Searched refs:start (Results 1 - 18 of 18) sorted by relevance

/security/apparmor/include/
H A Dcrypto.h21 int aa_calc_profile_hash(struct aa_profile *profile, u32 version, void *start,
25 void *start, size_t len)
24 aa_calc_profile_hash(struct aa_profile *profile, u32 version, void *start, size_t len) argument
H A Dapparmor.h102 * @start: the state of the dfa to start matching in
109 unsigned int start)
112 return aa_dfa_next(dfa, start, 0);
108 aa_dfa_null_transition(struct aa_dfa *dfa, unsigned int start) argument
H A Dmatch.h120 unsigned int aa_dfa_match_len(struct aa_dfa *dfa, unsigned int start,
122 unsigned int aa_dfa_match(struct aa_dfa *dfa, unsigned int start,
H A Dfile.h163 unsigned int start; member in struct:aa_file_rules
170 unsigned int aa_str_perms(struct aa_dfa *dfa, unsigned int start,
H A Dpolicy.h145 * start: set of start states for the different classes of data
150 unsigned int start[AA_CLASS_LAST + 1]; member in struct:aa_policydb
/security/apparmor/
H A Dcrypto.c32 int aa_calc_profile_hash(struct aa_profile *profile, u32 version, void *start, argument
58 error = crypto_shash_update(&desc.shash, (u8 *) start, len);
H A Dpolicy_unpack.c63 void *start; member in struct:aa_ext
101 aad.iface.pos = e->pos - e->start;
120 * @chunk: start address for chunk of data (NOT NULL)
339 size_t sz = blob - (char *) e->start -
340 ((e->pos - e->start) & 7);
399 /* verify that name doesn't start with space */
587 if (!unpack_u32(e, &profile->policy.start[0], "start"))
588 /* default start state */
589 profile->policy.start[
762 void *start; local
[all...]
H A Dmatch.c46 /* loaded td_id's start at 1, subtract 1 now to avoid doing
287 * @start: the state of the dfa to start matching in
293 * label, or as the start state of a continuing match.
300 unsigned int aa_dfa_match_len(struct aa_dfa *dfa, unsigned int start, argument
307 unsigned int state = start, pos;
341 * @start: the state of the dfa to start matching in
346 * label, or as the start state of a continuing match.
350 unsigned int aa_dfa_match(struct aa_dfa *dfa, unsigned int start, argument
[all...]
H A Dfile.c231 * @state: state to start matching in
236 * Returns: the final state in @dfa when beginning @start and walking @name
238 unsigned int aa_str_perms(struct aa_dfa *dfa, unsigned int start, argument
248 state = aa_dfa_match(dfa, start, name);
298 aa_str_perms(profile->file.dfa, profile->file.start, name, cond,
340 * is done from the point of the link match (not start of DFA)
380 state = aa_str_perms(profile->file.dfa, profile->file.start, lname,
409 aa_str_perms(profile->file.dfa, profile->file.start, tname, &cond,
H A Ddomain.c91 * @start: state to start matching in
98 unsigned int start)
112 aa_str_perms(profile->file.dfa, start, name, &cond, &perms);
118 state = aa_dfa_match(profile->file.dfa, start, ns->base.name);
366 state = profile->file.start;
807 profile->file.start);
95 change_profile_perms(struct aa_profile *profile, struct aa_namespace *ns, const char *name, u32 request, unsigned int start) argument
H A Dapparmorfs.c600 * @ns: namespace to start in (NOT NULL)
674 * p_start - start a depth first traversal of profile tree
761 .start = p_start,
/security/tomoyo/
H A Dutil.c171 char *start = param->data; local
172 char *pos = start;
181 if (tomoyo_correct_domain(start))
182 return tomoyo_get_name(start);
445 const char *const start = string; local
473 if (string - 3 < start || *(string - 3) != '/')
675 * @filename: The start of string to check.
677 * @pattern: The start of pattern to compare.
793 * @filename: The start of string to check.
795 * @pattern: The start o
[all...]
H A Dcondition.c245 * @start: String to save.
249 static const struct tomoyo_path_info *tomoyo_get_dqword(char *start) argument
251 char *cp = start + strlen(start) - 1;
252 if (cp == start || *start++ != '"' || *cp != '"')
255 if (*start && !tomoyo_correct_word(start))
257 return tomoyo_get_name(start);
H A Dcommon.c1921 char *start = str; local
1925 return strlen(start) + 1;
2746 char *start = ""; local
2749 start = tomoyo_builtin_profile;
2754 start = tomoyo_builtin_exception_policy;
2759 start = tomoyo_builtin_domain_policy;
2764 start = tomoyo_builtin_manager;
2769 start = tomoyo_builtin_stat;
2775 char *end = strchr(start, '\n');
2779 tomoyo_normalize_line(start);
[all...]
/security/integrity/ima/
H A Dima_fs.c171 .start = ima_measurements_start,
233 .start = ima_measurements_start,
306 * ima_release_policy - start using the new measure policy rules.
/security/keys/
H A Dproc.c29 .start = proc_keys_start,
50 .start = proc_key_users_start,
/security/smack/
H A Dsmackfs.c447 * @ppos: where to start - must be 0
660 .start = load2_seq_start,
683 * @ppos: where to start - must be 0
830 .start = cipso_seq_start,
854 * @ppos: where to start
958 * @ppos: where to start
1008 .start = cipso_seq_start,
1032 * @ppos: where to start
1087 .start = netlbladdr_seq_start,
1153 * @ppos: where to start
[all...]
/security/selinux/
H A Dselinuxfs.c1443 .start = sel_avc_stats_seq_start,
1782 /* directory inodes start off with i_nlink == 2 (for "." entry) */

Completed in 153 milliseconds