/third_party/selinux/libselinux/src/ |
H A D | compute_av.c | 17 struct av_decision *avd) in security_compute_av_flags_raw() 62 &avd->allowed, &avd->decided, in security_compute_av_flags_raw() 63 &avd->auditallow, &avd->auditdeny, in security_compute_av_flags_raw() 64 &avd->seqno, &avd->flags); in security_compute_av_flags_raw() 69 avd->flags = 0; in security_compute_av_flags_raw() 73 * kernel will have already set avd according to the in security_compute_av_flags_raw() 76 * avd t in security_compute_av_flags_raw() 13 security_compute_av_flags_raw(const char * scon, const char * tcon, security_class_t tclass, access_vector_t requested, struct av_decision *avd) security_compute_av_flags_raw() argument 90 security_compute_av_raw(const char * scon, const char * tcon, security_class_t tclass, access_vector_t requested, struct av_decision *avd) security_compute_av_raw() argument 116 security_compute_av_flags(const char * scon, const char * tcon, security_class_t tclass, access_vector_t requested, struct av_decision *avd) security_compute_av_flags() argument 142 security_compute_av(const char * scon, const char * tcon, security_class_t tclass, access_vector_t requested, struct av_decision *avd) security_compute_av() argument [all...] |
H A D | avc.c | 23 struct av_decision avd; member 435 if (node && ((node->ae.avd.decided & requested) == requested)) { in avc_lookup() 461 * sequence number @ae->avd.seqno is not less than the latest 474 if (ae->avd.seqno < avc_cache.latest_notif) { in avc_insert() 477 ae->avd.seqno, avc_cache.latest_notif); in avc_insert() 489 memcpy(&node->ae.avd, &ae->avd, sizeof(ae->avd)); in avc_insert() 694 struct av_decision *avd, int result, void *a) in avc_audit() 698 denied = requested & ~avd in avc_audit() 692 avc_audit(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t requested, struct av_decision *avd, int result, void *a) avc_audit() argument 735 avd_init(struct av_decision *avd) avd_init() argument 744 avc_has_perm_noaudit(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t requested, struct avc_entry_ref *aeref, struct av_decision *avd) avc_has_perm_noaudit() argument 829 struct av_decision avd; avc_has_perm() local [all...] |
H A D | mapping.c | 209 map_decision(security_class_t tclass, struct av_decision *avd) in map_decision() argument 218 if (avd->allowed & mapping->perms[i]) in map_decision() 223 avd->allowed = result; in map_decision() 226 if (avd->decided & mapping->perms[i]) in map_decision() 231 avd->decided = result; in map_decision() 234 if (avd->auditallow & mapping->perms[i]) in map_decision() 236 avd->auditallow = result; in map_decision() 239 if (avd->auditdeny & mapping->perms[i]) in map_decision() 252 avd->auditdeny = result; in map_decision()
|
H A D | checkAccess.c | 75 struct av_decision avd; in selinux_check_passwd_access_internal() local 90 &avd); in selinux_check_passwd_access_internal() 92 if ((retval == 0) && ((requested & avd.allowed) == requested)) { in selinux_check_passwd_access_internal()
|
H A D | audit2why.c | 67 struct sepol_av_decision avd; in check_booleans() local 113 avc->av, &avd, &reason); in check_booleans() 328 struct sepol_av_decision avd; in analyze() local 382 rc = sepol_compute_av_reason_buffer(ssid, tsid, tclass, av, &avd, &reason, &reason_buf, 0); in analyze() 395 if (av & ~avd.auditdeny) { in analyze()
|
H A D | mapping.h | 32 map_decision(security_class_t tclass, struct av_decision *avd);
|
/third_party/selinux/libselinux/utils/ |
H A D | compute_av.c | 11 struct av_decision avd; in main() local 37 ret = security_compute_av(argv[1], argv[2], tclass, 1, &avd); in main() 44 print_access_vector(tclass, avd.allowed); in main() 47 if (avd.decided != ~0U) { in main() 49 print_access_vector(tclass, avd.decided); in main() 53 if (avd.auditallow) { in main() 55 print_access_vector(tclass, avd.auditallow); in main() 59 if (avd.auditdeny != ~0U) { in main() 61 print_access_vector(tclass, avd.auditdeny); in main()
|
/third_party/selinux/libsepol/utils/ |
H A D | sepol_compute_av.c | 15 struct sepol_av_decision avd; in main() local 50 rc = sepol_compute_av(ssid, tsid, tclass, 0, &avd); in main() 53 printf("allowed: %s\n", sepol_av_perm_to_string(tclass, avd.allowed)); in main() 54 printf("decided: %s\n", sepol_av_perm_to_string(tclass, avd.decided)); in main() 55 printf("auditallow: %s\n", sepol_av_perm_to_string(tclass, avd.auditallow)); in main() 56 printf("auditdeny: %s\n", sepol_av_perm_to_string(tclass, avd.auditdeny)); in main()
