/kernel/linux/linux-6.6/security/selinux/ |
H A D | avc.c | 51 struct av_decision avd; member 386 struct av_decision *avd, in avc_xperms_audit_required() 394 denied = requested & ~avd->allowed; in avc_xperms_audit_required() 396 audited = denied & avd->auditdeny; in avc_xperms_audit_required() 404 audited = requested & avd->auditallow; in avc_xperms_audit_required() 416 u32 requested, struct av_decision *avd, in avc_xperms_audit() 424 requested, avd, xpd, perm, result, &denied); in avc_xperms_audit() 515 static void avc_node_populate(struct avc_node *node, u32 ssid, u32 tsid, u16 tclass, struct av_decision *avd) in avc_node_populate() argument 520 memcpy(&node->ae.avd, avd, sizeo in avc_node_populate() 385 avc_xperms_audit_required(u32 requested, struct av_decision *avd, struct extended_perms_decision *xpd, u8 perm, int result, u32 *deniedp) avc_xperms_audit_required() argument 415 avc_xperms_audit(u32 ssid, u32 tsid, u16 tclass, u32 requested, struct av_decision *avd, struct extended_perms_decision *xpd, u8 perm, int result, struct common_audit_data *ad) avc_xperms_audit() argument 608 avc_insert(u32 ssid, u32 tsid, u16 tclass, struct av_decision *avd, struct avc_xperms_node *xp_node) avc_insert() argument 985 avc_compute_av(u32 ssid, u32 tsid, u16 tclass, struct av_decision *avd, struct avc_xperms_node *xp_node) avc_compute_av() argument 994 avc_denied(u32 ssid, u32 tsid, u16 tclass, u32 requested, u8 driver, u8 xperm, unsigned int flags, struct av_decision *avd) avc_denied() argument 1022 struct av_decision avd; avc_has_extended_perms() local 1107 avc_perm_nonode(u32 ssid, u32 tsid, u16 tclass, u32 requested, unsigned int flags, struct av_decision *avd) avc_perm_nonode() argument 1142 avc_has_perm_noaudit(u32 ssid, u32 tsid, u16 tclass, u32 requested, unsigned int flags, struct av_decision *avd) avc_has_perm_noaudit() argument 1189 struct av_decision avd; avc_has_perm() local [all...] |
H A D | selinuxfs.c | 870 struct av_decision avd; in sel_write_access() local 900 security_compute_av_user(ssid, tsid, tclass, &avd); in sel_write_access() 904 avd.allowed, 0xffffffff, in sel_write_access() 905 avd.auditallow, avd.auditdeny, in sel_write_access() 906 avd.seqno, avd.flags); in sel_write_access()
|
H A D | hooks.c | 1622 struct av_decision avd; in cred_has_capability() local 1644 rc = avc_has_perm_noaudit(sid, sid, sclass, av, 0, &avd); in cred_has_capability() 1646 int rc2 = avc_audit(sid, sid, sclass, av, &avd, rc, &ad); in cred_has_capability() 3090 struct av_decision avd; in selinux_inode_permission() local 3112 &avd); in selinux_inode_permission() 3113 audited = avc_audit_required(perms, &avd, rc, in selinux_inode_permission()
|
/kernel/linux/linux-5.10/security/selinux/ |
H A D | avc.c | 51 struct av_decision avd; member 388 struct av_decision *avd, in avc_xperms_audit_required() 396 denied = requested & ~avd->allowed; in avc_xperms_audit_required() 398 audited = denied & avd->auditdeny; in avc_xperms_audit_required() 406 audited = requested & avd->auditallow; in avc_xperms_audit_required() 419 u32 requested, struct av_decision *avd, in avc_xperms_audit() 427 requested, avd, xpd, perm, result, &denied); in avc_xperms_audit() 519 static void avc_node_populate(struct avc_node *node, u32 ssid, u32 tsid, u16 tclass, struct av_decision *avd) in avc_node_populate() argument 524 memcpy(&node->ae.avd, avd, sizeo in avc_node_populate() 387 avc_xperms_audit_required(u32 