Home
last modified time | relevance | path

Searched refs:audited (Results 1 – 9 of 9) sorted by relevance

/Linux-v5.4/security/selinux/include/
Davc.h52 u32 audited; member
70 u32 denied, audited; in avc_audit_required() local
73 audited = denied & avd->auditdeny; in avc_audit_required()
91 audited = 0; in avc_audit_required()
93 audited = denied = requested; in avc_audit_required()
95 audited = requested & avd->auditallow; in avc_audit_required()
97 return audited; in avc_audit_required()
102 u32 requested, u32 audited, u32 denied, int result,
134 u32 audited, denied; in avc_audit() local
135 audited = avc_audit_required(requested, avd, result, 0, &denied); in avc_audit()
[all …]
/Linux-v5.4/security/selinux/
Davc.c390 u32 denied, audited; in avc_xperms_audit_required() local
394 audited = denied & avd->auditdeny; in avc_xperms_audit_required()
395 if (audited && xpd) { in avc_xperms_audit_required()
397 audited &= ~requested; in avc_xperms_audit_required()
400 audited = denied = requested; in avc_xperms_audit_required()
402 audited = requested & avd->auditallow; in avc_xperms_audit_required()
403 if (audited && xpd) { in avc_xperms_audit_required()
405 audited &= ~requested; in avc_xperms_audit_required()
410 return audited; in avc_xperms_audit_required()
420 u32 audited, denied; in avc_xperms_audit() local
[all …]
Dhooks.c3016 u32 perms, u32 audited, u32 denied, in audit_inode_permission() argument
3029 audited, denied, result, &ad, flags); in audit_inode_permission()
3045 u32 audited, denied; in selinux_inode_permission() local
3070 audited = avc_audit_required(perms, &avd, rc, in selinux_inode_permission()
3073 if (likely(!audited)) in selinux_inode_permission()
3076 rc2 = audit_inode_permission(inode, perms, audited, denied, rc, flags); in selinux_inode_permission()
/Linux-v5.4/Documentation/block/
Dbiovecs.rst89 audited to make sure they are - submitting partially completed bios is
/Linux-v5.4/Documentation/admin-guide/LSM/
DSmack.rst832 By default, all denied events will be audited. You can change this behavior by
843 audited.
/Linux-v5.4/drivers/char/
DKconfig548 something that can be independently audited, this amounts to trusting
/Linux-v5.4/Documentation/admin-guide/hw-vuln/
Dl1tf.rst192 only audited code paths before the corresponding VMENTER. These code
/Linux-v5.4/arch/
DKconfig555 Before enabling this option, arch code must be audited
/Linux-v5.4/Documentation/filesystems/
Dpath-lookup.rst1304 context of a particular access being audited.