Searched refs:avd (Results 1 – 8 of 8) sorted by relevance
/linux/security/selinux/ |
A D | avc.c | 51 struct av_decision avd; member 388 struct av_decision *avd, in avc_xperms_audit_required() argument 524 memcpy(&node->ae.avd, avd, sizeof(node->ae.avd)); in avc_node_populate() 1043 struct av_decision avd; in avc_has_extended_perms() local 1064 memcpy(&avd, &node->ae.avd, sizeof(avd)); in avc_has_extended_perms() 1098 avd.allowed &= ~requested; in avc_has_extended_perms() 1140 struct av_decision *avd) in avc_has_perm_noaudit() argument 1156 memcpy(avd, &node->ae.avd, sizeof(*avd)); in avc_has_perm_noaudit() 1161 flags, avd); in avc_has_perm_noaudit() 1187 struct av_decision avd; in avc_has_perm() local [all …]
|
A D | selinuxfs.c | 915 struct av_decision avd; in sel_write_access() local 946 security_compute_av_user(state, ssid, tsid, tclass, &avd); in sel_write_access() 950 avd.allowed, 0xffffffff, in sel_write_access() 951 avd.auditallow, avd.auditdeny, in sel_write_access() 952 avd.seqno, avd.flags); in sel_write_access()
|
A D | hooks.c | 1638 struct av_decision avd; in cred_has_capability() local 1661 sid, sid, sclass, av, 0, &avd); in cred_has_capability() 1664 sid, sid, sclass, av, &avd, rc, &ad); in cred_has_capability() 3173 struct av_decision avd; in selinux_inode_permission() local 3198 &avd); in selinux_inode_permission() 3199 audited = avc_audit_required(perms, &avd, rc, in selinux_inode_permission()
|
/linux/security/selinux/include/ |
A D | avc.h | 65 struct av_decision *avd, in avc_audit_required() argument 71 denied = requested & ~avd->allowed; in avc_audit_required() 73 audited = denied & avd->auditdeny; in avc_audit_required() 90 if (auditdeny && !(auditdeny & avd->auditdeny)) in avc_audit_required() 95 audited = requested & avd->auditallow; in avc_audit_required() 127 struct av_decision *avd, in avc_audit() argument 132 audited = avc_audit_required(requested, avd, result, 0, &denied); in avc_audit() 146 struct av_decision *avd);
|
A D | security.h | 281 u16 tclass, struct av_decision *avd, 291 u16 tclass, struct av_decision *avd);
|
/linux/security/selinux/ss/ |
A D | services.c | 220 avd->allowed = result; in map_decision() 635 avd->allowed = 0; in context_struct_compute_av() 636 avd->auditallow = 0; in context_struct_compute_av() 679 avd, xperms); in context_struct_compute_av() 721 tclass, avd); in context_struct_compute_av() 951 avd->allowed = 0; in avd_init() 952 avd->auditallow = 0; in avd_init() 957 avd->seqno = 0; in avd_init() 958 avd->flags = 0; in avd_init() 1127 avd_init(policy, avd); in security_compute_av() [all …]
|
A D | conditional.c | 576 struct av_decision *avd, struct extended_perms *xperms) in cond_compute_av() argument 580 if (!ctab || !key || !avd) in cond_compute_av() 587 avd->allowed |= node->datum.u.data; in cond_compute_av() 595 avd->auditdeny &= node->datum.u.data; in cond_compute_av() 598 avd->auditallow |= node->datum.u.data; in cond_compute_av()
|
A D | conditional.h | 78 struct av_decision *avd, struct extended_perms *xperms);
|
Completed in 46 milliseconds