/openbmc/linux/security/apparmor/ |
H A D | policy_compat.c | 53 #define dfa_user_allow(dfa, state) (((ACCEPT_TABLE(dfa)[state]) & 0x7f) | \ argument 54 ((ACCEPT_TABLE(dfa)[state]) & 0x80000000)) 55 #define dfa_user_xbits(dfa, state) (((ACCEPT_TABLE(dfa)[state]) >> 7) & 0x7f) argument 56 #define dfa_user_audit(dfa, state) ((ACCEPT_TABLE2(dfa)[state]) & 0x7f) argument 57 #define dfa_user_quiet(dfa, state) (((ACCEPT_TABLE2(dfa)[state]) >> 7) & 0x7f) argument 58 #define dfa_user_xindex(dfa, state) \ argument 59 (dfa_map_xindex(ACCEPT_TABLE(dfa)[state] & 0x3fff)) 61 #define dfa_other_allow(dfa, state) ((((ACCEPT_TABLE(dfa)[state]) >> 14) & \ argument 63 ((ACCEPT_TABLE(dfa)[state]) & 0x80000000)) 64 #define dfa_other_xbits(dfa, state) \ argument [all …]
|
H A D | match.c | 197 static int verify_dfa(struct aa_dfa *dfa) in verify_dfa() argument 202 state_count = dfa->tables[YYTD_ID_BASE]->td_lolen; in verify_dfa() 203 trans_count = dfa->tables[YYTD_ID_NXT]->td_lolen; in verify_dfa() 207 if (!(BASE_TABLE(dfa)[i] & MATCH_FLAG_DIFF_ENCODE) && in verify_dfa() 208 (DEFAULT_TABLE(dfa)[i] >= state_count)) in verify_dfa() 210 if (BASE_TABLE(dfa)[i] & MATCH_FLAGS_INVALID) { in verify_dfa() 214 if ((BASE_TABLE(dfa)[i] & MATCH_FLAG_DIFF_ENCODE)) { in verify_dfa() 215 if (!(dfa->flags & YYTH_FLAG_DIFF_ENCODE)) { in verify_dfa() 220 if ((BASE_TABLE(dfa)[i] & MATCH_FLAG_OOB_TRANSITION)) { in verify_dfa() 221 if (base_idx(BASE_TABLE(dfa)[i]) < dfa->max_oob) { in verify_dfa() [all …]
|
H A D | mount.c | 197 static aa_state_t match_mnt_flags(struct aa_dfa *dfa, aa_state_t state, in match_mnt_flags() argument 204 state = aa_dfa_next(dfa, state, i + 1); in match_mnt_flags() 232 AA_BUG(!policy->dfa); in do_match_mnt() 236 state = aa_dfa_match(policy->dfa, start, mntpnt); in do_match_mnt() 237 state = aa_dfa_null_transition(policy->dfa, state); in do_match_mnt() 242 state = aa_dfa_match(policy->dfa, state, devname); in do_match_mnt() 243 state = aa_dfa_null_transition(policy->dfa, state); in do_match_mnt() 248 state = aa_dfa_match(policy->dfa, state, type); in do_match_mnt() 249 state = aa_dfa_null_transition(policy->dfa, state); in do_match_mnt() 253 state = match_mnt_flags(policy->dfa, state, flags); in do_match_mnt() [all …]
|
H A D | policy_unpack.c | 428 struct aa_dfa *dfa = NULL; in unpack_dfa() local 442 dfa = aa_dfa_unpack(blob + pad, size - pad, flags); in unpack_dfa() 444 if (IS_ERR(dfa)) in unpack_dfa() 445 return dfa; in unpack_dfa() 449 return dfa; in unpack_dfa() 734 policy->dfa = unpack_dfa(e, flags); in unpack_pdb() 735 if (IS_ERR(policy->dfa)) { in unpack_pdb() 736 error = PTR_ERR(policy->dfa); in unpack_pdb() 737 policy->dfa = NULL; in unpack_pdb() 740 } else if (!policy->dfa) { in unpack_pdb() [all …]
|
H A D | domain.c | 96 state = aa_dfa_match(rules->file.dfa, state, "&"); in match_component() 98 return aa_dfa_match(rules->file.dfa, state, tp->base.hname); in match_component() 102 state = aa_dfa_match_len(rules->file.dfa, state, ":", 1); in match_component() 103 state = aa_dfa_match(rules->file.dfa, state, ns_name); in match_component() 104 state = aa_dfa_match_len(rules->file.dfa, state, ":", 1); in match_component() 105 return aa_dfa_match(rules->file.dfa, state, tp->base.hname); in match_component() 153 state = aa_dfa_match(rules->file.dfa, state, "//&"); in label_compound_match() 319 state = aa_dfa_outofband_transition(attach->xmatch.dfa, state); in aa_xattrs_match() 333 state = aa_dfa_null_transition(attach->xmatch.dfa, in aa_xattrs_match() 336 state = aa_dfa_match_len(attach->xmatch.dfa, state, in aa_xattrs_match() [all …]
|
H A D | ipc.c | 95 state = aa_dfa_next(rules->policy.dfa, in profile_signal_perm()
|
