Home
last modified time | relevance | path

Searched refs:avd (Results 1 - 17 of 17) sorted by relevance

/third_party/selinux/libselinux/src/
H A Dcompute_av.c17 struct av_decision *avd) in security_compute_av_flags_raw()
62 &avd->allowed, &avd->decided, in security_compute_av_flags_raw()
63 &avd->auditallow, &avd->auditdeny, in security_compute_av_flags_raw()
64 &avd->seqno, &avd->flags); in security_compute_av_flags_raw()
69 avd->flags = 0; in security_compute_av_flags_raw()
73 * kernel will have already set avd according to the in security_compute_av_flags_raw()
76 * avd t in security_compute_av_flags_raw()
13 security_compute_av_flags_raw(const char * scon, const char * tcon, security_class_t tclass, access_vector_t requested, struct av_decision *avd) security_compute_av_flags_raw() argument
90 security_compute_av_raw(const char * scon, const char * tcon, security_class_t tclass, access_vector_t requested, struct av_decision *avd) security_compute_av_raw() argument
116 security_compute_av_flags(const char * scon, const char * tcon, security_class_t tclass, access_vector_t requested, struct av_decision *avd) security_compute_av_flags() argument
142 security_compute_av(const char * scon, const char * tcon, security_class_t tclass, access_vector_t requested, struct av_decision *avd) security_compute_av() argument
[all...]
H A Davc.c23 struct av_decision avd; member
435 if (node && ((node->ae.avd.decided & requested) == requested)) { in avc_lookup()
461 * sequence number @ae->avd.seqno is not less than the latest
474 if (ae->avd.seqno < avc_cache.latest_notif) { in avc_insert()
477 ae->avd.seqno, avc_cache.latest_notif); in avc_insert()
489 memcpy(&node->ae.avd, &ae->avd, sizeof(ae->avd)); in avc_insert()
694 struct av_decision *avd, int result, void *a) in avc_audit()
698 denied = requested & ~avd in avc_audit()
692 avc_audit(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t requested, struct av_decision *avd, int result, void *a) avc_audit() argument
735 avd_init(struct av_decision *avd) avd_init() argument
744 avc_has_perm_noaudit(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t requested, struct avc_entry_ref *aeref, struct av_decision *avd) avc_has_perm_noaudit() argument
829 struct av_decision avd; avc_has_perm() local
[all...]
H A Dmapping.c209 map_decision(security_class_t tclass, struct av_decision *avd) in map_decision() argument
218 if (avd->allowed & mapping->perms[i]) in map_decision()
223 avd->allowed = result; in map_decision()
226 if (avd->decided & mapping->perms[i]) in map_decision()
231 avd->decided = result; in map_decision()
234 if (avd->auditallow & mapping->perms[i]) in map_decision()
236 avd->auditallow = result; in map_decision()
239 if (avd->auditdeny & mapping->perms[i]) in map_decision()
252 avd->auditdeny = result; in map_decision()
H A DcheckAccess.c75 struct av_decision avd; in selinux_check_passwd_access_internal() local
90 &avd); in selinux_check_passwd_access_internal()
92 if ((retval == 0) && ((requested & avd.allowed) == requested)) { in selinux_check_passwd_access_internal()
H A Daudit2why.c67 struct sepol_av_decision avd; in check_booleans() local
113 avc->av, &avd, &reason); in check_booleans()
328 struct sepol_av_decision avd; in analyze() local
382 rc = sepol_compute_av_reason_buffer(ssid, tsid, tclass, av, &avd, &reason, &reason_buf, 0); in analyze()
395 if (av & ~avd.auditdeny) { in analyze()
H A Dmapping.h32 map_decision(security_class_t tclass, struct av_decision *avd);
/third_party/selinux/libselinux/utils/
H A Dcompute_av.c11 struct av_decision avd; in main() local
37 ret = security_compute_av(argv[1], argv[2], tclass, 1, &avd); in main()
44 print_access_vector(tclass, avd.allowed); in main()
47 if (avd.decided != ~0U) { in main()
49 print_access_vector(tclass, avd.decided); in main()
53 if (avd.auditallow) { in main()
55 print_access_vector(tclass, avd.auditallow); in main()
59 if (avd.auditdeny != ~0U) { in main()
61 print_access_vector(tclass, avd.auditdeny); in main()
/third_party/selinux/libsepol/utils/
H A Dsepol_compute_av.c15 struct sepol_av_decision avd; in main() local
50 rc = sepol_compute_av(ssid, tsid, tclass, 0, &avd); in main()
53 printf("allowed: %s\n", sepol_av_perm_to_string(tclass, avd.allowed)); in main()
