| /OK3568_Linux_fs/kernel/security/selinux/include/ |
| H A D | avc.h | 52 u32 audited; member 70 u32 denied, audited; in avc_audit_required() local 73 audited = denied & avd->auditdeny; in avc_audit_required() 91 audited = 0; in avc_audit_required() 93 audited = denied = requested; in avc_audit_required() 95 audited = requested & avd->auditallow; in avc_audit_required() 97 return audited; in avc_audit_required() 102 u32 requested, u32 audited, u32 denied, int result, 133 u32 audited, denied; in avc_audit() local 134 audited = avc_audit_required(requested, avd, result, 0, &denied); in avc_audit() [all …]
|
| /OK3568_Linux_fs/kernel/include/trace/events/ |
| H A D | avc.h | 27 __field(u32, audited) 37 __entry->audited = sad->audited; 45 __entry->requested, __entry->denied, __entry->audited, __entry->result,
|
| /OK3568_Linux_fs/kernel/security/selinux/ |
| H A D | avc.c | 397 u32 denied, audited; in avc_xperms_audit_required() local 401 audited = denied & avd->auditdeny; in avc_xperms_audit_required() 402 if (audited && xpd) { in avc_xperms_audit_required() 404 audited &= ~requested; in avc_xperms_audit_required() 407 audited = denied = requested; in avc_xperms_audit_required() 409 audited = requested & avd->auditallow; in avc_xperms_audit_required() 410 if (audited && xpd) { in avc_xperms_audit_required() 412 audited &= ~requested; in avc_xperms_audit_required() 417 return audited; in avc_xperms_audit_required() 427 u32 audited, denied; in avc_xperms_audit() local [all …]
|
| H A D | hooks.c | 3069 u32 perms, u32 audited, u32 denied, in audit_inode_permission() argument 3081 audited, denied, result, &ad); in audit_inode_permission() 3097 u32 audited, denied; in selinux_inode_permission() local 3122 audited = avc_audit_required(perms, &avd, rc, in selinux_inode_permission() 3125 if (likely(!audited)) in selinux_inode_permission() 3132 rc2 = audit_inode_permission(inode, perms, audited, denied, rc); in selinux_inode_permission()
|
| /OK3568_Linux_fs/kernel/Documentation/block/ |
| H A D | biovecs.rst | 89 audited to make sure they are - submitting partially completed bios is
|
| /OK3568_Linux_fs/kernel/Documentation/admin-guide/LSM/ |
| H A D | Smack.rst | 832 By default, all denied events will be audited. You can change this behavior by 843 audited.
|
| /OK3568_Linux_fs/kernel/Documentation/admin-guide/hw-vuln/ |
| H A D | l1tf.rst | 192 only audited code paths before the corresponding VMENTER. These code
|
| /OK3568_Linux_fs/kernel/arch/ |
| H A D | Kconfig | 767 Before enabling this option, arch code must be audited
|
| /OK3568_Linux_fs/yocto/meta-qt5/licenses/ |
| H A D | The-Qt-Company-Commercial | 1199 calendar year, as evidenced by duly audited records of the Licensee and
|
| /OK3568_Linux_fs/kernel/Documentation/filesystems/ |
| H A D | path-lookup.rst | 1322 context of a particular access being audited.
|
| /OK3568_Linux_fs/kernel/Documentation/RCU/Design/Requirements/ |
| H A D | Requirements.rst | 1603 Gleixner audited a number of RCU uses.
|
| /OK3568_Linux_fs/external/xserver/ |
| H A D | ChangeLog | 73610 I audited the code and found two more possible problem spots; the
|