H A D | file.c | 196 unsigned int index = ACCEPT_TABLE(file_rules->dfa)[state]; in aa_lookup_fperms() 222 state = aa_dfa_match(file_rules->dfa, start, name); in aa_str_perms() 364 state = aa_dfa_null_transition(rules->file.dfa, state); in profile_path_link()
|
H A D | label.c | 1272 return aa_dfa_match(rules->policy.dfa, state, tp->base.hname); in match_component() 1276 state = aa_dfa_match_len(rules->policy.dfa, state, ":", 1); in match_component() 1277 state = aa_dfa_match(rules->policy.dfa, state, ns_name); in match_component() 1278 state = aa_dfa_match_len(rules->policy.dfa, state, ":", 1); in match_component() 1279 return aa_dfa_match(rules->policy.dfa, state, tp->base.hname); in match_component() 1324 state = aa_dfa_match(rules->policy.dfa, state, "//&"); in label_compound_match()
|
H A D | net.c | 130 state = aa_dfa_match_len(rules->policy.dfa, state, (char *) &buffer, in aa_profile_af_perm()
|
H A D | lib.c | 345 state = aa_dfa_next(rules->policy.dfa, in aa_profile_match_label()
|
H A D | apparmorfs.c | 622 if (rules->file.dfa && *match_str == AA_CLASS_FILE) { in profile_query_cb() 623 state = aa_dfa_match_len(rules->file.dfa, in profile_query_cb() 631 } else if (rules->policy.dfa) { in profile_query_cb() 634 state = aa_dfa_match_len(rules->policy.dfa, in profile_query_cb() 1099 else if (profile->attach.xmatch.dfa) in seq_profile_attach_show()
|
H A D | policy.c | 593 rules->file.dfa = aa_get_dfa(nulldfa); in aa_alloc_null() 598 rules->policy.dfa = aa_get_dfa(nulldfa); in aa_alloc_null()
|
/openbmc/linux/security/apparmor/include/ |
H A D | match.h | 131 aa_state_t aa_dfa_match_len(struct aa_dfa *dfa, aa_state_t start, 133 aa_state_t aa_dfa_match(struct aa_dfa *dfa, aa_state_t start, 135 aa_state_t aa_dfa_next(struct aa_dfa *dfa, aa_state_t state, const char c); 136 aa_state_t aa_dfa_outofband_transition(struct aa_dfa *dfa, aa_state_t state); 137 aa_state_t aa_dfa_match_until(struct aa_dfa *dfa, aa_state_t start, 139 aa_state_t aa_dfa_matchn_until(struct aa_dfa *dfa, aa_state_t start, 159 aa_state_t aa_dfa_leftmatch(struct aa_dfa *dfa, aa_state_t start, 169 static inline struct aa_dfa *aa_get_dfa(struct aa_dfa *dfa) in aa_get_dfa() argument 171 if (dfa) in aa_get_dfa() 172 kref_get(&(dfa->count)); in aa_get_dfa() [all …]
|
H A D | policy.h | 83 struct aa_dfa *dfa; member 94 aa_put_dfa(policy->dfa); in aa_destroy_policydb() 104 unsigned int index = ACCEPT_TABLE(policy->dfa)[state]; in aa_lookup_perms() 281 return aa_dfa_match_len(rules->policy.dfa, in RULE_MEDIATES() 292 return aa_dfa_match_len(rules->policy.dfa, state, (char *) &be_af, 2); in RULE_MEDIATES_AF()
|
H A D | lib.h | 90 static inline aa_state_t aa_dfa_null_transition(struct aa_dfa *dfa, in aa_dfa_null_transition() argument 94 return aa_dfa_next(dfa, start, 0); in aa_dfa_null_transition()
|
/openbmc/linux/arch/mips/include/asm/octeon/ |
H A D | cvmx-npi-defs.h | 2240 uint64_t dfa:1; member 2254 uint64_t dfa:1; 2309 uint64_t dfa:1; member 2323 uint64_t dfa:1; 2380 uint64_t dfa:1; member 2394 uint64_t dfa:1; 2447 uint64_t dfa:1; member 2461 uint64_t dfa:1;
|
H A D | cvmx-npei-defs.h | 3732 uint64_t dfa:1; member 3746 uint64_t dfa:1;
|
/openbmc/linux/drivers/staging/octeon/ |
H A D | octeon-stubs.h | 1031 uint64_t dfa:1; member 1066 uint64_t dfa:1; member 1101 uint64_t dfa:1; member 1132 uint64_t dfa:1; member
|
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-support/lowpan-tools/lowpan-tools/ |
H A D | 0001-Fix-potential-string-truncation-in-strncpy.patch | 96 index 4439dfa..28db562 100644
|
/openbmc/openbmc/meta-raspberrypi/recipes-graphics/userland/files/ |
H A D | 0001-Allow-applications-to-set-next-resource-handle.patch | 130 index 6846dfa..128325e 100644
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-graphics/gphoto2/libgphoto2/ |
H A D | 40-libgphoto2.rules | 769 ATTRS{idVendor}=="0bb4", ATTRS{idProduct}=="0dfa", ENV{ID_MEDIA_PLAYER}="1", MODE="l36"
|