/Linux-v4.19/security/selinux/ |
D | avc.c | 51 struct av_decision avd; member 456 struct av_decision *avd, in avc_xperms_audit_required() argument 464 denied = requested & ~avd->allowed; in avc_xperms_audit_required() 466 audited = denied & avd->auditdeny; in avc_xperms_audit_required() 474 audited = requested & avd->auditallow; in avc_xperms_audit_required() 487 u32 requested, struct av_decision *avd, in avc_xperms_audit() argument 495 requested, avd, xpd, perm, result, &denied); in avc_xperms_audit() 587 …d avc_node_populate(struct avc_node *node, u32 ssid, u32 tsid, u16 tclass, struct av_decision *avd) in avc_node_populate() argument 592 memcpy(&node->ae.avd, avd, sizeof(node->ae.avd)); in avc_node_populate() 686 struct av_decision *avd, in avc_insert() argument [all …]
|
D | selinuxfs.c | 820 struct av_decision avd; in sel_write_access() local 851 security_compute_av_user(state, ssid, tsid, tclass, &avd); in sel_write_access() 855 avd.allowed, 0xffffffff, in sel_write_access() 856 avd.auditallow, avd.auditdeny, in sel_write_access() 857 avd.seqno, avd.flags); in sel_write_access()
|
D | hooks.c | 1770 struct av_decision avd; in cred_has_capability() local 1793 sid, sid, sclass, av, 0, &avd); in cred_has_capability() 1796 sid, sid, sclass, av, &avd, rc, &ad, 0); in cred_has_capability() 3170 struct av_decision avd; in selinux_inode_permission() local 3194 sid, isec->sid, isec->sclass, perms, 0, &avd); in selinux_inode_permission() 3195 audited = avc_audit_required(perms, &avd, rc, in selinux_inode_permission()
|
/Linux-v4.19/security/selinux/include/ |
D | avc.h | 65 struct av_decision *avd, in avc_audit_required() argument 71 denied = requested & ~avd->allowed; in avc_audit_required() 73 audited = denied & avd->auditdeny; in avc_audit_required() 90 if (auditdeny && !(auditdeny & avd->auditdeny)) in avc_audit_required() 95 audited = requested & avd->auditallow; in avc_audit_required() 129 struct av_decision *avd, in avc_audit() argument 135 audited = avc_audit_required(requested, avd, result, 0, &denied); in avc_audit() 149 struct av_decision *avd);
|
D | security.h | 226 u16 tclass, struct av_decision *avd, 236 u16 tclass, struct av_decision *avd);
|
/Linux-v4.19/security/selinux/ss/ |
D | services.c | 102 struct av_decision *avd, 210 u16 tclass, struct av_decision *avd, in map_decision() argument 219 if (avd->allowed & mapping->perms[i]) in map_decision() 224 avd->allowed = result; in map_decision() 227 if (avd->auditallow & mapping->perms[i]) in map_decision() 229 avd->auditallow = result; in map_decision() 232 if (avd->auditdeny & mapping->perms[i]) in map_decision() 244 avd->auditdeny = result; in map_decision() 540 struct av_decision *avd) in type_attribute_bounds_av() argument 577 masked = ~lo_avd.allowed & avd->allowed; in type_attribute_bounds_av() [all …]
|
D | conditional.c | 639 struct av_decision *avd, struct extended_perms *xperms) in cond_compute_av() argument 643 if (!ctab || !key || !avd) in cond_compute_av() 650 avd->allowed |= node->datum.u.data; in cond_compute_av() 658 avd->auditdeny &= node->datum.u.data; in cond_compute_av() 661 avd->auditallow |= node->datum.u.data; in cond_compute_av()
|
D | conditional.h | 77 struct av_decision *avd, struct extended_perms *xperms);
|