requested, struct av_decision *avd, struct extended_perms_decision *xpd, u8 perm, int result, u32 *deniedp) avc_xperms_audit_required() argument 417 avc_xperms_audit(struct selinux_state *state, u32 ssid, u32 tsid, u16 tclass, u32 requested, struct av_decision *avd, struct extended_perms_decision *xpd, u8 perm, int result, struct common_audit_data *ad) avc_xperms_audit() argument 616 avc_insert(struct selinux_avc *avc, u32 ssid, u32 tsid, u16 tclass, struct av_decision *avd, struct avc_xperms_node *xp_node) avc_insert() argument 1003 avc_compute_av(struct selinux_state *state, u32 ssid, u32 tsid, u16 tclass, struct av_decision *avd, struct avc_xperms_node *xp_node) avc_compute_av() argument 1015 avc_denied(struct selinux_state *state, u32 ssid, u32 tsid, u16 tclass, u32 requested, u8 driver, u8 xperm, unsigned int flags, struct av_decision *avd) avc_denied() argument 1045 struct av_decision avd; avc_has_extended_perms() local 1137 avc_has_perm_noaudit(struct selinux_state *state, u32 ssid, u32 tsid, u16 tclass, u32 requested, unsigned int flags, struct av_decision *avd) avc_has_perm_noaudit() argument 1187 struct av_decision avd; avc_has_perm() local 1205 struct av_decision avd; avc_has_perm_flags() local [all...] |
H A D | selinuxfs.c | 912 struct av_decision avd; in sel_write_access() local 943 security_compute_av_user(state, ssid, tsid, tclass, &avd); in sel_write_access() 947 avd.allowed, 0xffffffff, in sel_write_access() 948 avd.auditallow, avd.auditdeny, in sel_write_access() 949 avd.seqno, avd.flags); in sel_write_access()
|
H A D | hooks.c | 1604 struct av_decision avd; in cred_has_capability() local 1627 sid, sid, sclass, av, 0, &avd); in cred_has_capability() 1630 sid, sid, sclass, av, &avd, rc, &ad, 0); in cred_has_capability() 3038 struct av_decision avd; in selinux_inode_permission() local 3064 &avd); in selinux_inode_permission() 3065 audited = avc_audit_required(perms, &avd, rc, in selinux_inode_permission()
|
/kernel/linux/linux-5.10/security/selinux/include/ |
H A D | avc.h | 65 struct av_decision *avd, in avc_audit_required() 71 denied = requested & ~avd->allowed; in avc_audit_required() 73 audited = denied & avd->auditdeny; in avc_audit_required() 83 * avd.auditdeny & ACCESS == 0 (not set means explicit rule) in avc_audit_required() 90 if (auditdeny && !(auditdeny & avd->auditdeny)) in avc_audit_required() 95 audited = requested & avd->auditallow; in avc_audit_required() 111 * @avd: access vector decisions 128 struct av_decision *avd, in avc_audit() 134 audited = avc_audit_required(requested, avd, result, 0, &denied); in avc_audit() 152 struct av_decision *avd); 64 avc_audit_required(u32 requested, struct av_decision *avd, int result, u32 auditdeny, u32 *deniedp) avc_audit_required() argument 125 avc_audit(struct selinux_state *state, u32 ssid, u32 tsid, u16 tclass, u32 requested, struct av_decision *avd, int result, struct common_audit_data *a, int flags) avc_audit() argument [all...] |
H A D | security.h | 287 u16 tclass, struct av_decision *avd, 297 u16 tclass, struct av_decision *avd);
|
/kernel/linux/linux-6.6/security/selinux/include/ |
