/security/apparmor/include/ |
D | path.h | 42 #define ASSIGN(FN, A, X, N) ((X) = FN(A, N)) argument 43 #define EVAL1(FN, A, X) ASSIGN(FN, A, X, 0) /*X = FN(0)*/ argument 44 #define EVAL2(FN, A, X, Y...) \ argument 45 do { ASSIGN(FN, A, X, 1); EVAL1(FN, A, Y); } while (0) 46 #define EVAL(FN, A, X...) CONCATENATE(EVAL, COUNT_ARGS(X))(FN, A, X) argument 51 #define AA_BUG_PREEMPT_ENABLED(X) AA_BUG(preempt_count() <= 0, X) argument 53 #define AA_BUG_PREEMPT_ENABLED(X) /* nop */ argument 60 #define __get_buffers(C, X...) EVAL(__get_buffer, C, X) argument 62 #define __put_buffers(X, Y...) ((void)&(X)) argument 64 #define get_buffers(X...) \ argument [all …]
|
D | apparmorfs.h | 95 #define ns_dir(X) ((X)->dents[AAFS_NS_DIR]) argument 96 #define ns_subns_dir(X) ((X)->dents[AAFS_NS_NS]) argument 97 #define ns_subprofs_dir(X) ((X)->dents[AAFS_NS_PROFS]) argument 98 #define ns_subdata_dir(X) ((X)->dents[AAFS_NS_RAW_DATA]) argument 99 #define ns_subload(X) ((X)->dents[AAFS_NS_LOAD]) argument 100 #define ns_subreplace(X) ((X)->dents[AAFS_NS_REPLACE]) argument 101 #define ns_subremove(X) ((X)->dents[AAFS_NS_REMOVE]) argument 102 #define ns_subrevision(X) ((X)->dents[AAFS_NS_REVISION]) argument 104 #define prof_dir(X) ((X)->dents[AAFS_PROF_DIR]) argument 105 #define prof_child_dir(X) ((X)->dents[AAFS_PROF_PROFS]) argument
|
D | match.h | 72 #define ACCEPT1_FLAGS(X) ((X) & 0x3f) argument 73 #define ACCEPT2_FLAGS(X) ACCEPT1_FLAGS((X) >> YYTD_ID_ACCEPT2) argument 74 #define TO_ACCEPT1_FLAG(X) ACCEPT1_FLAGS(X) argument 75 #define TO_ACCEPT2_FLAG(X) (ACCEPT1_FLAGS(X) << YYTD_ID_ACCEPT2) argument 103 #define byte_to_byte(X) (X) argument
|
D | label.h | 144 #define label_isprofile(X) ((X)->flags & FLAG_PROFILE) argument 145 #define label_unconfined(X) ((X)->flags & FLAG_UNCONFINED) argument 146 #define unconfined(X) label_unconfined(X) argument 147 #define label_is_stale(X) ((X)->flags & FLAG_STALE) argument 148 #define __label_make_stale(X) ((X)->flags |= FLAG_STALE) argument 149 #define labels_ns(X) (vec_ns(&((X)->vec[0]), (X)->size)) argument 150 #define labels_set(X) (&labels_ns(X)->labels) argument 151 #define labels_profile(X) ((X)->vec[(X)->size - 1]) argument
|
D | lib.h | 37 #define AA_WARN(X) WARN((X), "APPARMOR WARN %s: %s\n", __func__, #X) argument 39 #define AA_BUG(X, args...) AA_BUG_FMT((X), "" args) argument 41 #define AA_BUG_FMT(X, fmt, args...) \ argument 42 WARN((X), "AppArmor WARN %s: (" #X "): " fmt, __func__, ##args) 44 #define AA_BUG_FMT(X, fmt, args...) argument
|
D | file.h | 23 #define mask_mode_t(X) (X & (MAY_EXEC | MAY_WRITE | MAY_READ | MAY_APPEND)) argument 109 #define COMBINED_PERM_MASK(X) ((X).allow | (X).audit | (X).quiet | (X).kill) argument
|
D | net.h | 54 #define SK_CTX(X) ((X)->sk_security) argument 55 #define SOCK_ctx(X) SOCK_INODE(X)->i_security argument
|
D | policy.h | 53 #define on_list_rcu(X) (!list_empty(X) && (X)->prev != LIST_POISON2) argument 201 #define profile_unconfined(X) ((X)->mode == APPARMOR_UNCONFINED) argument
|
D | cred.h | 110 #define __end_current_label_crit_section(X) end_current_label_crit_section(X) argument
|
D | audit.h | 158 #define DEFINE_AUDIT_DATA(NAME, T, X) \ argument 160 struct apparmor_audit_data NAME ## _aad = { .op = (X), }; \
|
/security/apparmor/ |
D | policy_unpack.c | 31 #define VERSION_LT(X, Y) (((X) & K_ABI_MASK) < ((Y) & K_ABI_MASK)) argument 32 #define VERSION_GT(X, Y) (((X) & K_ABI_MASK) > ((Y) & K_ABI_MASK)) argument
|
D | match.c | 22 #define base_idx(X) ((X) & 0xffffff) argument
|