Searched refs:AA_CLASS_FILE (Results 1 – 5 of 5) sorted by relevance
/openbmc/linux/security/apparmor/include/ |
H A D | apparmor.h | 21 #define AA_CLASS_FILE 2 macro
|
/openbmc/linux/security/apparmor/ |
H A D | policy_unpack.c | 757 if (!aa_unpack_u32(e, &policy->start[AA_CLASS_FILE], "dfa_start")) { in unpack_pdb() 759 policy->start[AA_CLASS_FILE] = DFA_START; in unpack_pdb() 761 for (i = AA_CLASS_FILE + 1; i <= AA_CLASS_LAST; i++) { in unpack_pdb() 989 AA_CLASS_FILE)) in unpack_profile() 990 rules->policy.start[AA_CLASS_FILE] = in unpack_profile() 993 AA_CLASS_FILE); in unpack_profile() 1025 rules->policy.start[AA_CLASS_FILE]) { in unpack_profile() 1027 rules->file.start[AA_CLASS_FILE] = rules->policy.start[AA_CLASS_FILE]; in unpack_profile()
|
H A D | file.c | 101 DEFINE_AUDIT_DATA(ad, LSM_AUDIT_DATA_TASK, AA_CLASS_FILE, op); in aa_audit_file() 239 aa_str_perms(&(rules->file), rules->file.start[AA_CLASS_FILE], in __aa_path_perm() 357 rules->file.start[AA_CLASS_FILE], lname, in profile_path_link() 387 aa_str_perms(&(rules->file), rules->file.start[AA_CLASS_FILE], in profile_path_link()
|
H A D | domain.c | 639 aa_state_t state = rules->file.start[AA_CLASS_FILE]; in profile_transition() 739 aa_state_t state = rules->file.start[AA_CLASS_FILE]; in profile_onexec() 1301 rules->file.start[AA_CLASS_FILE], in change_profile_perms_wrapper()
|
H A D | apparmorfs.c | 622 if (rules->file.dfa && *match_str == AA_CLASS_FILE) { in profile_query_cb() 624 rules->file.start[AA_CLASS_FILE], in profile_query_cb()
|