H A D | avc.h | 64 struct av_decision *avd, in avc_audit_required() 70 denied = requested & ~avd->allowed; in avc_audit_required() 72 audited = denied & avd->auditdeny; in avc_audit_required() 82 * avd.auditdeny & ACCESS == 0 (not set means explicit rule) in avc_audit_required() 89 if (auditdeny && !(auditdeny & avd->auditdeny)) in avc_audit_required() 94 audited = requested & avd->auditallow; in avc_audit_required() 109 * @avd: access vector decisions 124 struct av_decision *avd, in avc_audit() 129 audited = avc_audit_required(requested, avd, result, 0, &denied); in avc_audit() 142 struct av_decision *avd); 63 avc_audit_required(u32 requested, struct av_decision *avd, int result, u32 auditdeny, u32 *deniedp) avc_audit_required() argument 122 avc_audit(u32 ssid, u32 tsid, u16 tclass, u32 requested, struct av_decision *avd, int result, struct common_audit_data *a) avc_audit() argument [all...] |
H A D | security.h | 244 u16 tclass, struct av_decision *avd, 252 u16 tclass, struct av_decision *avd);
|
/kernel/linux/linux-6.6/arch/riscv/kernel/vdso/ |
H A D | hwprobe.c | 24 const struct arch_vdso_data *avd = &vd->arch_data; in __vdso_riscv_hwprobe() local 35 if ((flags != 0) || (!all_cpus && !avd->homogeneous_cpus)) in __vdso_riscv_hwprobe() 41 p->value = avd->all_cpu_hwprobe_values[p->key]; in __vdso_riscv_hwprobe()
|
/kernel/linux/common_modules/memory_security/src/ |
H A D | hideaddr.c | 42 struct av_decision avd; in hideaddr_avc_has_perm() local 50 AVC_STRICT, &avd); in hideaddr_avc_has_perm() 53 AVC_STRICT, &avd); in hideaddr_avc_has_perm()
|
H A D | jit_memory.c | 25 struct av_decision avd; in jit_avc_has_perm() local 31 AVC_STRICT, &avd) == 0); in jit_avc_has_perm() 34 AVC_STRICT, &avd) == 0); in jit_avc_has_perm()
|
/kernel/linux/linux-5.10/security/selinux/ss/ |
H A D | services.c | 96 struct av_decision *avd, 204 u16 tclass, struct av_decision *avd, in map_decision() 213 if (avd->allowed & mapping->perms[i]) in map_decision() 218 avd->allowed = result; in map_decision() 221 if (avd->auditallow & mapping->perms[i]) in map_decision() 223 avd->auditallow = result; in map_decision() 226 if (avd->auditdeny & mapping->perms[i]) in map_decision() 238 avd->auditdeny = result; in map_decision() 542 struct av_decision *avd) in type_attribute_bounds_av() 577 masked = ~lo_avd.allowed & avd in type_attribute_bounds_av() 203 map_decision(struct selinux_map *map, u16 tclass, struct av_decision *avd, int allow_unknown) map_decision() argument 538 type_attribute_bounds_av(struct policydb *policydb, struct context *scontext, struct context *tcontext, u16 tclass, struct av_decision *avd) type_attribute_bounds_av() argument 619 context_struct_compute_av(struct policydb *policydb, struct context *scontext, struct context *tcontext, u16 tclass, struct av_decision *avd, struct extended_perms *xperms) context_struct_compute_av() argument 948 avd_init(struct selinux_policy *policy, struct av_decision *avd) avd_init() argument 1110 security_compute_av(struct selinux_state *state, u32 ssid, u32 tsid, u16 orig_tclass, struct av_decision *avd, struct extended_perms *xperms) security_compute_av() argument 1169 security_compute_av_user(struct selinux_state *state, u32 ssid, u32 tsid, u16 tclass, struct av_decision *avd) security_compute_av_user() argument [all...] |
H A D | conditional.c | 576 struct av_decision *avd, struct extended_perms *xperms) in cond_compute_av() 580 if (!ctab || !key || !avd) in cond_compute_av() 587 avd->allowed |= node->datum.u.data; in cond_compute_av() 595 avd->auditdeny &= node->datum.u.data; in cond_compute_av() 598 avd->auditallow |= node->datum.u.data; in cond_compute_av() 575 cond_compute_av(struct avtab *ctab, struct avtab_key *key, struct av_decision *avd, struct extended_perms *xperms) cond_compute_av() argument
