Searched refs:audited (Results 1 – 7 of 7) sorted by relevance
| /linux/security/selinux/include/ |
| H A D | avc.h | 53 u32 audited; member 67 u32 denied, audited; in avc_audit_required() local 74 audited = denied & avd->auditdeny; in avc_audit_required() 92 audited = 0; in avc_audit_required() 94 audited = denied = requested; in avc_audit_required() 96 audited = requested & avd->auditallow; in avc_audit_required() 98 return audited; in avc_audit_required() 101 int slow_avc_audit(u32 ssid, u32 tsid, u16 tclass, u32 requested, u32 audited, 127 u32 audited, denied; in avc_audit() local 128 audited = avc_audit_required(requested, avd, result, 0, &denied); in avc_audit() [all …]
|
| /linux/include/trace/events/ |
| H A D | avc.h | 27 __field(u32, audited) 37 __entry->audited = sad->audited; 44 TP_printk("requested=0x%x denied=0x%x audited=0x%x result=%d scontext=%s tcontext=%s tclass=%s", 45 __entry->requested, __entry->denied, __entry->audited, __entry->result,
|
| /linux/security/selinux/ |
| H A D | avc.c | 390 u32 denied, audited; in avc_xperms_audit_required() local 394 audited = denied & avd->auditdeny; in avc_xperms_audit_required() 395 if (audited && xpd) { in avc_xperms_audit_required() 397 audited = 0; in avc_xperms_audit_required() 400 audited = denied = requested; in avc_xperms_audit_required() 402 audited = requested & avd->auditallow; in avc_xperms_audit_required() 403 if (audited && xpd) { in avc_xperms_audit_required() 405 audited = 0; in avc_xperms_audit_required() 410 return audited; in avc_xperms_audit_required() 419 u32 audited, denied; in avc_xperms_audit() local [all …]
|
| H A D | hooks.c | 3115 u32 perms, u32 audited, u32 denied, in audit_inode_permission() argument 3125 audited, denied, result, &ad); in audit_inode_permission() 3195 u32 audited) in task_avdcache_update() argument 3207 tsec->avdcache.dir[spot].audited = audited; in task_avdcache_update() 3231 u32 audited, denied; in selinux_inode_permission() local 3251 audited = perms & avdc->audited; in selinux_inode_permission() 3262 audited = avc_audit_required(perms, &avd, rc, in selinux_inode_permission() 3265 task_avdcache_update(tsec, isec, &avd, audited); in selinux_inode_permission() 3268 if (likely(!audited)) in selinux_inode_permission() 3271 rc2 = audit_inode_permission(inode, perms, audited, denied, rc); in selinux_inode_permission()
|
| /linux/Documentation/admin-guide/LSM/ |
| H A D | ipe.rst | 431 | res | integer | No | The result of the audited operation(success/fai… 464 | res | integer | No | The result of the audited operation(success/fail) … 533 | res | integer | No | The result of the audited operation(success/fail) …
|
| H A D | Smack.rst | 842 By default, all denied events will be audited. You can change this behavior by 853 audited.
|
| /linux/Documentation/admin-guide/hw-vuln/ |
| H A D | l1tf.rst | 192 only audited code paths before the corresponding VMENTER. These code
|