avd 48 security/selinux/avc.c struct av_decision avd; avd 384 security/selinux/avc.c struct av_decision *avd, avd 392 security/selinux/avc.c denied = requested & ~avd->allowed; avd 394 security/selinux/avc.c audited = denied & avd->auditdeny; avd 402 security/selinux/avc.c audited = requested & avd->auditallow; avd 415 security/selinux/avc.c u32 requested, struct av_decision *avd, avd 423 security/selinux/avc.c requested, avd, xpd, perm, result, &denied); avd 515 security/selinux/avc.c static void avc_node_populate(struct avc_node *node, u32 ssid, u32 tsid, u16 tclass, struct av_decision *avd) avd 520 security/selinux/avc.c memcpy(&node->ae.avd, avd, sizeof(node->ae.avd)); avd 614 security/selinux/avc.c struct av_decision *avd, avd 623 security/selinux/avc.c if (avc_latest_notif_update(avc, avd->seqno, 1)) avd 630 security/selinux/avc.c avc_node_populate(node, ssid, tsid, tclass, avd); avd 873 security/selinux/avc.c seqno == pos->ae.avd.seqno){ avd 889 security/selinux/avc.c avc_node_populate(node, ssid, tsid, tclass, &orig->ae.avd); avd 901 security/selinux/avc.c node->ae.avd.allowed |= perms; avd 907 security/selinux/avc.c node->ae.avd.allowed &= ~perms; avd 910 security/selinux/avc.c node->ae.avd.auditallow |= perms; avd 913 security/selinux/avc.c node->ae.avd.auditallow &= ~perms; avd 916 security/selinux/avc.c node->ae.avd.auditdeny |= perms; avd 919 security/selinux/avc.c node->ae.avd.auditdeny &= ~perms; avd 997 security/selinux/avc.c u16 tclass, struct av_decision *avd, avd 1002 security/selinux/avc.c security_compute_av(state, ssid, tsid, tclass, avd, &xp_node->xp); avd 1004 security/selinux/avc.c return avc_insert(state->avc, ssid, tsid, tclass, avd, xp_node); avd 1011 security/selinux/avc.c struct av_decision *avd) avd 1017 security/selinux/avc.c !(avd->flags & AVD_FLAGS_PERMISSIVE)) avd 1021 security/selinux/avc.c xperm, ssid, tsid, tclass, avd->seqno, NULL, flags); avd 1037 security/selinux/avc.c struct av_decision avd; avd 1056 security/selinux/avc.c node = avc_compute_av(state, ssid, tsid, tclass, &avd, xp_node); avd 1058 security/selinux/avc.c memcpy(&avd, &node->ae.avd, sizeof(avd)); avd 1076 security/selinux/avc.c avd.allowed &= ~requested; avd 1084 security/selinux/avc.c driver, xperm, ssid, tsid, tclass, avd.seqno, avd 1092 security/selinux/avc.c avd.allowed &= ~requested; avd 1095 security/selinux/avc.c denied = requested & ~(avd.allowed); avd 1098 security/selinux/avc.c driver, xperm, AVC_EXTENDED_PERMS, &avd); avd 1103 security/selinux/avc.c &avd, xpd, xperm, rc, ad); avd 1133 security/selinux/avc.c struct av_decision *avd) avd 1147 security/selinux/avc.c node = avc_compute_av(state, ssid, tsid, tclass, avd, &xp_node); avd 1149 security/selinux/avc.c memcpy(avd, &node->ae.avd, sizeof(*avd)); avd 1151 security/selinux/avc.c denied = requested & ~(avd->allowed); avd 1154 security/selinux/avc.c flags, avd); avd 1179 security/selinux/avc.c struct av_decision avd; avd 1183 security/selinux/avc.c &avd); avd 1185 security/selinux/avc.c rc2 = avc_audit(state, ssid, tsid, tclass, requested, &avd, rc, avd 1197 security/selinux/avc.c struct av_decision avd; avd 1202 security/selinux/avc.c &avd); avd 1204 security/selinux/avc.c rc2 = avc_audit(state, ssid, tsid, tclass, requested, &avd, rc, avd 1632 security/selinux/hooks.c struct av_decision avd; avd 1655 security/selinux/hooks.c sid, sid, sclass, av, 0, &avd); avd 1658 security/selinux/hooks.c sid, sid, sclass, av, &avd, rc, &ad, 0); avd 3051 security/selinux/hooks.c struct av_decision avd; avd 3077 security/selinux/hooks.c &avd); avd 3078 security/selinux/hooks.c audited = avc_audit_required(perms, &avd, rc, avd 65 security/selinux/include/avc.h struct av_decision *avd, avd 71 security/selinux/include/avc.h denied = requested & ~avd->allowed; avd 73 security/selinux/include/avc.h audited = denied & avd->auditdeny; avd 90 security/selinux/include/avc.h if (auditdeny && !