Lines Matching defs:state

113 static inline bool selinux_initialized(const struct selinux_state *state)
116 return smp_load_acquire(&state->initialized);
119 static inline void selinux_mark_initialized(struct selinux_state *state)
122 smp_store_release(&state->initialized, true);
126 static inline bool enforcing_enabled(struct selinux_state *state)
128 return READ_ONCE(state->enforcing);
131 static inline void enforcing_set(struct selinux_state *state, bool value)
133 WRITE_ONCE(state->enforcing, value);
136 static inline bool enforcing_enabled(struct selinux_state *state)
141 static inline void enforcing_set(struct selinux_state *state, bool value)
146 static inline bool checkreqprot_get(const struct selinux_state *state)
148 return READ_ONCE(state->checkreqprot);
151 static inline void checkreqprot_set(struct selinux_state *state, bool value)
153 WRITE_ONCE(state->checkreqprot, value);
157 static inline bool selinux_disabled(struct selinux_state *state)
159 return READ_ONCE(state->disabled);
162 static inline void selinux_mark_disabled(struct selinux_state *state)
164 WRITE_ONCE(state->disabled, true);
167 static inline bool selinux_disabled(struct selinux_state *state)
175 struct selinux_state *state = &selinux_state;
177 return READ_ONCE(state->policycap[POLICYDB_CAPABILITY_NETPEER]);
182 struct selinux_state *state = &selinux_state;
184 return READ_ONCE(state->policycap[POLICYDB_CAPABILITY_OPENPERM]);
189 struct selinux_state *state = &selinux_state;
191 return READ_ONCE(state->policycap[POLICYDB_CAPABILITY_EXTSOCKCLASS]);
196 struct selinux_state *state = &selinux_state;
198 return READ_ONCE(state->policycap[POLICYDB_CAPABILITY_ALWAYSNETWORK]);
203 struct selinux_state *state = &selinux_state;
205 return READ_ONCE(state->policycap[POLICYDB_CAPABILITY_CGROUPSECLABEL]);
210 struct selinux_state *state = &selinux_state;
212 return READ_ONCE(state->policycap[POLICYDB_CAPABILITY_NNP_NOSUID_TRANSITION]);
217 struct selinux_state *state = &selinux_state;
219 return READ_ONCE(state->policycap[POLICYDB_CAPABILITY_GENFS_SECLABEL_SYMLINKS]);
224 struct selinux_state *state = &selinux_state;
226 return READ_ONCE(state->policycap[POLICYDB_CAPABILITY_IOCTL_SKIP_CLOEXEC]);
236 int security_mls_enabled(struct selinux_state *state);
237 int security_load_policy(struct selinux_state *state,
240 void selinux_policy_commit(struct selinux_state *state,
242 void selinux_policy_cancel(struct selinux_state *state,
244 int security_read_policy(struct selinux_state *state,
247 int security_policycap_supported(struct selinux_state *state,
285 void security_compute_av(struct selinux_state *state,
290 void security_compute_xperms_decision(struct selinux_state *state,
295 void security_compute_av_user(struct selinux_state *state,
299 int security_transition_sid(struct selinux_state *state,
303 int security_transition_sid_user(struct selinux_state *state,
307 int security_member_sid(struct selinux_state *state, u32 ssid, u32 tsid,
310 int security_change_sid(struct selinux_state *state, u32 ssid, u32 tsid,
313 int security_sid_to_context(struct selinux_state *state, u32 sid,
316 int security_sid_to_context_force(struct selinux_state *state,
319 int security_sid_to_context_inval(struct selinux_state *state,
322 int security_context_to_sid(struct selinux_state *state,
326 int security_context_str_to_sid(struct selinux_state *state,
329 int security_context_to_sid_default(struct selinux_state *state,
333 int security_context_to_sid_force(struct selinux_state *state,
337 int security_get_user_sids(struct selinux_state *state,
341 int security_port_sid(struct selinux_state *state,
344 int security_ib_pkey_sid(struct selinux_state *state,
347 int security_ib_endport_sid(struct selinux_state *state,
350 int security_netif_sid(struct selinux_state *state,
353 int security_node_sid(struct selinux_state *state,
357 int security_validate_transition(struct selinux_state *state,
361 int security_validate_transition_user(struct selinux_state *state,
365 int security_bounded_transition(struct selinux_state *state,
368 int security_sid_mls_copy(struct selinux_state *state,
371 int security_net_peersid_resolve(struct selinux_state *state,
380 int security_get_reject_unknown(struct selinux_state *state);
381 int security_get_allow_unknown(struct selinux_state *state);
392 int security_fs_use(struct selinux_state *state, struct super_block *sb);
394 int security_genfs_sid(struct selinux_state *state,
403 int security_netlbl_secattr_to_sid(struct selinux_state *state,
407 int security_netlbl_sid_to_secattr(struct selinux_state *state,
411 static inline int security_netlbl_secattr_to_sid(struct selinux_state *state,
418 static inline int security_netlbl_sid_to_secattr(struct selinux_state *state,
431 extern struct page *selinux_kernel_status_page(struct selinux_state *state);
445 extern void selinux_status_update_setenforce(struct selinux_state *state,
447 extern void selinux_status_update_policyload(struct selinux_state *state,
450 extern int selinux_disable(struct selinux_state *state);
461 extern int security_sidtab_hash_stats(struct selinux_state *state, char *page);