Lines Matching defs:avd
23 struct av_decision avd;
393 if (node && ((node->ae.avd.decided & requested) == requested)) {
419 * sequence number @ae->avd.seqno is not less than the latest
432 if (ae->avd.seqno < avc_cache.latest_notif) {
435 ae->avd.seqno, avc_cache.latest_notif);
447 memcpy(&node->ae.avd, &ae->avd, sizeof(ae->avd));
656 struct av_decision *avd, int result, void *a)
660 denied = requested & ~avd->allowed;
662 audited = denied & avd->auditdeny;
666 audited = requested & avd->auditallow;
700 static void avd_init(struct av_decision *avd)
702 avd->allowed = 0;
703 avd->auditallow = 0;
704 avd->auditdeny = 0xffffffff;
705 avd->seqno = avc_cache.latest_notif;
706 avd->flags = 0;
713 struct avc_entry_ref *aeref, struct av_decision *avd)
721 if (avd)
722 avd_init(avd);
740 ((ae->avd.decided & requested) == requested)) {
755 &entry.avd);
769 if (avd)
770 memcpy(avd, &ae->avd, sizeof(*avd));
772 denied = requested & ~(ae->avd.allowed);
776 (ae->avd.flags & SELINUX_AVD_FLAGS_PERMISSIVE))
777 ae->avd.allowed |= requested;
795 struct av_decision avd;
798 rc = avc_has_perm_noaudit(ssid, tsid, tclass, requested, aeref, &avd);
800 avc_audit(ssid, tsid, tclass, requested, &avd, rc, auditdata);
823 tclass, 0, &entry.avd);
895 node->ae.avd.allowed |= perms;
899 node->ae.avd.allowed &= ~perms;
902 node->ae.avd.auditallow |= perms;
905 node->ae.avd.auditallow &= ~perms;
908 node->ae.avd.auditdeny |= perms;
911 node->ae.avd.auditdeny &= ~perms;