|
H A D | sepol_check_access.c | 17 struct sepol_av_decision avd; in main() local 86 if (sepol_compute_av_reason_buffer(ssid, tsid, tclass, av, &avd, &reason, &reason_buf, 0) < 0) { in main() 91 if ((avd.allowed & av) == av) { in main()
|
/third_party/selinux/libsepol/src/ |
H A D | services.c | 844 struct sepol_av_decision *avd, 853 struct sepol_av_decision *avd, in type_attribute_bounds_av() 889 masked = ~lo_avd.allowed & avd->allowed; in type_attribute_bounds_av() 895 avd->allowed &= ~masked; in type_attribute_bounds_av() 909 struct sepol_av_decision *avd, in context_struct_compute_av() 932 avd->allowed = 0; in context_struct_compute_av() 933 avd->decided = 0xffffffff; in context_struct_compute_av() 934 avd->auditallow = 0; in context_struct_compute_av() 935 avd->auditdeny = 0xffffffff; in context_struct_compute_av() 936 avd in context_struct_compute_av() 849 type_attribute_bounds_av(context_struct_t *scontext, context_struct_t *tcontext, sepol_security_class_t tclass, sepol_access_vector_t requested, struct sepol_av_decision *avd, unsigned int *reason) type_attribute_bounds_av() argument 905 context_struct_compute_av(context_struct_t * scontext, context_struct_t * tcontext, sepol_security_class_t tclass, sepol_access_vector_t requested, struct sepol_av_decision *avd, unsigned int *reason, char **r_buf, unsigned int flags) context_struct_compute_av() argument 1089 sepol_compute_av_reason(sepol_security_id_t ssid, sepol_security_id_t tsid, sepol_security_class_t tclass, sepol_access_vector_t requested, struct sepol_av_decision *avd, unsigned int *reason) sepol_compute_av_reason() argument 1123 sepol_compute_av_reason_buffer(sepol_security_id_t ssid, sepol_security_id_t tsid, sepol_security_class_t tclass, sepol_access_vector_t requested, struct sepol_av_decision *avd, unsigned int *reason, char **reason_buf, unsigned int flags) sepol_compute_av_reason_buffer() argument 1165 sepol_compute_av(sepol_security_id_t ssid, sepol_security_id_t tsid, sepol_security_class_t tclass, sepol_access_vector_t requested, struct sepol_av_decision *avd) sepol_compute_av() argument 2154 struct sepol_av_decision avd; sepol_get_user_sids() local [all...] |
H A D | conditional.c | 862 struct sepol_av_decision *avd) in cond_compute_av() 866 if (!ctab || !key || !avd) in cond_compute_av() 873 avd->allowed |= node->datum.data; in cond_compute_av() 881 avd->auditdeny &= node->datum.data; in cond_compute_av() 884 avd->auditallow |= node->datum.data; in cond_compute_av() 861 cond_compute_av(avtab_t * ctab, avtab_key_t * key, struct sepol_av_decision *avd) cond_compute_av() argument
|
H A D | expand.c | 3217 avtab_datum_t *avd; in expand_avtab_insert() local 3252 avd = &node->datum; in expand_avtab_insert() 3257 avd->data |= d->data; in expand_avtab_insert() 3260 avd->data &= d->data; in expand_avtab_insert() 3361 avtab_datum_t *avd; in expand_cond_insert() local 3386 avd = &node->datum; in expand_cond_insert() 3390 avd->data |= d->data; in expand_cond_insert() 3393 avd->data &= d->data; in expand_cond_insert()
|
/third_party/selinux/libsepol/include/sepol/policydb/ |
H A D | services.h | 45 struct sepol_av_decision *avd); /* OUT */ 57 struct sepol_av_decision *avd, 73 struct sepol_av_decision *avd,
|
H A D | conditional.h | 138 struct sepol_av_decision *avd);
|
/third_party/selinux/libselinux/include/selinux/ |
H A D | selinux.h | 199 struct av_decision *avd); 204 struct av_decision *avd); 210 struct av_decision *avd); 215 struct av_decision *avd);
|
H A D | avc.h | 258 * @avd: access vector decisions 265 * in @avd. Return %0 if all @requested permissions are granted, -%1 with 276 struct avc_entry_ref *aeref, struct av_decision *avd); 306 * @avd: access vector decisions 321 struct av_decision *avd, int result, void *auditdata);
|
/third_party/selinux/checkpolicy/ |
H A D | checkpolicy.c | 388 struct sepol_av_decision avd; in main() local 792 ret = sepol_compute_av(ssid, tsid, tclass, 0, &avd); in main() 796 for (i = 1; i <= sizeof(avd.allowed) * 8; i++) { in main() 797 if (avd.allowed & (UINT32_C(1) << (i - 1))) { in main() 1203 tclass, 0, &avd, &reason, in main()
|