lib.c (bf690f59d0429c62de4db1234f16557eedcb39bf) | lib.c (33fc95d8293cfca352ac875668857293e22d7d51) |
---|---|
1// SPDX-License-Identifier: GPL-2.0-only 2/* 3 * AppArmor security module 4 * 5 * This file contains basic common functions used in AppArmor 6 * 7 * Copyright (C) 1998-2008 Novell/SUSE 8 * Copyright 2009-2010 Canonical Ltd. --- 343 unchanged lines hidden (view full) --- 352 accum->prompt |= addend->prompt & ~accum->allow & ~accum->deny; 353 accum->subtree &= addend->subtree & ~accum->deny; 354} 355 356void aa_profile_match_label(struct aa_profile *profile, struct aa_label *label, 357 int type, u32 request, struct aa_perms *perms) 358{ 359 /* TODO: doesn't yet handle extended types */ | 1// SPDX-License-Identifier: GPL-2.0-only 2/* 3 * AppArmor security module 4 * 5 * This file contains basic common functions used in AppArmor 6 * 7 * Copyright (C) 1998-2008 Novell/SUSE 8 * Copyright 2009-2010 Canonical Ltd. --- 343 unchanged lines hidden (view full) --- 352 accum->prompt |= addend->prompt & ~accum->allow & ~accum->deny; 353 accum->subtree &= addend->subtree & ~accum->deny; 354} 355 356void aa_profile_match_label(struct aa_profile *profile, struct aa_label *label, 357 int type, u32 request, struct aa_perms *perms) 358{ 359 /* TODO: doesn't yet handle extended types */ |
360 unsigned int state; | 360 aa_state_t state; |
361 362 state = aa_dfa_next(profile->policy.dfa, 363 profile->policy.start[AA_CLASS_LABEL], 364 type); 365 aa_label_match(profile, label, state, false, request, perms); 366} 367 368 --- 132 unchanged lines hidden --- | 361 362 state = aa_dfa_next(profile->policy.dfa, 363 profile->policy.start[AA_CLASS_LABEL], 364 type); 365 aa_label_match(profile, label, state, false, request, perms); 366} 367 368 --- 132 unchanged lines hidden --- |