Lines Matching refs:avd

96 				      struct av_decision *avd,
204 u16 tclass, struct av_decision *avd,
213 if (avd->allowed & mapping->perms[i])
218 avd->allowed = result;
221 if (avd->auditallow & mapping->perms[i])
223 avd->auditallow = result;
226 if (avd->auditdeny & mapping->perms[i])
238 avd->auditdeny = result;
542 struct av_decision *avd)
577 masked = ~lo_avd.allowed & avd->allowed;
583 avd->allowed &= ~masked;
623 struct av_decision *avd,
635 avd->allowed = 0;
636 avd->auditallow = 0;
637 avd->auditdeny = 0xffffffff;
668 avd->allowed |= node->datum.u.data;
670 avd->auditallow |= node->datum.u.data;
672 avd->auditdeny &= node->datum.u.data;
679 avd, xperms);
690 if ((constraint->permissions & (avd->allowed)) &&
693 avd->allowed &= ~(constraint->permissions);
704 (avd->allowed & policydb->process_trans_perms) &&
712 avd->allowed &= ~policydb->process_trans_perms;
721 tclass, avd);
948 static void avd_init(struct selinux_policy *policy, struct av_decision *avd)
950 avd->allowed = 0;
951 avd->auditallow = 0;
952 avd->auditdeny = 0xffffffff;
954 avd->seqno = policy->latest_granting;
956 avd->seqno = 0;
957 avd->flags = 0;
1104 * @avd: access vector decisions
1114 struct av_decision *avd,
1125 avd_init(policy, avd);
1142 avd->flags |= AVD_FLAGS_PERMISSIVE;
1157 context_struct_compute_av(policydb, scontext, tcontext, tclass, avd,
1159 map_decision(&policy->map, orig_tclass, avd,
1165 avd->allowed = 0xffffffff;
1173 struct av_decision *avd)
1182 avd_init(policy, avd);
1198 avd->flags |= AVD_FLAGS_PERMISSIVE;
1213 context_struct_compute_av(policydb, scontext, tcontext, tclass, avd,
1219 avd->allowed = 0xffffffff;