HomeSort by relevance Sort by last modified time
    Searched refs:auditallow (Results 1 - 19 of 19) sorted by null

  /external/selinux/libselinux/utils/
compute_av.c 42 if (avd.auditallow) {
43 printf("auditallow=");
44 print_access_vector(tclass, avd.auditallow);
  /external/selinux/libsepol/include/sepol/policydb/
flask_types.h 59 sepol_access_vector_t auditallow; member in struct:sepol_av_decision
  /external/selinux/libselinux/src/
compute_av.c 55 &avd->auditallow, &avd->auditdeny,
91 avd->auditallow = lavd.auditallow;
145 avd->auditallow = lavd.auditallow;
mapping.c 201 if (avd->auditallow & current_mapping[tclass].perms[i])
203 avd->auditallow = result;
avc.c 706 audited = requested & avd->auditallow;
738 avd->auditallow = 0;
957 node->ae.avd.auditallow |= perms;
960 node->ae.avd.auditallow &= ~perms;
  /system/sepolicy/
system_app.te 35 auditallow system_app net_radio_prop:property_service set;
36 auditallow system_app system_radio_prop:property_service set;
platform_app.te 33 auditallow platform_app cache_recovery_file:dir create_dir_perms;
34 auditallow platform_app cache_recovery_file:file create_file_perms;
  /external/libselinux/src/
compute_av.c 55 &avd->auditallow, &avd->auditdeny,
mapping.c 201 if (avd->auditallow & current_mapping[tclass].perms[i])
203 avd->auditallow = result;
avc.c 666 audited = requested & avd->auditallow;
703 avd->auditallow = 0;
902 node->ae.avd.auditallow |= perms;
905 node->ae.avd.auditallow &= ~perms;
  /external/libselinux/include/selinux/
selinux.h 112 access_vector_t auditallow; member in struct:av_decision
  /external/selinux/policycoreutils/sepolicy/
search.c 88 bool auditallow; member in struct:options
656 if (!opt->all && !opt->allow && !opt->nallow && !opt->auditallow && !opt->dontaudit) {
672 if (opt->auditallow || opt->all)
884 bool auditallow,
903 cmd_opts.auditallow = auditallow;
1014 int auditallow = Dict_ContainsInt(dict, "auditallow"); variable
1028 return search(allow, neverallow, auditallow, dontaudit, transition, role_allow, src_name, tgt_name, class_name, permlist);
  /external/selinux/checkpolicy/
policy_scan.l 139 AUDITALLOW |
140 auditallow { return(AUDITALLOW); }
  /external/selinux/libselinux/include/selinux/
selinux.h 131 access_vector_t auditallow; member in struct:av_decision
  /external/selinux/prebuilts/bin/
sediff.py 56 terule.add_argument("--auditallow", action="store_true", help="Print auditallow rule differences")
91 args.allow, args.neverallow, args.auditallow, args.dontaudit,
515 if all_differences or args.auditallow:
517 args.auditallow:
518 print("Auditallow Rules ({0} Added, {1} Removed, {2} Modified)".format(
523 print(" Added Auditallow Rules: {0}".format(len(diff.added_auditallows)))
528 print(" Removed Auditallow Rules: {0}".format(len(diff.removed_auditallows)))
533 print(" Modified Auditallow Rules: {0}".format(len(diff.modified_auditallows)))
    [all...]
  /external/selinux/libsepol/tests/policies/test-cond/
refpolicy-base.conf     [all...]
  /external/selinux/libsepol/src/
services.c 860 avd->auditallow = 0;
890 avd->auditallow |= node->datum.data;
    [all...]
conditional.c 896 * are retained (much unlike the allow and auditallow cases).
901 avd->auditallow |= node->datum.data;
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/selinux/
__init__.py 763 __swig_setmethods__["auditallow"] = _selinux.av_decision_auditallow_set
764 __swig_getmethods__["auditallow"] = _selinux.av_decision_auditallow_get
765 if _newclass:auditallow = _swig_property(_selinux.av_decision_auditallow_get, _selinux.av_decision_auditallow_set)
    [all...]

Completed in 612 milliseconds