Lines Matching refs:avd
92 struct av_decision *avd,
200 u16 tclass, struct av_decision *avd,
209 if (avd->allowed & mapping->perms[i])
214 avd->allowed = result;
217 if (avd->auditallow & mapping->perms[i])
219 avd->auditallow = result;
222 if (avd->auditdeny & mapping->perms[i])
234 avd->auditdeny = result;
536 struct av_decision *avd)
571 masked = ~lo_avd.allowed & avd->allowed;
577 avd->allowed &= ~masked;
615 struct av_decision *avd,
627 avd->allowed = 0;
628 avd->auditallow = 0;
629 avd->auditdeny = 0xffffffff;
660 avd->allowed |= node->datum.u.data;
662 avd->auditallow |= node->datum.u.data;
664 avd->auditdeny &= node->datum.u.data;
671 avd, xperms);
682 if ((constraint->permissions & (avd->allowed)) &&
685 avd->allowed &= ~(constraint->permissions);
696 (avd->allowed & policydb->process_trans_perms) &&
704 avd->allowed &= ~policydb->process_trans_perms;
713 tclass, avd);
934 static void avd_init(struct selinux_policy *policy, struct av_decision *avd)
936 avd->allowed = 0;
937 avd->auditallow = 0;
938 avd->auditdeny = 0xffffffff;
940 avd->seqno = policy->latest_granting;
942 avd->seqno = 0;
943 avd->flags = 0;
1089 * @avd: access vector decisions
1098 struct av_decision *avd,
1109 avd_init(policy, avd);
1126 avd->flags |= AVD_FLAGS_PERMISSIVE;
1141 context_struct_compute_av(policydb, scontext, tcontext, tclass, avd,
1143 map_decision(&policy->map, orig_tclass, avd,
1149 avd->allowed = 0xffffffff;
1156 struct av_decision *avd)
1165 avd_init(policy, avd);
1181 avd->flags |= AVD_FLAGS_PERMISSIVE;
1196 context_struct_compute_av(policydb, scontext, tcontext, tclass, avd,
1202 avd->allowed = 0xffffffff;