| /Linux-v6.6/security/apparmor/ |
| D | policy_compat.c | 53 #define dfa_user_allow(dfa, state) (((ACCEPT_TABLE(dfa)[state]) & 0x7f) | \ argument 54 ((ACCEPT_TABLE(dfa)[state]) & 0x80000000)) 55 #define dfa_user_xbits(dfa, state) (((ACCEPT_TABLE(dfa)[state]) >> 7) & 0x7f) argument 56 #define dfa_user_audit(dfa, state) ((ACCEPT_TABLE2(dfa)[state]) & 0x7f) argument 57 #define dfa_user_quiet(dfa, state) (((ACCEPT_TABLE2(dfa)[state]) >> 7) & 0x7f) argument 58 #define dfa_user_xindex(dfa, state) \ argument 59 (dfa_map_xindex(ACCEPT_TABLE(dfa)[state] & 0x3fff)) 61 #define dfa_other_allow(dfa, state) ((((ACCEPT_TABLE(dfa)[state]) >> 14) & \ argument 63 ((ACCEPT_TABLE(dfa)[state]) & 0x80000000)) 64 #define dfa_other_xbits(dfa, state) \ argument [all …]
|
| D | match.c | 197 static int verify_dfa(struct aa_dfa *dfa) in verify_dfa() argument 202 state_count = dfa->tables[YYTD_ID_BASE]->td_lolen; in verify_dfa() 203 trans_count = dfa->tables[YYTD_ID_NXT]->td_lolen; in verify_dfa() 207 if (!(BASE_TABLE(dfa)[i] & MATCH_FLAG_DIFF_ENCODE) && in verify_dfa() 208 (DEFAULT_TABLE(dfa)[i] >= state_count)) in verify_dfa() 210 if (BASE_TABLE(dfa)[i] & MATCH_FLAGS_INVALID) { in verify_dfa() 214 if ((BASE_TABLE(dfa)[i] & MATCH_FLAG_DIFF_ENCODE)) { in verify_dfa() 215 if (!(dfa->flags & YYTH_FLAG_DIFF_ENCODE)) { in verify_dfa() 220 if ((BASE_TABLE(dfa)[i] & MATCH_FLAG_OOB_TRANSITION)) { in verify_dfa() 221 if (base_idx(BASE_TABLE(dfa)[i]) < dfa->max_oob) { in verify_dfa() [all …]
|
| D | mount.c | 193 static aa_state_t match_mnt_flags(struct aa_dfa *dfa, aa_state_t state, in match_mnt_flags() argument 200 state = aa_dfa_next(dfa, state, i + 1); in match_mnt_flags() 228 AA_BUG(!policy->dfa); in do_match_mnt() 232 state = aa_dfa_match(policy->dfa, start, mntpnt); in do_match_mnt() 233 state = aa_dfa_null_transition(policy->dfa, state); in do_match_mnt() 238 state = aa_dfa_match(policy->dfa, state, devname); in do_match_mnt() 239 state = aa_dfa_null_transition(policy->dfa, state); in do_match_mnt() 244 state = aa_dfa_match(policy->dfa, state, type); in do_match_mnt() 245 state = aa_dfa_null_transition(policy->dfa, state); in do_match_mnt() 249 state = match_mnt_flags(policy->dfa, state, flags); in do_match_mnt() [all …]
|
| D | policy_unpack.c | 427 struct aa_dfa *dfa = NULL; in unpack_dfa() local 441 dfa = aa_dfa_unpack(blob + pad, size - pad, flags); in unpack_dfa() 443 if (IS_ERR(dfa)) in unpack_dfa() 444 return dfa; in unpack_dfa() 448 return dfa; in unpack_dfa() 734 policy->dfa = unpack_dfa(e, flags); in unpack_pdb() 735 if (IS_ERR(policy->dfa)) { in unpack_pdb() 736 error = PTR_ERR(policy->dfa); in unpack_pdb() 737 policy->dfa = NULL; in unpack_pdb() 740 } else if (!policy->dfa) { in unpack_pdb() [all …]
|
| D | domain.c | 89 state = aa_dfa_match(rules->file.dfa, state, "&"); in match_component() 91 return aa_dfa_match(rules->file.dfa, state, tp->base.hname); in match_component() 95 state = aa_dfa_match_len(rules->file.dfa, state, ":", 1); in match_component() 96 state = aa_dfa_match(rules->file.dfa, state, ns_name); in match_component() 97 state = aa_dfa_match_len(rules->file.dfa, state, ":", 1); in match_component() 98 return aa_dfa_match(rules->file.dfa, state, tp->base.hname); in match_component() 146 state = aa_dfa_match(rules->file.dfa, state, "//&"); in label_compound_match() 312 state = aa_dfa_outofband_transition(attach->xmatch.dfa, state); in aa_xattrs_match() 326 state = aa_dfa_null_transition(attach->xmatch.dfa, in aa_xattrs_match() 329 state = aa_dfa_match_len(attach->xmatch.dfa, state, in aa_xattrs_match() [all …]
