Searched refs:auditdeny (Results 1 - 12 of 12) sorted by relevance
/kernel/linux/linux-5.10/security/selinux/include/ |
H A D | avc.h | 67 u32 auditdeny, in avc_audit_required() 73 audited = denied & avd->auditdeny; in avc_audit_required() 75 * auditdeny is TRICKY! Setting a bit in in avc_audit_required() 83 * avd.auditdeny & ACCESS == 0 (not set means explicit rule) in avc_audit_required() 84 * auditdeny & ACCESS == 1 in avc_audit_required() 87 * permission was READ and the auditdeny checks were for in avc_audit_required() 90 if (auditdeny && !(auditdeny & avd->auditdeny)) in avc_audit_required() 64 avc_audit_required(u32 requested, struct av_decision *avd, int result, u32 auditdeny, u32 *deniedp) avc_audit_required() argument
|
H A D | security.h | 254 u32 auditdeny; member
|
/kernel/linux/linux-6.6/security/selinux/include/ |
H A D | avc.h | 66 u32 auditdeny, in avc_audit_required() 72 audited = denied & avd->auditdeny; in avc_audit_required() 74 * auditdeny is TRICKY! Setting a bit in in avc_audit_required() 82 * avd.auditdeny & ACCESS == 0 (not set means explicit rule) in avc_audit_required() 83 * auditdeny & ACCESS == 1 in avc_audit_required() 86 * permission was READ and the auditdeny checks were for in avc_audit_required() 89 if (auditdeny && !(auditdeny & avd->auditdeny)) in avc_audit_required() 63 avc_audit_required(u32 requested, struct av_decision *avd, int result, u32 auditdeny, u32 *deniedp) avc_audit_required() argument
|
H A D | security.h | 212 u32 auditdeny; member
|
/kernel/linux/linux-5.10/security/selinux/ |
H A D | avc.c | 398 audited = denied & avd->auditdeny; in avc_xperms_audit_required() 924 node->ae.avd.auditdeny |= perms; in avc_update_node() 927 node->ae.avd.auditdeny &= ~perms; in avc_update_node()
|
H A D | selinuxfs.c | 948 avd.auditallow, avd.auditdeny, in sel_write_access()
|
/kernel/linux/linux-6.6/security/selinux/ |
H A D | avc.c | 396 audited = denied & avd->auditdeny; in avc_xperms_audit_required() 904 node->ae.avd.auditdeny |= perms; in avc_update_node() 907 node->ae.avd.auditdeny &= ~perms; in avc_update_node()
|
H A D | selinuxfs.c | 905 avd.auditallow, avd.auditdeny, in sel_write_access()
|
/kernel/linux/linux-5.10/security/selinux/ss/ |
H A D | services.c | 226 if (avd->auditdeny & mapping->perms[i]) in map_decision() 238 avd->auditdeny = result; in map_decision() 610 /* If no ioctl commands are allowed, ignore auditallow and auditdeny */ in services_compute_xperms_drivers() 637 avd->auditdeny = 0xffffffff; in context_struct_compute_av() 672 avd->auditdeny &= node->datum.u.data; in context_struct_compute_av() 952 avd->auditdeny = 0xffffffff; in avd_init()
|
H A D | conditional.c | 590 /* Since a '0' in an auditdeny mask represents a in cond_compute_av() 595 avd->auditdeny &= node->datum.u.data; in cond_compute_av()
|
/kernel/linux/linux-6.6/security/selinux/ss/ |
H A D | services.c | 222 if (avd->auditdeny & mapping->perms[i]) in map_decision() 234 avd->auditdeny = result; in map_decision() 629 avd->auditdeny = 0xffffffff; in context_struct_compute_av() 664 avd->auditdeny &= node->datum.u.data; in context_struct_compute_av() 938 avd->auditdeny = 0xffffffff; in avd_init()
|
H A D | conditional.c | 589 /* Since a '0' in an auditdeny mask represents a in cond_compute_av() 594 avd->auditdeny &= node->datum.u.data; in cond_compute_av()
|
Completed in 22 milliseconds