/openbmc/linux/security/selinux/ |
H A D | avc.c | 51 struct av_decision avd; member 386 struct av_decision *avd, in avc_xperms_audit_required() argument 394 denied = requested & ~avd->allowed; in avc_xperms_audit_required() 396 audited = denied & avd->auditdeny; in avc_xperms_audit_required() 404 audited = requested & avd->auditallow; in avc_xperms_audit_required() 416 u32 requested, struct av_decision *avd, in avc_xperms_audit() argument 424 requested, avd, xpd, perm, result, &denied); in avc_xperms_audit() 515 …d avc_node_populate(struct avc_node *node, u32 ssid, u32 tsid, u16 tclass, struct av_decision *avd) in avc_node_populate() argument 520 memcpy(&node->ae.avd, avd, sizeof(node->ae.avd)); in avc_node_populate() 609 struct av_decision *avd, struct avc_xperms_node *xp_node) in avc_insert() argument [all …]
|
H A D | selinuxfs.c | 872 struct av_decision avd; in sel_write_access() local 902 security_compute_av_user(ssid, tsid, tclass, &avd); in sel_write_access() 906 avd.allowed, 0xffffffff, in sel_write_access() 907 avd.auditallow, avd.auditdeny, in sel_write_access() 908 avd.seqno, avd.flags); in sel_write_access()
|
H A D | hooks.c | 1621 struct av_decision avd; in cred_has_capability() local 1643 rc = avc_has_perm_noaudit(sid, sid, sclass, av, 0, &avd); in cred_has_capability() 1645 int rc2 = avc_audit(sid, sid, sclass, av, &avd, rc, &ad); in cred_has_capability() 3089 struct av_decision avd; in selinux_inode_permission() local 3111 &avd); in selinux_inode_permission() 3112 audited = avc_audit_required(perms, &avd, rc, in selinux_inode_permission()
|
/openbmc/linux/security/selinux/include/ |
H A D | avc.h | 64 struct av_decision *avd, in avc_audit_required() argument 70 denied = requested & ~avd->allowed; in avc_audit_required() 72 audited = denied & avd->auditdeny; in avc_audit_required() 89 if (auditdeny && !(auditdeny & avd->auditdeny)) in avc_audit_required() 94 audited = requested & avd->auditallow; in avc_audit_required() 124 struct av_decision *avd, in avc_audit() argument 129 audited = avc_audit_required(requested, avd, result, 0, &denied); in avc_audit() 142 struct av_decision *avd);
|
H A D | security.h | 244 u16 tclass, struct av_decision *avd, 252 u16 tclass, struct av_decision *avd);
|
/openbmc/linux/arch/riscv/kernel/vdso/ |
H A D | hwprobe.c | 24 const struct arch_vdso_data *avd = &vd->arch_data; in __vdso_riscv_hwprobe() local 35 if ((flags != 0) || (!all_cpus && !avd->homogeneous_cpus)) in __vdso_riscv_hwprobe() 41 p->value = avd->all_cpu_hwprobe_values[p->key]; in __vdso_riscv_hwprobe()
|
/openbmc/linux/security/selinux/ss/ |
H A D | services.c | 92 struct av_decision *avd, 200 u16 tclass, struct av_decision *avd, in map_decision() argument 209 if (avd->allowed & mapping->perms[i]) in map_decision() 214 avd->allowed = result; in map_decision() 217 if (avd->auditallow & mapping->perms[i]) in map_decision() 219 avd->auditallow = result; in map_decision() 222 if (avd->auditdeny & mapping->perms[i]) in map_decision() 234 avd->auditdeny = result; in map_decision() 536 struct av_decision *avd) in type_attribute_bounds_av() argument 571 masked = ~lo_avd.allowed & avd->allowed; in type_attribute_bounds_av() [all …]
|
H A D | conditional.c | 575 struct av_decision *avd, struct extended_perms *xperms) in cond_compute_av() argument 579 if (!ctab || !key || !avd) in cond_compute_av() 586 avd->allowed |= node->datum.u.data; in cond_compute_av() 594 avd->auditdeny &= node->datum.u.data; in cond_compute_av() 597 avd->auditallow |= node->datum.u.data; in cond_compute_av()
|
H A D | conditional.h | 78 struct av_decision *avd, struct extended_perms *xperms);
|
/openbmc/linux/arch/riscv/kernel/ |
H A D | sys_riscv.c | 292 struct arch_vdso_data *avd = &vd->arch_data; in init_hwprobe_vdso_data() local 307 avd->all_cpu_hwprobe_values[key] = pair.value; in init_hwprobe_vdso_data() 323 avd->homogeneous_cpus = id_bitsmash != 0 && id_bitsmash != -1; in init_hwprobe_vdso_data()
|