/security/selinux/include/ |
D | avc.h | 53 u32 denied; member 70 u32 denied, audited; in avc_audit_required() local 71 denied = requested & ~avd->allowed; in avc_audit_required() 72 if (unlikely(denied)) { in avc_audit_required() 73 audited = denied & avd->auditdeny; in avc_audit_required() 93 audited = denied = requested; in avc_audit_required() 96 *deniedp = denied; in avc_audit_required() 102 u32 requested, u32 audited, u32 denied, int result, 131 u32 audited, denied; in avc_audit() local 132 audited = avc_audit_required(requested, avd, result, 0, &denied); in avc_audit() [all …]
|
/security/apparmor/ |
D | lib.c | 272 if (aad(sa)->denied) { in aa_audit_perms_cb() 274 aa_audit_perm_mask(ab, aad(sa)->denied, aa_file_perm_chrs, in aa_audit_perms_cb() 434 u32 denied = request & (~perms->allow | perms->deny); in aa_check_perms() local 436 if (likely(!denied)) { in aa_check_perms() 447 if (denied & perms->kill) in aa_check_perms() 449 else if (denied == (denied & perms->complain)) in aa_check_perms() 454 if (denied == (denied & perms->hide)) in aa_check_perms() 457 denied &= ~perms->quiet; in aa_check_perms() 458 if (!sa || !denied) in aa_check_perms() 465 aad(sa)->denied = denied; in aa_check_perms()
|
D | file.c | 55 if (aad(sa)->denied & AA_AUDIT_FILE_MASK) { in file_audit_cb() 57 map_mask_to_chr_mask(aad(sa)->denied)); in file_audit_cb() 140 aad(&sa)->denied = aad(&sa)->request & ~perms->allow; in aa_audit_file() 509 u32 request, u32 denied, bool in_atomic) in __file_path_perm() argument 521 if (!denied && aa_label_is_subset(flabel, label)) in __file_path_perm() 534 if (denied && !error) { in __file_path_perm() 564 u32 request, u32 denied) in __file_sock_perm() argument 572 if (!denied && aa_label_is_subset(flabel, label)) in __file_sock_perm() 577 if (denied) { in __file_sock_perm() 603 u32 denied; in aa_file_perm() local [all …]
|
D | ipc.c | 51 if (aad(sa)->denied & AA_PTRACE_PERM_MASK) { in audit_ptrace_cb() 53 audit_ptrace_mask(aad(sa)->denied)); in audit_ptrace_cb() 169 if (aad(sa)->denied & AA_SIGNAL_PERM_MASK) { in audit_signal_cb() 171 audit_signal_mask(aad(sa)->denied)); in audit_signal_cb()
|
D | net.c | 94 if (aad(sa)->denied & NET_PERMS_MASK) { in audit_net_cb() 96 aa_audit_perm_mask(ab, aad(sa)->denied, NULL, 0, in audit_net_cb()
|
D | capability.c | 120 !cap_raised(profile->caps.denied, cap)) in profile_capable()
|
/security/selinux/ |
D | avc.c | 397 u32 denied, audited; in avc_xperms_audit_required() local 399 denied = requested & ~avd->allowed; in avc_xperms_audit_required() 400 if (unlikely(denied)) { in avc_xperms_audit_required() 401 audited = denied & avd->auditdeny; in avc_xperms_audit_required() 407 audited = denied = requested; in avc_xperms_audit_required() 416 *deniedp = denied; in avc_xperms_audit_required() 427 u32 audited, denied; in avc_xperms_audit() local 430 requested, avd, xpd, perm, result, &denied); in avc_xperms_audit() 434 audited, denied, result, ad); in avc_xperms_audit() 680 audit_log_format(ab, "avc: %s ", sad->denied ? "denied" : "granted"); in avc_audit_pre_callback() [all …]
|
D | hooks.c | 3160 u32 perms, u32 audited, u32 denied, in audit_inode_permission() argument 3171 audited, denied, result, &ad); in audit_inode_permission() 3184 u32 audited, denied; in selinux_inode_permission() local 3210 &denied); in selinux_inode_permission() 3214 rc2 = audit_inode_permission(inode, perms, audited, denied, rc); in selinux_inode_permission()
|
/security/apparmor/include/ |
D | capability.h | 31 kernel_cap_t denied; member
|
D | audit.h | 115 u32 denied; member
|