54 printf("decided: %s\n", sepol_av_perm_to_string(tclass, avd.decided)); in main()
55 printf("auditallow: %s\n", sepol_av_perm_to_string(tclass, avd.auditallow)); in main()
56 printf("auditdeny: %s\n", sepol_av_perm_to_string(tclass, avd.auditdeny)); in main()
H A Dsepol_check_access.c17 struct sepol_av_decision avd; in main() local
86 if (sepol_compute_av_reason_buffer(ssid, tsid, tclass, av, &avd, &reason, &reason_buf, 0) < 0) { in main()
91 if ((avd.allowed & av) == av) { in main()
/third_party/selinux/libsepol/src/
H A Dservices.c844 struct sepol_av_decision *avd,
853 struct sepol_av_decision *avd, in type_attribute_bounds_av()
889 masked = ~lo_avd.allowed & avd->allowed; in type_attribute_bounds_av()
895 avd->allowed &= ~masked; in type_attribute_bounds_av()
909 struct sepol_av_decision *avd, in context_struct_compute_av()
932 avd->allowed = 0; in context_struct_compute_av()
933 avd->decided = 0xffffffff; in context_struct_compute_av()
934 avd->auditallow = 0; in context_struct_compute_av()
935 avd->auditdeny = 0xffffffff; in context_struct_compute_av()
936 avd in context_struct_compute_av()
849 type_attribute_bounds_av(context_struct_t *scontext, context_struct_t *tcontext, sepol_security_class_t tclass, sepol_access_vector_t requested, struct sepol_av_decision *avd, unsigned int *reason) type_attribute_bounds_av() argument
905 context_struct_compute_av(context_struct_t * scontext, context_struct_t * tcontext, sepol_security_class_t tclass, sepol_access_vector_t requested, struct sepol_av_decision *avd, unsigned int *reason, char **r_buf, unsigned int flags) context_struct_compute_av() argument
1089 sepol_compute_av_reason(sepol_security_id_t ssid, sepol_security_id_t tsid, sepol_security_class_t tclass, sepol_access_vector_t requested, struct sepol_av_decision *avd, unsigned int *reason) sepol_compute_av_reason() argument
1123 sepol_compute_av_reason_buffer(sepol_security_id_t ssid, sepol_security_id_t tsid, sepol_security_class_t tclass, sepol_access_vector_t requested, struct sepol_av_decision *avd, unsigned int *reason, char **reason_buf, unsigned int flags) sepol_compute_av_reason_buffer() argument
1165 sepol_compute_av(sepol_security_id_t ssid, sepol_security_id_t tsid, sepol_security_class_t tclass, sepol_access_vector_t requested, struct sepol_av_decision *avd) sepol_compute_av() argument
2154 struct sepol_av_decision avd; sepol_get_user_sids() local
[all...]
H A Dconditional.c862 struct sepol_av_decision *avd) in cond_compute_av()
866 if (!ctab || !key || !avd) in cond_compute_av()
873 avd->allowed |= node->datum.data; in cond_compute_av()
881 avd->auditdeny &= node->datum.data; in cond_compute_av()
884 avd->auditallow |= node->datum.data; in cond_compute_av()
861 cond_compute_av(avtab_t * ctab, avtab_key_t * key, struct sepol_av_decision *avd) cond_compute_av() argument
H A Dexpand.c3217 avtab_datum_t *avd; in expand_avtab_insert() local
3252 avd = &node->datum; in expand_avtab_insert()
3257 avd->data |= d->data; in expand_avtab_insert()
3260 avd->data &= d->data; in expand_avtab_insert()
3361 avtab_datum_t *avd; in expand_cond_insert() local
3386 avd = &node->datum; in expand_cond_insert()
3390 avd->data |= d->data; in expand_cond_insert()
3393 avd->data &= d->data; in expand_cond_insert()
/third_party/selinux/libsepol/include/sepol/policydb/
H A Dservices.h45 struct sepol_av_decision *avd); /* OUT */
57 struct sepol_av_decision *avd,
73 struct sepol_av_decision *avd,
H A Dconditional.h138 struct sepol_av_decision *avd);
/third_party/selinux/libselinux/include/selinux/
H A Dselinux.h199 struct av_decision *avd);
204 struct av_decision *avd);
210 struct av_decision *avd);
215 struct av_decision *avd);
H A Davc.h258 * @avd: access vector decisions
265 * in @avd. Return %0 if all @requested permissions are granted, -%1 with
276 struct avc_entry_ref *aeref, struct av_decision *avd);
306 * @avd: access vector decisions
321 struct av_decision *avd, int result, void *auditdata);
/third_party/selinux/checkpolicy/
H A Dcheckpolicy.c388 struct sepol_av_decision avd; in main() local
792 ret = sepol_compute_av(ssid, tsid, tclass, 0, &avd); in main()
796 for (i = 1; i <= sizeof(avd.allowed) * 8; i++) { in main()
797 if (avd.allowed & (UINT32_C(1) << (i - 1))) { in main()
1203 tclass, 0, &avd, &reason, in main()

Completed in 14 milliseconds