HomeSort by relevance Sort by last modified time
    Searched refs:auditallow (Results 1 - 19 of 19) sorted by null

  /external/selinux/libselinux/utils/
compute_av.c 42 if (avd.auditallow) {
43 printf("auditallow=");
44 print_access_vector(tclass, avd.auditallow);
  /external/sepolicy/
system_app.te 27 auditallow system_app system_data_file:dir { create setattr add_name remove_name rmdir rename };
28 auditallow system_app system_data_file:file { create setattr append write link unlink rename };
43 auditallow system_app net_radio_prop:property_service set;
44 auditallow system_app system_radio_prop:property_service set;
  /external/selinux/libsepol/include/sepol/policydb/
flask_types.h 59 sepol_access_vector_t auditallow; member in struct:sepol_av_decision
  /external/selinux/libselinux/src/
compute_av.c 55 &avd->auditallow, &avd->auditdeny,
91 avd->auditallow = lavd.auditallow;
145 avd->auditallow = lavd.auditallow;
mapping.c 201 if (avd->auditallow & current_mapping[tclass].perms[i])
203 avd->auditallow = result;
avc.c 706 audited = requested & avd->auditallow;
738 avd->auditallow = 0;
957 node->ae.avd.auditallow |= perms;
960 node->ae.avd.auditallow &= ~perms;
  /external/libselinux/src/
compute_av.c 55 &avd->auditallow, &avd->auditdeny,
mapping.c 201 if (avd->auditallow & current_mapping[tclass].perms[i])
203 avd->auditallow = result;
avc.c 666 audited = requested & avd->auditallow;
698 avd->auditallow = 0;
897 node->ae.avd.auditallow |= perms;
900 node->ae.avd.auditallow &= ~perms;
  /external/libselinux/include/selinux/
selinux.h 112 access_vector_t auditallow; member in struct:av_decision
  /external/selinux/policycoreutils/sepolicy/
search.c 88 bool auditallow; member in struct:options
656 if (!opt->all && !opt->allow && !opt->nallow && !opt->auditallow && !opt->dontaudit) {
672 if (opt->auditallow || opt->all)
884 bool auditallow,
903 cmd_opts.auditallow = auditallow;
1014 int auditallow = Dict_ContainsInt(dict, "auditallow"); variable
1028 return search(allow, neverallow, auditallow, dontaudit, transition, role_allow, src_name, tgt_name, class_name, permlist);
  /external/selinux/checkpolicy/
policy_scan.l 139 AUDITALLOW |
140 auditallow { return(AUDITALLOW); }
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/setoolsgui/apol/
terulequery.py 120 self.auditallow.setChecked(value)
242 if self.auditallow.isChecked():
243 rule_types.append("auditallow")
  /external/selinux/libselinux/include/selinux/
selinux.h 131 access_vector_t auditallow; member in struct:av_decision
  /external/selinux/libsepol/tests/policies/test-cond/
refpolicy-base.conf     [all...]
  /external/selinux/libsepol/src/
services.c 860 avd->auditallow = 0;
890 avd->auditallow |= node->datum.data;
    [all...]
conditional.c 896 * are retained (much unlike the allow and auditallow cases).
901 avd->auditallow |= node->datum.data;
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/selinux/
__init__.py     [all...]
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/setoolsgui/selinux/
__init__.py     [all...]

Completed in 361 milliseconds