Lines Matching refs:requested

387 static inline u32 avc_xperms_audit_required(u32 requested,
396 denied = requested & ~avd->allowed;
401 audited &= ~requested;
404 audited = denied = requested;
406 audited = requested & avd->auditallow;
409 audited &= ~requested;
419 u32 requested, struct av_decision *avd,
427 requested, avd, xpd, perm, result, &denied);
430 return slow_avc_audit(state, ssid, tsid, tclass, requested,
765 u32 requested, u32 audited, u32 denied, int result,
780 sad.requested = requested;
1017 u16 tclass, u32 requested,
1028 avc_update_node(state->avc, AVC_CALLBACK_GRANT, requested, driver,
1041 u32 ssid, u32 tsid, u16 tclass, u32 requested,
1057 if (WARN_ON(!requested))
1084 avd.allowed &= ~requested;
1091 avc_update_node(state->avc, AVC_CALLBACK_ADD_XPERMS, requested,
1100 avd.allowed &= ~requested;
1103 denied = requested & ~(avd.allowed);
1105 rc = avc_denied(state, ssid, tsid, tclass, requested,
1110 rc2 = avc_xperms_audit(state, ssid, tsid, tclass, requested,
1122 * @requested: requested permissions, interpreted based on @tclass
1126 * Check the AVC to determine whether the @requested permissions are granted
1130 * in @avd. Return %0 if all @requested permissions are granted,
1139 u16 tclass, u32 requested,
1148 if (WARN_ON(!requested))
1159 denied = requested & ~(avd->allowed);
1161 rc = avc_denied(state, ssid, tsid, tclass, requested, 0, 0,
1173 * @requested: requested permissions, interpreted based on @tclass
1176 * Check the AVC to determine whether the @requested permissions are granted
1180 * permissions in accordance with the policy. Return %0 if all @requested
1185 u32 requested, struct common_audit_data *auditdata)
1190 rc = avc_has_perm_noaudit(state, ssid, tsid, tclass, requested, 0,
1193 rc2 = avc_audit(state, ssid, tsid, tclass, requested, &avd, rc,
1201 u32 ssid, u32 tsid, u16 tclass, u32 requested,
1208 rc = avc_has_perm_noaudit(state, ssid, tsid, tclass, requested,
1212 rc2 = avc_audit(state, ssid, tsid, tclass, requested, &avd, rc,