avd                48 security/selinux/avc.c 	struct av_decision	avd;
avd               384 security/selinux/avc.c 					struct av_decision *avd,
avd               392 security/selinux/avc.c 	denied = requested & ~avd->allowed;
avd               394 security/selinux/avc.c 		audited = denied & avd->auditdeny;
avd               402 security/selinux/avc.c 		audited = requested & avd->auditallow;
avd               415 security/selinux/avc.c 				   u32 requested, struct av_decision *avd,
avd               423 security/selinux/avc.c 			requested, avd, xpd, perm, result, &denied);
avd               515 security/selinux/avc.c static void avc_node_populate(struct avc_node *node, u32 ssid, u32 tsid, u16 tclass, struct av_decision *avd)
avd               520 security/selinux/avc.c 	memcpy(&node->ae.avd, avd, sizeof(node->ae.avd));
avd               614 security/selinux/avc.c 				   struct av_decision *avd,
avd               623 security/selinux/avc.c 	if (avc_latest_notif_update(avc, avd->seqno, 1))
avd               630 security/selinux/avc.c 	avc_node_populate(node, ssid, tsid, tclass, avd);
avd               873 security/selinux/avc.c 		    seqno == pos->ae.avd.seqno){
avd               889 security/selinux/avc.c 	avc_node_populate(node, ssid, tsid, tclass, &orig->ae.avd);
avd               901 security/selinux/avc.c 		node->ae.avd.allowed |= perms;
avd               907 security/selinux/avc.c 		node->ae.avd.allowed &= ~perms;
avd               910 security/selinux/avc.c 		node->ae.avd.auditallow |= perms;
avd               913 security/selinux/avc.c 		node->ae.avd.auditallow &= ~perms;
avd               916 security/selinux/avc.c 		node->ae.avd.auditdeny |= perms;
avd               919 security/selinux/avc.c 		node->ae.avd.auditdeny &= ~perms;
avd               997 security/selinux/avc.c 				u16 tclass, struct av_decision *avd,
avd              1002 security/selinux/avc.c 	security_compute_av(state, ssid, tsid, tclass, avd, &xp_node->xp);
avd              1004 security/selinux/avc.c 	return avc_insert(state->avc, ssid, tsid, tclass, avd, xp_node);
avd              1011 security/selinux/avc.c 			       struct av_decision *avd)
avd              1017 security/selinux/avc.c 	    !(avd->flags & AVD_FLAGS_PERMISSIVE))
avd              1021 security/selinux/avc.c 			xperm, ssid, tsid, tclass, avd->seqno, NULL, flags);
avd              1037 security/selinux/avc.c 	struct av_decision avd;
avd              1056 security/selinux/avc.c 		node = avc_compute_av(state, ssid, tsid, tclass, &avd, xp_node);
avd              1058 security/selinux/avc.c 		memcpy(&avd, &node->ae.avd, sizeof(avd));
avd              1076 security/selinux/avc.c 			avd.allowed &= ~requested;
avd              1084 security/selinux/avc.c 				driver, xperm, ssid, tsid, tclass, avd.seqno,
avd              1092 security/selinux/avc.c 		avd.allowed &= ~requested;
avd              1095 security/selinux/avc.c 	denied = requested & ~(avd.allowed);
avd              1098 security/selinux/avc.c 				driver, xperm, AVC_EXTENDED_PERMS, &avd);
avd              1103 security/selinux/avc.c 			&avd, xpd, xperm, rc, ad);
avd              1133 security/selinux/avc.c 				struct av_decision *avd)
avd              1147 security/selinux/avc.c 		node = avc_compute_av(state, ssid, tsid, tclass, avd, &xp_node);
avd              1149 security/selinux/avc.c 		memcpy(avd, &node->ae.avd, sizeof(*avd));
avd              1151 security/selinux/avc.c 	denied = requested & ~(avd->allowed);
avd              1154 security/selinux/avc.c 				flags, avd);
avd              1179 security/selinux/avc.c 	struct av_decision avd;
avd              1183 security/selinux/avc.c 				  &avd);
avd              1185 security/selinux/avc.c 	rc2 = avc_audit(state, ssid, tsid, tclass, requested, &avd, rc,
avd              1197 security/selinux/avc.c 	struct av_decision avd;
avd              1202 security/selinux/avc.c 				  &avd);
avd              1204 security/selinux/avc.c 	rc2 = avc_audit(state, ssid, tsid, tclass, requested, &avd, rc,
avd              1632 security/selinux/hooks.c 	struct av_decision avd;
avd              1655 security/selinux/hooks.c 				  sid, sid, sclass, av, 0, &avd);
avd              1658 security/selinux/hooks.c 				    sid, sid, sclass, av, &avd, rc, &ad, 0);
avd              3051 security/selinux/hooks.c 	struct av_decision avd;
avd              3077 security/selinux/hooks.c 				  &avd);
avd              3078 security/selinux/hooks.c 	audited = avc_audit_required(perms, &avd, rc,
avd                65 security/selinux/include/avc.h 			      struct av_decision *avd,
avd                71 security/selinux/include/avc.h 	denied = requested & ~avd->allowed;
avd                73 security/selinux/include/avc.h 		audited = denied & avd->auditdeny;
avd                90 security/selinux/include/avc.h 		if (auditdeny && !(auditdeny & avd->auditdeny))
avd                95 security/selinux/include/avc.h 		audited = requested & avd->auditallow;
avd               128 security/selinux/include/avc.h 			    struct av_decision *avd,
