Searched refs:auditallow (Results 1 – 14 of 14) sorted by relevance
57 &avd->auditallow, &avd->auditdeny, in security_compute_av_flags_raw()98 avd->auditallow = lavd.auditallow; in security_compute_av_raw()150 avd->auditallow = lavd.auditallow; in security_compute_av()
234 if (avd->auditallow & mapping->perms[i]) in map_decision()236 avd->auditallow = result; in map_decision()
704 audited = requested & avd->auditallow; in avc_audit()739 avd->auditallow = 0; in avd_init()957 node->ae.avd.auditallow |= perms; in avc_update_node()960 node->ae.avd.auditallow &= ~perms; in avc_update_node()
42 if (avd.auditallow) { in main()44 print_access_vector(tclass, avd.auditallow); in main()
56 sepol_access_vector_t auditallow; member
92 auditallow section in Access Vector Rules100 (auditallow source_id target_id|self classpermissionset_id ...)112 <td align="left"><p><code>auditallow</code></p></td>113 <td align="left"><p>The <code>auditallow</code> keyword.</p></td>138 (auditallow release_app.process secmark_demo.browser_packet (packet (send recv)))311 …is to work there must *also* be valid equivalent [`auditallow`](cil_access_vector_rules.md#audital…354 (auditallow type_1 type_2 (tcp_socket (ioctl))) ;; pre-requisite
25 * [auditallow](cil_access_vector_rules.md#auditallow)
49 ….e. [`allow`](cil_access_vector_rules.md#allow), [`auditallow`](cil_access_vector_rules.md#audital…
91 (auditallow device_t exec_t (file (read write)))128 (auditallow device_t auditadm_t (file (open)))
150 auditallow { return(AUDITALLOW); }
135 access_vector_t auditallow; member
1471 auditallow kernel_t security_t:security load_policy;1556 auditallow kernel_t security_t:security { load_policy setenforce setbool };1566 auditallow kernel_t self:process execstack;1570 auditallow kernel_t self:process execheap;1573 auditallow kernel_t self:process execmem;
895 avd->auditallow |= node->datum.data; in cond_compute_av()
933 avd->auditallow = 0; in context_struct_compute_av()960 avd->auditallow |= node->datum.data; in context_struct_compute_av()