Searched refs:auditallow (Results 1 – 9 of 9) sorted by relevance
57 sepol_access_vector_t auditallow; member
186 if (avd->auditallow & current_mapping[tclass].perms[i]) in map_decision()188 avd->auditallow = result; in map_decision()
293 ae->avd.auditallow = ae->avd.auditdeny = 0; in avc_clear_avc_entry()444 node->ae.avd.auditallow = ae->avd.auditallow; in avc_insert()663 audited = requested & avd->auditallow; in avc_audit()879 node->ae.avd.auditallow |= perms; in avc_update_node()882 node->ae.avd.auditallow &= ~perms; in avc_update_node()
55 &avd->auditallow, &avd->auditdeny, in security_compute_av()
111 access_vector_t auditallow; member
140 auditallow { return(AUDITALLOW); }
333 avd->auditallow = 0; in context_struct_compute_av()363 avd->auditallow |= node->datum.data; in context_struct_compute_av()
901 avd->auditallow |= node->datum.data; in cond_compute_av()
1470 auditallow kernel_t security_t:security load_policy;1555 auditallow kernel_t security_t:security { load_policy setenforce setbool };1565 auditallow kernel_t self:process execstack;1569 auditallow kernel_t self:process execheap;1572 auditallow kernel_t self:process execmem;