Searched refs:auditallow (Results 1 – 6 of 6) sorted by relevance
/security/selinux/ |
D | avc.c | 259 rc = security_xperm_test(xpd->auditallow->p, perm); in avc_xperms_has_perm() 283 if (xpd->auditallow) in avc_xperms_decision_free() 284 kmem_cache_free(avc_xperms_data_cachep, xpd->auditallow); in avc_xperms_decision_free() 313 memcpy(dest->auditallow->p, src->auditallow->p, in avc_copy_xperms_decision() 314 sizeof(src->auditallow->p)); in avc_copy_xperms_decision() 338 dest->auditallow->p[i] = src->auditallow->p[i]; in avc_quick_copy_xperms_decision() 361 xpd->auditallow = kmem_cache_zalloc(avc_xperms_data_cachep, in avc_xperms_decision_alloc() 363 if (!xpd->auditallow) in avc_xperms_decision_alloc() 454 audited = requested & avd->auditallow; in avc_xperms_audit_required() 882 node->ae.avd.auditallow |= perms; in avc_update_node() [all …]
|
D | selinuxfs.c | 796 avd.auditallow, avd.auditdeny, in sel_write_access()
|
/security/selinux/include/ |
D | security.h | 113 u32 auditallow; member 133 struct extended_perms_data *auditallow; member
|
D | avc.h | 100 audited = requested & avd->auditallow; in avc_audit_required()
|
/security/selinux/ss/ |
D | services.c | 249 if (avd->auditallow & current_mapping[tclass].perms[i]) in map_decision() 251 avd->auditallow = result; in map_decision() 652 avd->auditallow = 0; in context_struct_compute_av() 687 avd->auditallow |= node->datum.u.data; in context_struct_compute_av() 944 avd->auditallow = 0; in avd_init() 980 memset(xpermd->auditallow->p, 0xff, in services_compute_xperms_decision() 981 sizeof(xpermd->auditallow->p)); in services_compute_xperms_decision() 984 for (i = 0; i < ARRAY_SIZE(xpermd->auditallow->p); i++) in services_compute_xperms_decision() 985 xpermd->auditallow->p[i] |= in services_compute_xperms_decision() 1021 memset(xpermd->auditallow->p, 0, sizeof(xpermd->auditallow->p)); in security_compute_xperms_decision()
|
D | conditional.c | 662 avd->auditallow |= node->datum.u.data; in cond_compute_av()
|