/security/apparmor/include/ |
D | path.h | 46 #define COUNT_ARGS(X...) COUNT_ARGS_HELPER(, ##X, 9, 8, 7, 6, 5, 4, 3, 2, 1, 0) argument 47 #define COUNT_ARGS_HELPER(_0, _1, _2, _3, _4, _5, _6, _7, _8, _9, n, X...) n argument 48 #define CONCAT(X, Y) X ## Y argument 49 #define CONCAT_AFTER(X, Y) CONCAT(X, Y) argument 51 #define ASSIGN(FN, X, N) ((X) = FN(N)) argument 52 #define EVAL1(FN, X) ASSIGN(FN, X, 0) /*X = FN(0)*/ argument 53 #define EVAL2(FN, X, Y...) do { ASSIGN(FN, X, 1); EVAL1(FN, Y); } while (0) argument 54 #define EVAL(FN, X...) CONCAT_AFTER(EVAL, COUNT_ARGS(X))(FN, X) argument 59 #define AA_BUG_PREEMPT_ENABLED(X) AA_BUG(preempt_count() <= 0, X) argument 61 #define AA_BUG_PREEMPT_ENABLED(X) /* nop */ argument [all …]
|
D | apparmorfs.h | 99 #define ns_dir(X) ((X)->dents[AAFS_NS_DIR]) argument 100 #define ns_subns_dir(X) ((X)->dents[AAFS_NS_NS]) argument 101 #define ns_subprofs_dir(X) ((X)->dents[AAFS_NS_PROFS]) argument 102 #define ns_subdata_dir(X) ((X)->dents[AAFS_NS_RAW_DATA]) argument 103 #define ns_subload(X) ((X)->dents[AAFS_NS_LOAD]) argument 104 #define ns_subreplace(X) ((X)->dents[AAFS_NS_REPLACE]) argument 105 #define ns_subremove(X) ((X)->dents[AAFS_NS_REMOVE]) argument 106 #define ns_subrevision(X) ((X)->dents[AAFS_NS_REVISION]) argument 108 #define prof_dir(X) ((X)->dents[AAFS_PROF_DIR]) argument 109 #define prof_child_dir(X) ((X)->dents[AAFS_PROF_PROFS]) argument
|
D | match.h | 75 #define ACCEPT1_FLAGS(X) ((X) & 0x3f) argument 76 #define ACCEPT2_FLAGS(X) ACCEPT1_FLAGS((X) >> YYTD_ID_ACCEPT2) argument 77 #define TO_ACCEPT1_FLAG(X) ACCEPT1_FLAGS(X) argument 78 #define TO_ACCEPT2_FLAG(X) (ACCEPT1_FLAGS(X) << YYTD_ID_ACCEPT2) argument 105 #define byte_to_byte(X) (X) argument
|
D | lib.h | 28 #define write_is_locked(X) !write_can_lock(X) argument 30 #define write_is_locked(X) (1) argument 46 #define AA_WARN(X) WARN((X), "APPARMOR WARN %s: %s\n", __func__, #X) argument 48 #define AA_BUG(X, args...) AA_BUG_FMT((X), "" args) argument 50 #define AA_BUG_FMT(X, fmt, args...) \ argument 51 WARN((X), "AppArmor WARN %s: (" #X "): " fmt, __func__, ##args) 53 #define AA_BUG_FMT(X, fmt, args...) argument
|
D | label.h | 148 #define label_isprofile(X) ((X)->flags & FLAG_PROFILE) argument 149 #define label_unconfined(X) ((X)->flags & FLAG_UNCONFINED) argument 150 #define unconfined(X) label_unconfined(X) argument 151 #define label_is_stale(X) ((X)->flags & FLAG_STALE) argument 152 #define __label_make_stale(X) ((X)->flags |= FLAG_STALE) argument 153 #define labels_ns(X) (vec_ns(&((X)->vec[0]), (X)->size)) argument 154 #define labels_set(X) (&labels_ns(X)->labels) argument 155 #define labels_profile(X) ((X)->vec[(X)->size - 1]) argument
|
D | file.h | 27 #define mask_mode_t(X) (X & (MAY_EXEC | MAY_WRITE | MAY_READ | MAY_APPEND)) argument 35 #define file_ctx(X) ((struct aa_file_ctx *)(X)->f_security) argument 110 #define COMBINED_PERM_MASK(X) ((X).allow | (X).audit | (X).quiet | (X).kill) argument
|
D | context.h | 25 #define cred_ctx(X) ((X)->security) argument 140 #define __end_current_label_crit_section(X) end_current_label_crit_section(X) argument
|
D | policy.h | 56 #define on_list_rcu(X) (!list_empty(X) && (X)->prev != LIST_POISON2) argument 197 #define profile_unconfined(X) ((X)->mode == APPARMOR_UNCONFINED) argument
|
D | audit.h | 153 #define DEFINE_AUDIT_DATA(NAME, T, X) \ argument 155 struct apparmor_audit_data NAME ## _aad = { .op = (X), }; \
|
/security/apparmor/ |
D | match.c | 26 #define base_idx(X) ((X) & 0xffffff) argument
|
D | policy_unpack.c | 35 #define VERSION_LT(X, Y) (((X) & K_ABI_MASK) < ((Y) & K_ABI_MASK)) argument 36 #define VERSION_GT(X, Y) (((X) & K_ABI_MASK) > ((Y) & K_ABI_MASK)) argument
|