/kernel/linux/linux-5.10/security/selinux/include/ |
H A D | avc.h | 52 u32 audited; member 70 u32 denied, audited; in avc_audit_required() local 73 audited = denied & avd->auditdeny; in avc_audit_required() 76 * this field means that ANY denials should NOT be audited if in avc_audit_required() 91 audited = 0; in avc_audit_required() 93 audited = denied = requested; in avc_audit_required() 95 audited = requested & avd->auditallow; in avc_audit_required() 97 return audited; in avc_audit_required() 102 u32 requested, u32 audited, u32 denied, int result, 133 u32 audited, denie in avc_audit() local [all...] |
/kernel/linux/linux-6.6/security/selinux/include/ |
H A D | avc.h | 52 u32 audited; member 69 u32 denied, audited; in avc_audit_required() local 72 audited = denied & avd->auditdeny; in avc_audit_required() 75 * this field means that ANY denials should NOT be audited if in avc_audit_required() 90 audited = 0; in avc_audit_required() 92 audited = denied = requested; in avc_audit_required() 94 audited = requested & avd->auditallow; in avc_audit_required() 96 return audited; in avc_audit_required() 100 u32 requested, u32 audited, u32 denied, int result, 128 u32 audited, denie in avc_audit() local [all...] |
/kernel/linux/linux-5.10/include/trace/events/ |
H A D | avc.h | 27 __field(u32, audited) 37 __entry->audited = sad->audited; 44 TP_printk("requested=0x%x denied=0x%x audited=0x%x result=%d scontext=%s tcontext=%s tclass=%s", 45 __entry->requested, __entry->denied, __entry->audited, __entry->result,
|
/kernel/linux/linux-6.6/include/trace/events/ |
H A D | avc.h | 27 __field(u32, audited) 37 __entry->audited = sad->audited; 44 TP_printk("requested=0x%x denied=0x%x audited=0x%x result=%d scontext=%s tcontext=%s tclass=%s", 45 __entry->requested, __entry->denied, __entry->audited, __entry->result,
|
/kernel/linux/linux-5.10/security/selinux/ |
H A D | avc.c | 394 u32 denied, audited; in avc_xperms_audit_required() local 398 audited = denied & avd->auditdeny; in avc_xperms_audit_required() 399 if (audited && xpd) { in avc_xperms_audit_required() 401 audited &= ~requested; in avc_xperms_audit_required() 404 audited = denied = requested; in avc_xperms_audit_required() 406 audited = requested & avd->auditallow; in avc_xperms_audit_required() 407 if (audited && xpd) { in avc_xperms_audit_required() 409 audited &= ~requested; in avc_xperms_audit_required() 414 return audited; in avc_xperms_audit_required() 424 u32 audited, denie in avc_xperms_audit() local 763 slow_avc_audit(struct selinux_state *state, u32 ssid, u32 tsid, u16 tclass, u32 requested, u32 audited, u32 denied, int result, struct common_audit_data *a) slow_avc_audit() argument [all...] |
H A D | hooks.c | 3012 u32 perms, u32 audited, u32 denied, in audit_inode_permission() 3024 audited, denied, result, &ad); in audit_inode_permission() 3040 u32 audited, denied; in selinux_inode_permission() local 3065 audited = avc_audit_required(perms, &avd, rc, in selinux_inode_permission() 3068 if (likely(!audited)) in selinux_inode_permission() 3075 rc2 = audit_inode_permission(inode, perms, audited, denied, rc); in selinux_inode_permission() 3011 audit_inode_permission(struct inode *inode, u32 perms, u32 audited, u32 denied, int result) audit_inode_permission() argument
|
/kernel/linux/linux-6.6/security/selinux/ |
H A D | avc.c | 392 u32 denied, audited; in avc_xperms_audit_required() local 396 audited = denied & avd->auditdeny; in avc_xperms_audit_required() 397 if (audited && xpd) { in avc_xperms_audit_required() 399 audited &= ~requested; in avc_xperms_audit_required() 402 audited = denied = requested; in avc_xperms_audit_required() 404 audited = requested & avd->auditallow; in avc_xperms_audit_required() 405 if (audited && xpd) { in avc_xperms_audit_required() 407 audited &= ~requested; in avc_xperms_audit_required() 412 return audited; in avc_xperms_audit_required() 421 u32 audited, denie in avc_xperms_audit() local 756 slow_avc_audit(u32 ssid, u32 tsid, u16 tclass, u32 requested, u32 audited, u32 denied, int result, struct common_audit_data *a) slow_avc_audit() argument [all...] |
H A D | hooks.c | 3069 u32 perms, u32 audited, u32 denied, in audit_inode_permission() 3079 audited, denied, result, &ad); in audit_inode_permission() 3092 u32 audited, denied; in selinux_inode_permission() local 3113 audited = avc_audit_required(perms, &avd, rc, in selinux_inode_permission() 3116 if (likely(!audited)) in selinux_inode_permission() 3119 rc2 = audit_inode_permission(inode, perms, audited, denied, rc); in selinux_inode_permission() 3068 audit_inode_permission(struct inode *inode, u32 perms, u32 audited, u32 denied, int result) audit_inode_permission() argument
|