/linux-master/security/selinux/include/ |
H A D | avc.h | 64 static inline u32 avc_audit_required(u32 requested, struct av_decision *avd, argument 68 denied = requested & ~avd->allowed; 70 audited = denied & avd->auditdeny; 80 * avd.auditdeny & ACCESS == 0 (not set means explicit rule) 87 if (auditdeny && !(auditdeny & avd->auditdeny)) 92 audited = requested & avd->auditallow; 106 * @avd: access vector decisions 120 struct av_decision *avd, int result, 124 audited = avc_audit_required(requested, avd, result, 0, &denied); 134 unsigned int flags, struct av_decision *avd); 119 avc_audit(u32 ssid, u32 tsid, u16 tclass, u32 requested, struct av_decision *avd, int result, struct common_audit_data *a) argument [all...] |
H A D | security.h | 250 struct av_decision *avd, 257 struct av_decision *avd);
|
/linux-master/arch/riscv/kernel/vdso/ |
H A D | hwprobe.c | 20 const struct arch_vdso_data *avd = &vd->arch_data; local 31 if ((flags != 0) || (!all_cpus && !avd->homogeneous_cpus)) 37 p->value = avd->all_cpu_hwprobe_values[p->key]; 55 const struct arch_vdso_data *avd = &vd->arch_data; local 73 if (empty_cpus || flags != RISCV_HWPROBE_WHICH_CPUS || !avd->homogeneous_cpus) 80 .value = avd->all_cpu_hwprobe_values[p->key],
|
/linux-master/security/selinux/ |
H A D | avc.c | 51 struct av_decision avd; member in struct:avc_entry 386 struct av_decision *avd, 394 denied = requested & ~avd->allowed; 396 audited = denied & avd->auditdeny; 404 audited = requested & avd->auditallow; 416 u32 requested, struct av_decision *avd, 424 requested, avd, xpd, perm, result, &denied); 515 static void avc_node_populate(struct avc_node *node, u32 ssid, u32 tsid, u16 tclass, struct av_decision *avd) argument 520 memcpy(&node->ae.avd, avd, sizeo 385 avc_xperms_audit_required(u32 requested, struct av_decision *avd, struct extended_perms_decision *xpd, u8 perm, int result, u32 *deniedp) argument 415 avc_xperms_audit(u32 ssid, u32 tsid, u16 tclass, u32 requested, struct av_decision *avd, struct extended_perms_decision *xpd, u8 perm, int result, struct common_audit_data *ad) argument 608 avc_insert(u32 ssid, u32 tsid, u16 tclass, struct av_decision *avd, struct avc_xperms_node *xp_node) argument 985 avc_compute_av(u32 ssid, u32 tsid, u16 tclass, struct av_decision *avd, struct avc_xperms_node *xp_node) argument 994 avc_denied(u32 ssid, u32 tsid, u16 tclass, u32 requested, u8 driver, u8 xperm, unsigned int flags, struct av_decision *avd) argument 1022 struct av_decision avd; local 1107 avc_perm_nonode(u32 ssid, u32 tsid, u16 tclass, u32 requested, unsigned int flags, struct av_decision *avd) argument 1142 avc_has_perm_noaudit(u32 ssid, u32 tsid, u16 tclass, u32 requested, unsigned int flags, struct av_decision *avd) argument 1189 struct av_decision avd; local [all...] |
H A D | selinuxfs.c | 859 struct av_decision avd; local 889 security_compute_av_user(ssid, tsid, tclass, &avd); 893 avd.allowed, 0xffffffff, 894 avd.auditallow, avd.auditdeny, 895 avd.seqno, avd.flags);
|
H A D | hooks.c | 1623 struct av_decision avd; local 1645 rc = avc_has_perm_noaudit(sid, sid, sclass, av, 0, &avd); 1647 int rc2 = avc_audit(sid, sid, sclass, av, &avd, rc, &ad); 3103 struct av_decision avd; local 3125 &avd); 3126 audited = avc_audit_required(perms, &avd, rc,
|
/linux-master/security/selinux/ss/ |
H A D | conditional.h | 77 struct av_decision *avd, struct extended_perms *xperms);
|
H A D | services.c | 92 struct av_decision *avd, 200 u16 tclass, struct av_decision *avd, 209 if (avd->allowed & mapping->perms[i]) 214 avd->allowed = result; 217 if (avd->auditallow & mapping->perms[i]) 219 avd->auditallow = result; 222 if (avd->auditdeny & mapping->perms[i]) 234 avd->auditdeny = result; 536 struct av_decision *avd) 571 masked = ~lo_avd.allowed & avd 199 map_decision(struct selinux_map *map, u16 tclass, struct av_decision *avd, int allow_unknown) argument 532 type_attribute_bounds_av(struct policydb *policydb, struct context *scontext, struct context *tcontext, u16 tclass, struct av_decision *avd) argument 611 context_struct_compute_av(struct policydb *policydb, struct context *scontext, struct context *tcontext, u16 tclass, struct av_decision *avd, struct extended_perms *xperms) argument 934 avd_init(struct selinux_policy *policy, struct av_decision *avd) argument 1095 security_compute_av(u32 ssid, u32 tsid, u16 orig_tclass, struct av_decision *avd, struct extended_perms *xperms) argument 1153 security_compute_av_user(u32 ssid, u32 tsid, u16 tclass, struct av_decision *avd) argument [all...] |
H A D | conditional.c | 574 struct av_decision *avd, struct extended_perms *xperms) 578 if (!ctab || !key || !avd) 585 avd->allowed |= node->datum.u.data; 593 avd->auditdeny &= node->datum.u.data; 596 avd->auditallow |= node->datum.u.data; 573 cond_compute_av(struct avtab *ctab, struct avtab_key *key, struct av_decision *avd, struct extended_perms *xperms) argument
|
/linux-master/arch/riscv/kernel/ |
H A D | sys_hwprobe.c | 379 struct arch_vdso_data *avd = &vd->arch_data; local 394 avd->all_cpu_hwprobe_values[key] = pair.value; 410 avd->homogeneous_cpus = id_bitsmash != 0 && id_bitsmash != -1;
|