Home
last modified time | relevance | path

Searched refs:X (Results 1 – 12 of 12) sorted by relevance

/security/apparmor/include/
Dpath.h42 #define ASSIGN(FN, A, X, N) ((X) = FN(A, N)) argument
43 #define EVAL1(FN, A, X) ASSIGN(FN, A, X, 0) /*X = FN(0)*/ argument
44 #define EVAL2(FN, A, X, Y...) \ argument
45 do { ASSIGN(FN, A, X, 1); EVAL1(FN, A, Y); } while (0)
46 #define EVAL(FN, A, X...) CONCATENATE(EVAL, COUNT_ARGS(X))(FN, A, X) argument
51 #define AA_BUG_PREEMPT_ENABLED(X) AA_BUG(preempt_count() <= 0, X) argument
53 #define AA_BUG_PREEMPT_ENABLED(X) /* nop */ argument
60 #define __get_buffers(C, X...) EVAL(__get_buffer, C, X) argument
62 #define __put_buffers(X, Y...) ((void)&(X)) argument
64 #define get_buffers(X...) \ argument
[all …]
Dapparmorfs.h95 #define ns_dir(X) ((X)->dents[AAFS_NS_DIR]) argument
96 #define ns_subns_dir(X) ((X)->dents[AAFS_NS_NS]) argument
97 #define ns_subprofs_dir(X) ((X)->dents[AAFS_NS_PROFS]) argument
98 #define ns_subdata_dir(X) ((X)->dents[AAFS_NS_RAW_DATA]) argument
99 #define ns_subload(X) ((X)->dents[AAFS_NS_LOAD]) argument
100 #define ns_subreplace(X) ((X)->dents[AAFS_NS_REPLACE]) argument
101 #define ns_subremove(X) ((X)->dents[AAFS_NS_REMOVE]) argument
102 #define ns_subrevision(X) ((X)->dents[AAFS_NS_REVISION]) argument
104 #define prof_dir(X) ((X)->dents[AAFS_PROF_DIR]) argument
105 #define prof_child_dir(X) ((X)->dents[AAFS_PROF_PROFS]) argument
Dmatch.h72 #define ACCEPT1_FLAGS(X) ((X) & 0x3f) argument
73 #define ACCEPT2_FLAGS(X) ACCEPT1_FLAGS((X) >> YYTD_ID_ACCEPT2) argument
74 #define TO_ACCEPT1_FLAG(X) ACCEPT1_FLAGS(X) argument
75 #define TO_ACCEPT2_FLAG(X) (ACCEPT1_FLAGS(X) << YYTD_ID_ACCEPT2) argument
103 #define byte_to_byte(X) (X) argument
Dlabel.h144 #define label_isprofile(X) ((X)->flags & FLAG_PROFILE) argument
145 #define label_unconfined(X) ((X)->flags & FLAG_UNCONFINED) argument
146 #define unconfined(X) label_unconfined(X) argument
147 #define label_is_stale(X) ((X)->flags & FLAG_STALE) argument
148 #define __label_make_stale(X) ((X)->flags |= FLAG_STALE) argument
149 #define labels_ns(X) (vec_ns(&((X)->vec[0]), (X)->size)) argument
150 #define labels_set(X) (&labels_ns(X)->labels) argument
151 #define labels_profile(X) ((X)->vec[(X)->size - 1]) argument
Dlib.h37 #define AA_WARN(X) WARN((X), "APPARMOR WARN %s: %s\n", __func__, #X) argument
39 #define AA_BUG(X, args...) AA_BUG_FMT((X), "" args) argument
41 #define AA_BUG_FMT(X, fmt, args...) \ argument
42 WARN((X), "AppArmor WARN %s: (" #X "): " fmt, __func__, ##args)
44 #define AA_BUG_FMT(X, fmt, args...) argument
Dfile.h23 #define mask_mode_t(X) (X & (MAY_EXEC | MAY_WRITE | MAY_READ | MAY_APPEND)) argument
109 #define COMBINED_PERM_MASK(X) ((X).allow | (X).audit | (X).quiet | (X).kill) argument
Dnet.h54 #define SK_CTX(X) ((X)->sk_security) argument
55 #define SOCK_ctx(X) SOCK_INODE(X)->i_security argument
Dpolicy.h53 #define on_list_rcu(X) (!list_empty(X) && (X)->prev != LIST_POISON2) argument
201 #define profile_unconfined(X) ((X)->mode == APPARMOR_UNCONFINED) argument
Dcred.h110 #define __end_current_label_crit_section(X) end_current_label_crit_section(X) argument
Daudit.h158 #define DEFINE_AUDIT_DATA(NAME, T, X) \ argument
160 struct apparmor_audit_data NAME ## _aad = { .op = (X), }; \
/security/apparmor/
Dpolicy_unpack.c31 #define VERSION_LT(X, Y) (((X) & K_ABI_MASK) < ((Y) & K_ABI_MASK)) argument
32 #define VERSION_GT(X, Y) (((X) & K_ABI_MASK) > ((Y) & K_ABI_MASK)) argument
Dmatch.c22 #define base_idx(X) ((X) & 0xffffff) argument