HomeSort by relevance Sort by last modified time
    Searched refs:auditallow (Results 1 - 9 of 9) sorted by null

  /external/libsepol/include/sepol/policydb/
flask_types.h 57 sepol_access_vector_t auditallow; member in struct:sepol_av_decision
  /external/libselinux/src/
compute_av.c 55 &avd->auditallow, &avd->auditdeny,
mapping.c 186 if (avd->auditallow & current_mapping[tclass].perms[i])
188 avd->auditallow = result;
avc.c 293 ae->avd.auditallow = ae->avd.auditdeny = 0;
444 node->ae.avd.auditallow = ae->avd.auditallow;
663 audited = requested & avd->auditallow;
879 node->ae.avd.auditallow |= perms;
882 node->ae.avd.auditallow &= ~perms;
  /external/libselinux/include/selinux/
selinux.h 111 access_vector_t auditallow; member in struct:av_decision
  /external/checkpolicy/
policy_scan.l 139 AUDITALLOW |
140 auditallow { return(AUDITALLOW); }
  /external/libsepol/src/
services.c 334 avd->auditallow = 0;
364 avd->auditallow |= node->datum.data;
    [all...]
conditional.c 896 * are retained (much unlike the allow and auditallow cases).
901 avd->auditallow |= node->datum.data;
  /external/libsepol/tests/policies/test-cond/
refpolicy-base.conf     [all...]

Completed in 68 milliseconds