Home
last modified time | relevance | path

Searched refs:requested (Results 1 – 5 of 5) sorted by relevance

/security/selinux/
Davc.c407 static struct avc_node *avc_lookup(u32 ssid, u32 tsid, u16 tclass, u32 requested) in avc_lookup() argument
414 if (node && ((node->ae.avd.decided & requested) == requested)) { in avc_lookup()
534 u16 tclass, u32 requested, in avc_audit() argument
542 denied = requested & ~avd->allowed; in avc_audit()
548 audited = denied = requested; in avc_audit()
550 audited = requested; in avc_audit()
876 u16 tclass, u32 requested, in avc_has_perm_noaudit() argument
885 BUG_ON(!requested); in avc_has_perm_noaudit()
889 node = avc_lookup(ssid, tsid, tclass, requested); in avc_has_perm_noaudit()
892 rc = security_compute_av(ssid, tsid, tclass, requested, &entry.avd); in avc_has_perm_noaudit()
[all …]
DKconfig84 that determines whether SELinux checks the protection requested
90 default to checking the protection requested by the application.
/security/selinux/include/
Davc.h100 u16 tclass, u32 requested,
105 u16 tclass, u32 requested,
110 u16 tclass, u32 requested,
Dsecurity.h92 u16 tclass, u32 requested,
/security/selinux/ss/
Dservices.c94 u32 requested,
288 u32 requested, in type_attribute_bounds_av() argument
309 requested, in type_attribute_bounds_av()
325 requested, in type_attribute_bounds_av()
342 requested, in type_attribute_bounds_av()
382 u32 requested, in context_struct_compute_av() argument
512 tclass, requested, avd); in context_struct_compute_av()
738 u32 requested, in security_compute_av() argument
771 requested, avd); in security_compute_av()