(auditdeny & avd->auditdeny)) avd 95 security/selinux/include/avc.h audited = requested & avd->auditallow; avd 128 security/selinux/include/avc.h struct av_decision *avd, avd 134 security/selinux/include/avc.h audited = avc_audit_required(requested, avd, result, 0, &denied); avd 152 security/selinux/include/avc.h struct av_decision *avd); avd 227 security/selinux/include/security.h u16 tclass, struct av_decision *avd, avd 237 security/selinux/include/security.h u16 tclass, struct av_decision *avd); avd 819 security/selinux/selinuxfs.c struct av_decision avd; avd 850 security/selinux/selinuxfs.c security_compute_av_user(state, ssid, tsid, tclass, &avd); avd 854 security/selinux/selinuxfs.c avd.allowed, 0xffffffff, avd 855 security/selinux/selinuxfs.c avd.auditallow, avd.auditdeny, avd 856 security/selinux/selinuxfs.c avd.seqno, avd.flags); avd 633 security/selinux/ss/conditional.c struct av_decision *avd, struct extended_perms *xperms) avd 637 security/selinux/ss/conditional.c if (!ctab || !key || !avd) avd 644 security/selinux/ss/conditional.c avd->allowed |= node->datum.u.data; avd 652 security/selinux/ss/conditional.c avd->auditdeny &= node->datum.u.data; avd 655 security/selinux/ss/conditional.c avd->auditallow |= node->datum.u.data; avd 75 security/selinux/ss/conditional.h struct av_decision *avd, struct extended_perms *xperms); avd 98 security/selinux/ss/services.c struct av_decision *avd, avd 206 security/selinux/ss/services.c u16 tclass, struct av_decision *avd, avd 215 security/selinux/ss/services.c if (avd->allowed & mapping->perms[i]) avd 220 security/selinux/ss/services.c avd->allowed = result; avd 223 security/selinux/ss/services.c if (avd->auditallow & mapping->perms[i]) avd 225 security/selinux/ss/services.c avd->auditallow = result; avd 228 security/selinux/ss/services.c if (avd->auditdeny & mapping->perms[i]) avd 240 security/selinux/ss/services.c avd->auditdeny = result; avd 536 security/selinux/ss/services.c struct av_decision *avd) avd 571 security/selinux/ss/services.c masked = ~lo_avd.allowed & avd->allowed; avd 577 security/selinux/ss/services.c avd->allowed &= ~masked; avd 617 security/selinux/ss/services.c struct av_decision *avd, avd 629 security/selinux/ss/services.c avd->allowed = 0; avd 630 security/selinux/ss/services.c avd->auditallow = 0; avd 631 security/selinux/ss/services.c avd->auditdeny = 0xffffffff; avd 662 security/selinux/ss/services.c avd->allowed |= node->datum.u.data; avd 664 security/selinux/ss/services.c avd->auditallow |= node->datum.u.data; avd 666 security/selinux/ss/services.c avd->auditdeny &= node->datum.u.data; avd 673 security/selinux/ss/services.c avd, xperms); avd 684 security/selinux/ss/services.c if ((constraint->permissions & (avd->allowed)) && avd 687 security/selinux/ss/services.c avd->allowed &= ~(constraint->permissions); avd 698 security/selinux/ss/services.c (avd->allowed & policydb->process_trans_perms) && avd 706 security/selinux/ss/services.c avd->allowed &= ~policydb->process_trans_perms; avd 715 security/selinux/ss/services.c tclass, avd); avd 935 security/selinux/ss/services.c static void avd_init(struct selinux_state *state, struct av_decision *avd) avd 937 security/selinux/ss/services.c avd->allowed = 0; avd 938 security/selinux/ss/services.c avd->auditallow = 0; avd 939 security/selinux/ss/services.c avd->auditdeny = 0xffffffff; avd 940 security/selinux/ss/services.c avd->seqno = state->ss->latest_granting; avd 941 security/selinux/ss/services.c avd->flags = 0; avd 1096 security/selinux/ss/services.c struct av_decision *avd, avd 1105 security/selinux/ss/services.c avd_init(state, avd); avd 1122 security/selinux/ss/services.c avd->flags |= AVD_FLAGS_PERMISSIVE; avd 1137 security/selinux/ss/services.c context_struct_compute_av(policydb, scontext, tcontext, tclass, avd, avd 1139 security/selinux/ss/services.c map_decision(&state->ss->map, orig_tclass, avd, avd 1145 security/selinux/ss/services.c avd->allowed = 0xffffffff; avd 1153 security/selinux/ss/services.c struct av_decision *avd) avd 1160 security/selinux/ss/services.c avd_init(state, avd); avd 1176 security/selinux/ss/services.c avd->flags |= AVD_FLAGS_PERMISSIVE; avd 1191 security/selinux/ss/services.c context_struct_compute_av(policydb, scontext, tcontext, tclass, avd, avd 1197 security/selinux/ss/services.c avd->allowed = 0xffffffff;