/security/tomoyo/ |
H A D | Makefile | 31 @echo "static char tomoyo_builtin_profile[] __initdata =" > $@.tmp 32 @sed -e 's/\\/\\\\/g' -e 's/\"/\\"/g' -e 's/\(.*\)/"\1\\n"/' < $(obj)/policy/profile.conf >> $@.tmp 33 @echo "\"\";" >> $@.tmp 34 @echo "static char tomoyo_builtin_exception_policy[] __initdata =" >> $@.tmp 35 @sed -e 's/\\/\\\\/g' -e 's/\"/\\"/g' -e 's/\(.*\)/"\1\\n"/' < $(obj)/policy/exception_policy.conf >> $@.tmp 36 @echo "\"\";" >> $@.tmp 37 @echo "static char tomoyo_builtin_domain_policy[] __initdata =" >> $@.tmp 38 @sed -e 's/\\/\\\\/g' -e 's/\"/\\"/g' -e 's/\(.*\)/"\1\\n"/' < $(obj)/policy/domain_policy.conf >> $@.tmp 39 @echo "\"\";" >> $@.tmp 40 @echo "static char tomoyo_builtin_manager[] __initdata =" >> $@.tmp [all...] |
H A D | gc.c | 248 struct tomoyo_acl_info *tmp; local 254 list_for_each_entry_safe(acl, tmp, &domain->acl_info_list, list) { 477 struct tomoyo_acl_head *tmp; local 478 list_for_each_entry_safe(member, tmp, member_list, list) { 496 struct tomoyo_acl_info *tmp; local 497 list_for_each_entry_safe(acl, tmp, list, list) { 518 struct tomoyo_domain_info *tmp; local 519 list_for_each_entry_safe(domain, tmp, &tomoyo_domain_list, 535 struct tomoyo_shared_acl_head *tmp; local 536 list_for_each_entry_safe(ptr, tmp, 548 struct tomoyo_group *tmp; local 575 struct tomoyo_shared_acl_head *tmp; local 602 struct tomoyo_io_buffer *tmp; local [all...] |
H A D | domain.c | 689 ee->tmp = kzalloc(TOMOYO_EXEC_TMPSIZE, GFP_NOFS); 690 if (!ee->tmp) { 758 strncpy(ee->tmp, old_domain->domainname->name, 760 cp = strrchr(ee->tmp, ' '); 764 strncpy(ee->tmp, domainname, TOMOYO_EXEC_TMPSIZE - 1); 766 snprintf(ee->tmp, TOMOYO_EXEC_TMPSIZE - 1, "%s %s", 779 snprintf(ee->tmp, TOMOYO_EXEC_TMPSIZE - 1, "<%s>", 790 snprintf(ee->tmp, TOMOYO_EXEC_TMPSIZE - 1, "%s %s", 812 snprintf(ee->tmp, TOMOYO_EXEC_TMPSIZE - 1, "%s %s", 818 domain = tomoyo_assign_domain(ee->tmp, tru [all...] |
H A D | util.c | 395 char *tmp = *src; local 397 if (strncmp(tmp, find, len)) 399 tmp += len; 400 *src = tmp;
|
H A D | common.c | 2139 struct list_head *tmp; local 2150 list_for_each(tmp, &tomoyo_query_list) { 2151 struct tomoyo_query *ptr = list_entry(tmp, typeof(*ptr), list); 2167 list_for_each(tmp, &tomoyo_query_list) { 2168 struct tomoyo_query *ptr = list_entry(tmp, typeof(*ptr), list); 2200 struct list_head *tmp; local 2204 list_for_each(tmp, &tomoyo_query_list) { 2205 struct tomoyo_query *ptr = list_entry(tmp, typeof(*ptr), list); 2212 list_for_each(tmp, &tomoyo_query_list) { 2213 struct tomoyo_query *ptr = list_entry(tmp, typeo [all...] |
H A D | common.h | 625 char *tmp; /* Size is TOMOYO_EXEC_TMPSIZE bytes */ member in struct:tomoyo_execve
|
H A D | condition.c | 106 char *arg_ptr = ee->tmp;
|
/security/selinux/ |
H A D | netlink.c | 73 sk_buff_data_t tmp; local 83 tmp = skb->tail; 88 nlh->nlmsg_len = skb->tail - tmp;
|
H A D | avc.c | 301 struct avc_operation_decision_node *od_node, *tmp; local 306 list_for_each_entry_safe(od_node, tmp, &ops_node->od_head, od_list) {
|
H A D | hooks.c | 503 char tmp; local 516 tmp = sbsec->flags & SE_MNTMASK; 519 if (tmp & 0x01) 521 tmp >>= 1;
|
/security/apparmor/ |
H A D | policy_unpack.c | 276 const char *tmp; local 278 int res = unpack_str(e, &tmp, name); 284 *string = kmemdup(tmp, res, GFP_KERNEL); 442 u32 tmp = 0; local 443 if (!unpack_u32(e, &tmp, NULL)) 445 profile->rlimits.mask = tmp; 481 u32 tmp; local 508 if (!unpack_u32(e, &tmp, NULL)) 510 profile->xmatch_len = tmp; 516 if (!unpack_u32(e, &tmp, NUL 751 struct aa_load_ent *tmp, *ent; local [all...] |
H A D | policy.c | 477 struct aa_profile *profile, *tmp; local 478 list_for_each_entry_safe(profile, tmp, head, base.list) 528 struct aa_namespace *ns, *tmp; local 529 list_for_each_entry_safe(ns, tmp, head, base.list) 980 struct aa_profile *child, *tmp; local 986 list_for_each_entry_safe(child, tmp, &lh, base.list) { 1072 struct aa_load_ent *ent, *tmp; local 1162 list_for_each_entry_safe(ent, tmp, &lh, list) { 1220 list_for_each_entry_safe(ent, tmp, &lh, list) {
|
/security/selinux/ss/ |
H A D | ebitmap.c | 393 struct ebitmap_node *tmp; local 394 tmp = kzalloc(sizeof(*tmp), GFP_KERNEL); 395 if (!tmp) { 402 tmp->startbit = startbit - (startbit % EBITMAP_SIZE); 404 n->next = tmp; 406 e->node = tmp; 407 n = tmp;
|
/security/ |
H A D | device_cgroup.c | 69 struct dev_exception_item *ex, *tmp, *new; local 83 list_for_each_entry_safe(ex, tmp, dest, list) { 128 struct dev_exception_item *walk, *tmp; local 132 list_for_each_entry_safe(walk, tmp, &dev_cgroup->exceptions, list) { 150 struct dev_exception_item *ex, *tmp; local 152 list_for_each_entry_safe(ex, tmp, &dev_cgroup->exceptions, list) { 525 struct list_head *this, *tmp; local 527 list_for_each_safe(this, tmp, &devcg->exceptions) {
|
/security/apparmor/include/ |
H A D | policy.h | 363 struct aa_profile *tmp; local 364 tmp = rcu_dereference_protected(orig->replacedby->profile, 368 aa_put_profile(tmp);
|
/security/integrity/ima/ |
H A D | ima_policy.c | 138 struct ima_rule_entry *entry, *tmp; local 143 list_for_each_entry_safe(entry, tmp, &ima_policy_rules, list) { 733 struct ima_rule_entry *entry, *tmp; local 737 list_for_each_entry_safe(entry, tmp, &ima_policy_rules, list) {
|