_t state, const char c); 132 aa_state_t aa_dfa_outofband_transition(struct aa_dfa *dfa, aa_state_t state); 133 aa_state_t aa_dfa_match_until(struct aa_dfa *dfa, aa_state_t start, 135 aa_state_t aa_dfa_matchn_until(struct aa_dfa *dfa, aa_state_t start, 153 aa_state_t aa_dfa_leftmatch(struct aa_dfa *dfa, aa_state_t start, 163 static inline struct aa_dfa *aa_get_dfa(struct aa_dfa *dfa) in aa_get_dfa() argument 165 if (dfa) in aa_get_dfa() 166 kref_get(&(dfa->count)); in aa_get_dfa() [all …]
|
| H A D | policy.h | 91 struct aa_dfa *dfa; member 136 unsigned int index = ACCEPT_TABLE(policy->dfa)[state]; in aa_lookup_perms() 310 return aa_dfa_match_len(rules->policy->dfa, in RULE_MEDIATES()
|
| H A D | lib.h | 110 static inline aa_state_t aa_dfa_null_transition(struct aa_dfa *dfa, in aa_dfa_null_transition() argument 114 return aa_dfa_next(dfa, start, 0); in aa_dfa_null_transition()
|
| /linux/arch/mips/include/asm/octeon/ |
| H A D | cvmx-npi-defs.h | 2240 uint64_t dfa:1; member 2254 uint64_t dfa:1; 2309 uint64_t dfa:1; member 2323 uint64_t dfa:1; 2380 uint64_t dfa:1; member 2394 uint64_t dfa:1; 2447 uint64_t dfa:1; member 2461 uint64_t dfa:1;
|
| H A D | cvmx-npei-defs.h | 3732 uint64_t dfa:1; member 3746 uint64_t dfa:1;
|