|
| D | ipc.c | 92 state = aa_dfa_next(rules->policy.dfa, in profile_signal_perm()
|
| D | file.c | 178 unsigned int index = ACCEPT_TABLE(file_rules->dfa)[state]; in aa_lookup_fperms() 204 state = aa_dfa_match(file_rules->dfa, start, name); in aa_str_perms() 339 state = aa_dfa_null_transition(rules->file.dfa, state); in profile_path_link()
|
| D | label.c | 1272 return aa_dfa_match(rules->policy.dfa, state, tp->base.hname); in match_component() 1276 state = aa_dfa_match_len(rules->policy.dfa, state, ":", 1); in match_component() 1277 state = aa_dfa_match(rules->policy.dfa, state, ns_name); in match_component() 1278 state = aa_dfa_match_len(rules->policy.dfa, state, ":", 1); in match_component() 1279 return aa_dfa_match(rules->policy.dfa, state, tp->base.hname); in match_component() 1324 state = aa_dfa_match(rules->policy.dfa, state, "//&"); in label_compound_match()
|
| D | net.c | 128 state = aa_dfa_match_len(rules->policy.dfa, state, (char *) &buffer, in aa_profile_af_perm()
|
| D | lib.c | 342 state = aa_dfa_next(rules->policy.dfa, in aa_profile_match_label()
|
| D | apparmorfs.c | 621 if (rules->file.dfa && *match_str == AA_CLASS_FILE) { in profile_query_cb() 622 state = aa_dfa_match_len(rules->file.dfa, in profile_query_cb() 630 } else if (rules->policy.dfa) { in profile_query_cb() 633 state = aa_dfa_match_len(rules->policy.dfa, in profile_query_cb() 1098 else if (profile->attach.xmatch.dfa) in seq_profile_attach_show()
|
| D | policy.c | 591 rules->file.dfa = aa_get_dfa(nulldfa); in aa_alloc_null() 596 rules->policy.dfa = aa_get_dfa(nulldfa); in aa_alloc_null()
|
| /Linux-v6.6/security/apparmor/include/ |
| D | match.h | 131 aa_state_t aa_dfa_match_len(struct aa_dfa *dfa, aa_state_t start, 133 aa_state_t aa_dfa_match(struct aa_dfa *dfa, aa_state_t start, 135 aa_state_t aa_dfa_next(struct aa_dfa *dfa, aa_state_t state, const char c); 136 aa_state_t aa_dfa_outofband_transition(struct aa_dfa *dfa, aa_state_t state); 137 aa_state_t aa_dfa_match_until(struct aa_dfa *dfa, aa_state_t start, 139 aa_state_t aa_dfa_matchn_until(struct aa_dfa *dfa, aa_state_t start, 159 aa_state_t aa_dfa_leftmatch(struct aa_dfa *dfa, aa_state_t start, 169 static inline struct aa_dfa *aa_get_dfa(struct aa_dfa *dfa) in aa_get_dfa() argument 171 if (dfa) in aa_get_dfa() 172 kref_get(&(dfa->count)); in aa_get_dfa() [all …]
|
| D | policy.h | 83 struct aa_dfa *dfa; member 94 aa_put_dfa(policy->dfa); in aa_destroy_policydb() 104 unsigned int index = ACCEPT_TABLE(policy->dfa)[state]; in aa_lookup_perms() 281 return aa_dfa_match_len(rules->policy.dfa, in RULE_MEDIATES() 292 return aa_dfa_match_len(rules->policy.dfa, state, (char *) &be_af, 2); in RULE_MEDIATES_AF()
|
| D | lib.h | 90 static inline aa_state_t aa_dfa_null_transition(struct aa_dfa *dfa, in aa_dfa_null_transition() argument 94 return aa_dfa_next(dfa, start, 0); in aa_dfa_null_transition()
|
| /Linux-v6.6/arch/mips/include/asm/octeon/ |
| D | cvmx-npi-defs.h | 2240 uint64_t dfa:1; member 2254 uint64_t dfa:1; 2309 uint64_t dfa:1; member 2323 uint64_t dfa:1; 2380 uint64_t dfa:1; member 2394 uint64_t dfa:1; 2447 uint64_t dfa:1; member 2461 uint64_t dfa:1;
|
| D | cvmx-npei-defs.h | 3732 uint64_t dfa:1; member 3746 uint64_t dfa:1;
|
| /Linux-v6.6/drivers/staging/octeon/ |
| D | octeon-stubs.h | 1031 uint64_t dfa:1; member 1066 uint64_t dfa:1; member 1101 uint64_t dfa:1; member 1132 uint64_t dfa:1; member
|