Home
last modified time | relevance | path

Searched refs:audited (Results 1 – 11 of 11) sorted by relevance

/linux/security/selinux/include/
A Davc.h52 u32 audited; member
70 u32 denied, audited; in avc_audit_required() local
73 audited = denied & avd->auditdeny; in avc_audit_required()
91 audited = 0; in avc_audit_required()
93 audited = denied = requested; in avc_audit_required()
95 audited = requested & avd->auditallow; in avc_audit_required()
97 return audited; in avc_audit_required()
102 u32 requested, u32 audited, u32 denied, int result,
131 u32 audited, denied; in avc_audit() local
133 if (likely(!audited)) in avc_audit()
[all …]
/linux/include/trace/events/
A Davc.h27 __field(u32, audited)
37 __entry->audited = sad->audited;
45 __entry->requested, __entry->denied, __entry->audited, __entry->result,
/linux/security/selinux/
A Davc.c394 u32 denied, audited; in avc_xperms_audit_required() local
399 if (audited && xpd) { in avc_xperms_audit_required()
401 audited &= ~requested; in avc_xperms_audit_required()
404 audited = denied = requested; in avc_xperms_audit_required()
407 if (audited && xpd) { in avc_xperms_audit_required()
409 audited &= ~requested; in avc_xperms_audit_required()
414 return audited; in avc_xperms_audit_required()
424 u32 audited, denied; in avc_xperms_audit() local
428 if (likely(!audited)) in avc_xperms_audit()
670 u32 av = sad->audited; in avc_audit_pre_callback()
[all …]
A Dhooks.c3151 u32 perms, u32 audited, u32 denied, in audit_inode_permission() argument
3162 audited, denied, result, &ad); in audit_inode_permission()
3175 u32 audited, denied; in selinux_inode_permission() local
3199 audited = avc_audit_required(perms, &avd, rc, in selinux_inode_permission()
3202 if (likely(!audited)) in selinux_inode_permission()
3205 rc2 = audit_inode_permission(inode, perms, audited, denied, rc); in selinux_inode_permission()
/linux/Documentation/block/
A Dbiovecs.rst91 audited to make sure they are - submitting partially completed bios is
/linux/drivers/char/
A DKconfig438 something that can be independently audited, this amounts to trusting
/linux/Documentation/admin-guide/LSM/
A DSmack.rst832 By default, all denied events will be audited. You can change this behavior by
843 audited.
/linux/Documentation/admin-guide/hw-vuln/
A Dl1tf.rst192 only audited code paths before the corresponding VMENTER. These code
/linux/arch/
A DKconfig817 Before enabling this option, arch code must be audited
/linux/Documentation/filesystems/
A Dpath-lookup.rst1298 context of a particular access being audited.
/linux/Documentation/RCU/Design/Requirements/
A DRequirements.rst1604 Gleixner audited a number of RCU uses.

Completed in 42 milliseconds