Home
last modified time | relevance | path

Searched refs:audited (Results 1 – 12 of 12) sorted by relevance

/kernel/linux/linux-5.10/security/selinux/include/
Davc.h52 u32 audited; member
70 u32 denied, audited; in avc_audit_required() local
73 audited = denied & avd->auditdeny; in avc_audit_required()
91 audited = 0; in avc_audit_required()
93 audited = denied = requested; in avc_audit_required()
95 audited = requested & avd->auditallow; in avc_audit_required()
97 return audited; in avc_audit_required()
102 u32 requested, u32 audited, u32 denied, int result,
133 u32 audited, denied; in avc_audit() local
134 audited = avc_audit_required(requested, avd, result, 0, &denied); in avc_audit()
[all …]
/kernel/linux/linux-5.10/include/trace/events/
Davc.h27 __field(u32, audited)
37 __entry->audited = sad->audited;
45 __entry->requested, __entry->denied, __entry->audited, __entry->result,
/kernel/linux/linux-5.10/security/selinux/
Davc.c394 u32 denied, audited; in avc_xperms_audit_required() local
398 audited = denied & avd->auditdeny; in avc_xperms_audit_required()
399 if (audited && xpd) { in avc_xperms_audit_required()
401 audited &= ~requested; in avc_xperms_audit_required()
404 audited = denied = requested; in avc_xperms_audit_required()
406 audited = requested & avd->auditallow; in avc_xperms_audit_required()
407 if (audited && xpd) { in avc_xperms_audit_required()
409 audited &= ~requested; in avc_xperms_audit_required()
414 return audited; in avc_xperms_audit_required()
424 u32 audited, denied; in avc_xperms_audit() local
[all …]
Dhooks.c3011 u32 perms, u32 audited, u32 denied, in audit_inode_permission() argument
3023 audited, denied, result, &ad); in audit_inode_permission()
3039 u32 audited, denied; in selinux_inode_permission() local
3064 audited = avc_audit_required(perms, &avd, rc, in selinux_inode_permission()
3067 if (likely(!audited)) in selinux_inode_permission()
3074 rc2 = audit_inode_permission(inode, perms, audited, denied, rc); in selinux_inode_permission()
/kernel/linux/linux-5.10/Documentation/block/
Dbiovecs.rst89 audited to make sure they are - submitting partially completed bios is
/kernel/linux/linux-5.10/Documentation/admin-guide/LSM/
DSmack.rst832 By default, all denied events will be audited. You can change this behavior by
843 audited.
/kernel/linux/linux-5.10/drivers/char/
DKconfig484 something that can be independently audited, this amounts to trusting
/kernel/linux/linux-5.10/Documentation/admin-guide/hw-vuln/
Dl1tf.rst192 only audited code paths before the corresponding VMENTER. These code
/kernel/linux/linux-5.10/arch/
DKconfig788 Before enabling this option, arch code must be audited
/kernel/linux/linux-5.10/Documentation/filesystems/
Dpath-lookup.rst1322 context of a particular access being audited.
/kernel/linux/linux-5.10/Documentation/RCU/Design/Requirements/
DRequirements.rst1603 Gleixner audited a number of RCU uses.
/kernel/linux/patches/linux-5.10/imx8mm_patch/patches/
D0005_linux_include.patch6483 + * any change here should be audited in PME.) */