Searched refs:sad (Results 1 – 3 of 3) sorted by relevance
/security/smack/ |
D | smack_access.c | 314 struct smack_audit_data *sad = ad->smack_audit_data; in smack_log_callback() local 317 sad->result ? "denied" : "granted"); in smack_log_callback() 319 audit_log_untrustedstring(ab, sad->subject); in smack_log_callback() 321 audit_log_untrustedstring(ab, sad->object); in smack_log_callback() 322 if (sad->request[0] == '\0') in smack_log_callback() 325 audit_log_format(ab, " requested=%s", sad->request); in smack_log_callback() 347 struct smack_audit_data *sad; in smack_log() local 356 sad = a->smack_audit_data; in smack_log() 358 if (sad->function == NULL) in smack_log() 359 sad->function = "unknown"; in smack_log() [all …]
|
D | smack.h | 279 struct smack_audit_data sad; member 462 memset(&a->sad, 0, sizeof(a->sad)); in smk_ad_init() 464 a->a.smack_audit_data = &a->sad; in smk_ad_init()
|
/security/selinux/ |
D | avc.c | 675 struct selinux_audit_data *sad = ad->selinux_audit_data; in avc_audit_pre_callback() local 676 u32 av = sad->audited; in avc_audit_pre_callback() 680 audit_log_format(ab, "avc: %s ", sad->denied ? "denied" : "granted"); in avc_audit_pre_callback() 687 perms = secclass_map[sad->tclass-1].perms; in avc_audit_pre_callback() 716 struct selinux_audit_data *sad = ad->selinux_audit_data; in avc_audit_post_callback() local 724 rc = security_sid_to_context(sad->state, sad->ssid, &scontext, in avc_audit_post_callback() 727 audit_log_format(ab, " ssid=%d", sad->ssid); in avc_audit_post_callback() 731 rc = security_sid_to_context(sad->state, sad->tsid, &tcontext, in avc_audit_post_callback() 734 audit_log_format(ab, " tsid=%d", sad->tsid); in avc_audit_post_callback() 738 tclass = secclass_map[sad->tclass-1].name; in avc_audit_post_callback() [all …]
|