Searched refs:state (Results 1 – 9 of 9) sorted by relevance
/security/apparmor/ |
D | match.c | 307 unsigned int state = start, pos; in aa_dfa_match_len() local 309 if (state == 0) in aa_dfa_match_len() 318 pos = base_idx(base[state]) + equiv[(u8) *str++]; in aa_dfa_match_len() 319 if (check[pos] == state) in aa_dfa_match_len() 320 state = next[pos]; in aa_dfa_match_len() 322 state = def[state]; in aa_dfa_match_len() 327 pos = base_idx(base[state]) + (u8) *str++; in aa_dfa_match_len() 328 if (check[pos] == state) in aa_dfa_match_len() 329 state = next[pos]; in aa_dfa_match_len() 331 state = def[state]; in aa_dfa_match_len() [all …]
|
D | file.c | 194 static struct file_perms compute_perms(struct aa_dfa *dfa, unsigned int state, in compute_perms() argument 207 perms.allow = map_old_perms(dfa_user_allow(dfa, state)); in compute_perms() 208 perms.audit = map_old_perms(dfa_user_audit(dfa, state)); in compute_perms() 209 perms.quiet = map_old_perms(dfa_user_quiet(dfa, state)); in compute_perms() 210 perms.xindex = dfa_user_xindex(dfa, state); in compute_perms() 212 perms.allow = map_old_perms(dfa_other_allow(dfa, state)); in compute_perms() 213 perms.audit = map_old_perms(dfa_other_audit(dfa, state)); in compute_perms() 214 perms.quiet = map_old_perms(dfa_other_quiet(dfa, state)); in compute_perms() 215 perms.xindex = dfa_other_xindex(dfa, state); in compute_perms() 220 if (ACCEPT_TABLE(dfa)[state] & 0x80000000) in compute_perms() [all …]
|
D | domain.c | 102 unsigned int state; in change_profile_perms() local 118 state = aa_dfa_match(profile->file.dfa, start, ns->base.name); in change_profile_perms() 119 state = aa_dfa_match_len(profile->file.dfa, state, ":", 1); in change_profile_perms() 120 aa_str_perms(profile->file.dfa, state, name, &cond, &perms); in change_profile_perms() 149 unsigned int state = aa_dfa_match(profile->xmatch, in __attach_match() local 151 u32 perm = dfa_user_allow(profile->xmatch, state); in __attach_match() 343 unsigned int state; in apparmor_bprm_set_creds() local 366 state = profile->file.start; in apparmor_bprm_set_creds() 400 state = aa_str_perms(profile->file.dfa, state, name, &cond, &perms); in apparmor_bprm_set_creds() 411 state = aa_dfa_null_transition(profile->file.dfa, state); in apparmor_bprm_set_creds() [all …]
|
/security/apparmor/include/ |
D | file.h | 131 #define dfa_user_allow(dfa, state) (((ACCEPT_TABLE(dfa)[state]) & 0x7f) | \ argument 132 ((ACCEPT_TABLE(dfa)[state]) & 0x80000000)) 133 #define dfa_user_audit(dfa, state) ((ACCEPT_TABLE2(dfa)[state]) & 0x7f) argument 134 #define dfa_user_quiet(dfa, state) (((ACCEPT_TABLE2(dfa)[state]) >> 7) & 0x7f) argument 135 #define dfa_user_xindex(dfa, state) \ argument 136 (dfa_map_xindex(ACCEPT_TABLE(dfa)[state] & 0x3fff)) 138 #define dfa_other_allow(dfa, state) ((((ACCEPT_TABLE(dfa)[state]) >> 14) & \ argument 140 ((ACCEPT_TABLE(dfa)[state]) & 0x80000000)) 141 #define dfa_other_audit(dfa, state) (((ACCEPT_TABLE2(dfa)[state]) >> 14) & 0x7f) argument 142 #define dfa_other_quiet(dfa, state) \ argument [all …]
|
D | match.h | 124 unsigned int aa_dfa_next(struct aa_dfa *dfa, unsigned int state,
|
/security/selinux/ss/ |
D | conditional.c | 39 s[sp] = p->bool_val_to_struct[cur->bool - 1]->state; in cond_evaluate_expr() 216 if (!(b->state == 0 || b->state == 1)) in bool_isvalid() 238 booldatum->state = le32_to_cpu(buf[1]); in cond_read_bool() 505 buf[1] = cpu_to_le32(booldatum->state); in cond_write_bool()
|
D | policydb.h | 151 int state; member
|
D | services.c | 2609 (*values)[i] = policydb.bool_val_to_struct[i]->state; in security_get_bools() 2648 if (!!values[i] != policydb.bool_val_to_struct[i]->state) { in security_set_bools() 2654 policydb.bool_val_to_struct[i]->state, in security_set_bools() 2659 policydb.bool_val_to_struct[i]->state = 1; in security_set_bools() 2661 policydb.bool_val_to_struct[i]->state = 0; in security_set_bools() 2695 rc = policydb.bool_val_to_struct[bool]->state; in security_get_bool_value() 2714 booldatum->state = bvalues[i]; in security_preserve_bools()
|
/security/ |
D | Kconfig | 93 initial state as well as data reset protection. This is used to
|