avd               134 security/selinux/include/avc.h 	audited = avc_audit_required(requested, avd, result, 0, &denied);
avd               152 security/selinux/include/avc.h 			 struct av_decision *avd);
avd               227 security/selinux/include/security.h 			 u16 tclass, struct av_decision *avd,
avd               237 security/selinux/include/security.h 			      u16 tclass, struct av_decision *avd);
avd               819 security/selinux/selinuxfs.c 	struct av_decision avd;
avd               850 security/selinux/selinuxfs.c 	security_compute_av_user(state, ssid, tsid, tclass, &avd);
avd               854 security/selinux/selinuxfs.c 			  avd.allowed, 0xffffffff,
avd               855 security/selinux/selinuxfs.c 			  avd.auditallow, avd.auditdeny,
avd               856 security/selinux/selinuxfs.c 			  avd.seqno, avd.flags);
avd               633 security/selinux/ss/conditional.c 		struct av_decision *avd, struct extended_perms *xperms)
avd               637 security/selinux/ss/conditional.c 	if (!ctab || !key || !avd)
avd               644 security/selinux/ss/conditional.c 			avd->allowed |= node->datum.u.data;
avd               652 security/selinux/ss/conditional.c 			avd->auditdeny &= node->datum.u.data;
avd               655 security/selinux/ss/conditional.c 			avd->auditallow |= node->datum.u.data;
avd                75 security/selinux/ss/conditional.h 		struct av_decision *avd, struct extended_perms *xperms);
avd                98 security/selinux/ss/services.c 				      struct av_decision *avd,
avd               206 security/selinux/ss/services.c 			 u16 tclass, struct av_decision *avd,
avd               215 security/selinux/ss/services.c 			if (avd->allowed & mapping->perms[i])
avd               220 security/selinux/ss/services.c 		avd->allowed = result;
avd               223 security/selinux/ss/services.c 			if (avd->auditallow & mapping->perms[i])
avd               225 security/selinux/ss/services.c 		avd->auditallow = result;
avd               228 security/selinux/ss/services.c 			if (avd->auditdeny & mapping->perms[i])
avd               240 security/selinux/ss/services.c 		avd->auditdeny = result;
avd               536 security/selinux/ss/services.c 				     struct av_decision *avd)
avd               571 security/selinux/ss/services.c 	masked = ~lo_avd.allowed & avd->allowed;
avd               577 security/selinux/ss/services.c 	avd->allowed &= ~masked;
avd               617 security/selinux/ss/services.c 				      struct av_decision *avd,
avd               629 security/selinux/ss/services.c 	avd->allowed = 0;
avd               630 security/selinux/ss/services.c 	avd->auditallow = 0;
avd               631 security/selinux/ss/services.c 	avd->auditdeny = 0xffffffff;
avd               662 security/selinux/ss/services.c 					avd->allowed |= node->datum.u.data;
avd               664 security/selinux/ss/services.c 					avd->auditallow |= node->datum.u.data;
avd               666 security/selinux/ss/services.c 					avd->auditdeny &= node->datum.u.data;
avd               673 security/selinux/ss/services.c 					avd, xperms);
avd               684 security/selinux/ss/services.c 		if ((constraint->permissions & (avd->allowed)) &&
avd               687 security/selinux/ss/services.c 			avd->allowed &= ~(constraint->permissions);
avd               698 security/selinux/ss/services.c 	    (avd->allowed & policydb->process_trans_perms) &&
avd               706 security/selinux/ss/services.c 			avd->allowed &= ~policydb->process_trans_perms;
avd               715 security/selinux/ss/services.c 				 tclass, avd);
avd               935 security/selinux/ss/services.c static void avd_init(struct selinux_state *state, struct av_decision *avd)
avd               937 security/selinux/ss/services.c 	avd->allowed = 0;
avd               938 security/selinux/ss/services.c 	avd->auditallow = 0;
avd               939 security/selinux/ss/services.c 	avd->auditdeny = 0xffffffff;
avd               940 security/selinux/ss/services.c 	avd->seqno = state->ss->latest_granting;
avd               941 security/selinux/ss/services.c 	avd->flags = 0;
avd              1096 security/selinux/ss/services.c 			 struct av_decision *avd,
avd              1105 security/selinux/ss/services.c 	avd_init(state, avd);
avd              1122 security/selinux/ss/services.c 		avd->flags |= AVD_FLAGS_PERMISSIVE;
avd              1137 security/selinux/ss/services.c 	context_struct_compute_av(policydb, scontext, tcontext, tclass, avd,
avd              1139 security/selinux/ss/services.c 	map_decision(&state->ss->map, orig_tclass, avd,
avd              1145 security/selinux/ss/services.c 	avd->allowed = 0xffffffff;
avd              1153 security/selinux/ss/services.c 			      struct av_decision *avd)
avd              1160 security/selinux/ss/services.c 	avd_init(state, avd);
avd              1176 security/selinux/ss/services.c 		avd->flags |= AVD_FLAGS_PERMISSIVE;
avd              1191 security/selinux/ss/services.c 	context_struct_compute_av(policydb, scontext, tcontext, tclass, avd,
avd              1197 security/selinux/ss/services.c 	avd->allowed = 0xffffffff;