Searched defs:state (Results 1 - 4 of 4) sorted by relevance
/security/apparmor/ |
H A D | match.c | 285 * aa_dfa_match_len - traverse @dfa to find state @str stops at 287 * @start: the state of the dfa to start matching in 291 * aa_dfa_match_len will match @str against the dfa and return the state it 292 * finished matching in. The final state can be used to look up the accepting 293 * label, or as the start state of a continuing match. 298 * Returns: final state reached after input is consumed 307 unsigned int state = start, pos; local 309 if (state == 0) 312 /* current state is <state>, matchin 357 unsigned int state = start, pos; local 398 aa_dfa_next(struct aa_dfa *dfa, unsigned int state, const char c) argument [all...] |
H A D | file.c | 186 * @state: state in dfa 189 * TODO: convert from dfa + state to permission entry, do computation conversion 194 static struct file_perms compute_perms(struct aa_dfa *dfa, unsigned int state, argument 207 perms.allow = map_old_perms(dfa_user_allow(dfa, state)); 208 perms.audit = map_old_perms(dfa_user_audit(dfa, state)); 209 perms.quiet = map_old_perms(dfa_user_quiet(dfa, state)); 210 perms.xindex = dfa_user_xindex(dfa, state); 212 perms.allow = map_old_perms(dfa_other_allow(dfa, state)); 213 perms.audit = map_old_perms(dfa_other_audit(dfa, state)); 242 unsigned int state; local 361 unsigned int state; local [all...] |
H A D | domain.c | 91 * @start: state to start matching in 102 unsigned int state; local 118 state = aa_dfa_match(profile->file.dfa, start, ns->base.name); 119 state = aa_dfa_match_len(profile->file.dfa, state, ":", 1); 120 aa_str_perms(profile->file.dfa, state, name, &cond, &perms); 149 unsigned int state = aa_dfa_match(profile->xmatch, local 151 u32 perm = dfa_user_allow(profile->xmatch, state); 152 /* any accepting state means a valid match. */ 343 unsigned int state; local [all...] |
/security/selinux/ss/ |
H A D | policydb.h | 151 int state; member in struct:cond_bool_datum
|
Completed in 178 milliseconds