/linux-4.1.27/security/selinux/ |
D | avc.c | 50 struct av_decision avd; member 288 …d avc_node_populate(struct avc_node *node, u32 ssid, u32 tsid, u16 tclass, struct av_decision *avd) in avc_node_populate() argument 293 memcpy(&node->ae.avd, avd, sizeof(node->ae.avd)); in avc_node_populate() 381 static struct avc_node *avc_insert(u32 ssid, u32 tsid, u16 tclass, struct av_decision *avd) in avc_insert() argument 387 if (avc_latest_notif_update(avd->seqno, 1)) in avc_insert() 396 avc_node_populate(node, ssid, tsid, tclass, avd); in avc_insert() 559 seqno == pos->ae.avd.seqno){ in avc_update_node() 575 avc_node_populate(node, ssid, tsid, tclass, &orig->ae.avd); in avc_update_node() 579 node->ae.avd.allowed |= perms; in avc_update_node() 583 node->ae.avd.allowed &= ~perms; in avc_update_node() [all …]
|
D | selinuxfs.c | 713 struct av_decision avd; in sel_write_access() local 744 security_compute_av_user(ssid, tsid, tclass, &avd); in sel_write_access() 748 avd.allowed, 0xffffffff, in sel_write_access() 749 avd.auditallow, avd.auditdeny, in sel_write_access() 750 avd.seqno, avd.flags); in sel_write_access()
|
D | hooks.c | 1543 struct av_decision avd; in cred_has_capability() local 1566 rc = avc_has_perm_noaudit(sid, sid, sclass, av, 0, &avd); in cred_has_capability() 1568 int rc2 = avc_audit(sid, sid, sclass, av, &avd, rc, &ad); in cred_has_capability() 2899 struct av_decision avd; in selinux_inode_permission() local 2920 rc = avc_has_perm_noaudit(sid, isec->sid, isec->sclass, perms, 0, &avd); in selinux_inode_permission() 2921 audited = avc_audit_required(perms, &avd, rc, in selinux_inode_permission()
|
/linux-4.1.27/security/selinux/include/ |
D | avc.h | 69 struct av_decision *avd, in avc_audit_required() argument 75 denied = requested & ~avd->allowed; in avc_audit_required() 77 audited = denied & avd->auditdeny; in avc_audit_required() 94 if (auditdeny && !(auditdeny & avd->auditdeny)) in avc_audit_required() 99 audited = requested & avd->auditallow; in avc_audit_required() 131 struct av_decision *avd, in avc_audit() argument 136 audited = avc_audit_required(requested, avd, result, 0, &denied); in avc_audit() 148 struct av_decision *avd);
|
D | security.h | 115 u16 tclass, struct av_decision *avd); 118 u16 tclass, struct av_decision *avd);
|
/linux-4.1.27/security/selinux/ss/ |
D | services.c | 98 struct av_decision *avd); 218 static void map_decision(u16 tclass, struct av_decision *avd, in map_decision() argument 226 if (avd->allowed & current_mapping[tclass].perms[i]) in map_decision() 231 avd->allowed = result; in map_decision() 234 if (avd->auditallow & current_mapping[tclass].perms[i]) in map_decision() 236 avd->auditallow = result; in map_decision() 239 if (avd->auditdeny & current_mapping[tclass].perms[i]) in map_decision() 251 avd->auditdeny = result; in map_decision() 542 struct av_decision *avd) in type_attribute_bounds_av() argument 569 if ((lo_avd.allowed & avd->allowed) == avd->allowed) in type_attribute_bounds_av() [all …]
|
D | conditional.c | 618 void cond_compute_av(struct avtab *ctab, struct avtab_key *key, struct av_decision *avd) in cond_compute_av() argument 622 if (!ctab || !key || !avd) in cond_compute_av() 629 avd->allowed |= node->datum.data; in cond_compute_av() 637 avd->auditdeny &= node->datum.data; in cond_compute_av() 640 avd->auditallow |= node->datum.data; in cond_compute_av()
|
D | conditional.h | 76 void cond_compute_av(struct avtab *ctab, struct avtab_key *key, struct av_decision *avd);
|