|
H A D | conditional.h | 78 struct av_decision *avd, struct extended_perms *xperms);
|
/kernel/linux/linux-6.6/security/selinux/ss/ |
H A D | services.c | 92 struct av_decision *avd, 200 u16 tclass, struct av_decision *avd, in map_decision() 209 if (avd->allowed & mapping->perms[i]) in map_decision() 214 avd->allowed = result; in map_decision() 217 if (avd->auditallow & mapping->perms[i]) in map_decision() 219 avd->auditallow = result; in map_decision() 222 if (avd->auditdeny & mapping->perms[i]) in map_decision() 234 avd->auditdeny = result; in map_decision() 536 struct av_decision *avd) in type_attribute_bounds_av() 571 masked = ~lo_avd.allowed & avd in type_attribute_bounds_av() 199 map_decision(struct selinux_map *map, u16 tclass, struct av_decision *avd, int allow_unknown) map_decision() argument 532 type_attribute_bounds_av(struct policydb *policydb, struct context *scontext, struct context *tcontext, u16 tclass, struct av_decision *avd) type_attribute_bounds_av() argument 611 context_struct_compute_av(struct policydb *policydb, struct context *scontext, struct context *tcontext, u16 tclass, struct av_decision *avd, struct extended_perms *xperms) context_struct_compute_av() argument 934 avd_init(struct selinux_policy *policy, struct av_decision *avd) avd_init() argument 1095 security_compute_av(u32 ssid, u32 tsid, u16 orig_tclass, struct av_decision *avd, struct extended_perms *xperms) security_compute_av() argument 1153 security_compute_av_user(u32 ssid, u32 tsid, u16 tclass, struct av_decision *avd) security_compute_av_user() argument [all...] |
H A D | conditional.c | 575 struct av_decision *avd, struct extended_perms *xperms) in cond_compute_av() 579 if (!ctab || !key || !avd) in cond_compute_av() 586 avd->allowed |= node->datum.u.data; in cond_compute_av() 594 avd->auditdeny &= node->datum.u.data; in cond_compute_av() 597 avd->auditallow |= node->datum.u.data; in cond_compute_av() 574 cond_compute_av(struct avtab *ctab, struct avtab_key *key, struct av_decision *avd, struct extended_perms *xperms) cond_compute_av() argument
|
H A D | conditional.h | 78 struct av_decision *avd, struct extended_perms *xperms);
|
/kernel/linux/common_modules/code_sign/ |
H A D | code_sign_ioctl.c | 184 struct av_decision avd; in code_sign_avc_has_perm() local 189 AVC_STRICT, &avd); in code_sign_avc_has_perm() 190 rc2 = avc_audit(&selinux_state, sid, sid, tclass, requested, &avd, rc, in code_sign_avc_has_perm() 194 AVC_STRICT, &avd); in code_sign_avc_has_perm() 195 rc2 = avc_audit(sid, sid, tclass, requested, &avd, rc, in code_sign_avc_has_perm()
|
/kernel/linux/linux-6.6/arch/riscv/kernel/ |
H A D | sys_riscv.c | 292 struct arch_vdso_data *avd = &vd->arch_data; in init_hwprobe_vdso_data() local 307 avd->all_cpu_hwprobe_values[key] = pair.value; in init_hwprobe_vdso_data() 323 avd->homogeneous_cpus = id_bitsmash != 0 && id_bitsmash != -1; in init_hwprobe_vdso_data()
|
/kernel/linux/common_modules/xpm/core/ |
H A D | xpm_security_hooks.c | 183 struct av_decision avd; in xpm_avc_has_perm() local 188 AVC_STRICT, &avd); in xpm_avc_has_perm() 191 AVC_STRICT, &avd); in xpm_avc_has_perm()
|
/kernel/linux/common_modules/container_escape_detection/core/ |
H A D | ced_detection.c | 41 struct av_decision avd; in ced_avc_has_perm() local 54 AVC_STRICT, &avd); in ced_avc_has_perm() 57 AVC_STRICT, &avd); in ced_avc_has_perm()
|