/external/selinux/libselinux/utils/ |
compute_av.c | 42 if (avd.auditallow) { 43 printf("auditallow="); 44 print_access_vector(tclass, avd.auditallow);
|
/external/sepolicy/ |
system_app.te | 27 auditallow system_app system_data_file:dir { create setattr add_name remove_name rmdir rename }; 28 auditallow system_app system_data_file:file { create setattr append write link unlink rename }; 43 auditallow system_app net_radio_prop:property_service set; 44 auditallow system_app system_radio_prop:property_service set;
|
/external/selinux/libsepol/include/sepol/policydb/ |
flask_types.h | 59 sepol_access_vector_t auditallow; member in struct:sepol_av_decision
|
/external/selinux/libselinux/src/ |
compute_av.c | 55 &avd->auditallow, &avd->auditdeny, 91 avd->auditallow = lavd.auditallow; 145 avd->auditallow = lavd.auditallow;
|
mapping.c | 201 if (avd->auditallow & current_mapping[tclass].perms[i]) 203 avd->auditallow = result;
|
avc.c | 706 audited = requested & avd->auditallow; 738 avd->auditallow = 0; 957 node->ae.avd.auditallow |= perms; 960 node->ae.avd.auditallow &= ~perms;
|
/external/libselinux/src/ |
compute_av.c | 55 &avd->auditallow, &avd->auditdeny,
|
mapping.c | 201 if (avd->auditallow & current_mapping[tclass].perms[i]) 203 avd->auditallow = result;
|
avc.c | 666 audited = requested & avd->auditallow; 698 avd->auditallow = 0; 897 node->ae.avd.auditallow |= perms; 900 node->ae.avd.auditallow &= ~perms;
|
/external/libselinux/include/selinux/ |
selinux.h | 112 access_vector_t auditallow; member in struct:av_decision
|
/external/selinux/policycoreutils/sepolicy/ |
search.c | 88 bool auditallow; member in struct:options 656 if (!opt->all && !opt->allow && !opt->nallow && !opt->auditallow && !opt->dontaudit) { 672 if (opt->auditallow || opt->all) 884 bool auditallow, 903 cmd_opts.auditallow = auditallow; 1014 int auditallow = Dict_ContainsInt(dict, "auditallow"); variable 1028 return search(allow, neverallow, auditallow, dontaudit, transition, role_allow, src_name, tgt_name, class_name, permlist);
|
/external/selinux/checkpolicy/ |
policy_scan.l | 139 AUDITALLOW | 140 auditallow { return(AUDITALLOW); }
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/setoolsgui/apol/ |
terulequery.py | 120 self.auditallow.setChecked(value) 242 if self.auditallow.isChecked(): 243 rule_types.append("auditallow")
|
/external/selinux/libselinux/include/selinux/ |
selinux.h | 131 access_vector_t auditallow; member in struct:av_decision
|
/external/selinux/libsepol/tests/policies/test-cond/ |
refpolicy-base.conf | [all...] |
/external/selinux/libsepol/src/ |
services.c | 860 avd->auditallow = 0; 890 avd->auditallow |= node->datum.data; [all...] |
conditional.c | 896 * are retained (much unlike the allow and auditallow cases). 901 avd->auditallow |= node->datum.data;
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/selinux/ |
__init__.py | [all...] |
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/setoolsgui/selinux/ |
__init__.py | [all...] |