Home
last modified time | relevance | path

Searched refs:auditallow (Results 1 – 24 of 24) sorted by relevance

/external/selinux/libselinux/src/
Dcompute_av.c55 &avd->auditallow, &avd->auditdeny, in security_compute_av_flags_raw()
91 avd->auditallow = lavd.auditallow; in hidden_def()
145 avd->auditallow = lavd.auditallow; in hidden_def()
Dmapping.c201 if (avd->auditallow & current_mapping[tclass].perms[i]) in map_decision()
203 avd->auditallow = result; in map_decision()
Davc.c706 audited = requested & avd->auditallow; in avc_audit()
738 avd->auditallow = 0; in hidden_def()
957 node->ae.avd.auditallow |= perms; in avc_update_node()
960 node->ae.avd.auditallow &= ~perms; in avc_update_node()
/external/sepolicy/
Dsystem_app.te27 auditallow system_app system_data_file:dir { create setattr add_name remove_name rmdir rename };
28 auditallow system_app system_data_file:file { create setattr append write link unlink rename };
43 auditallow system_app net_radio_prop:property_service set;
44 auditallow system_app system_radio_prop:property_service set;
Dradio.te24 auditallow radio net_radio_prop:property_service set;
25 auditallow radio system_radio_prop:property_service set;
Drild.te31 auditallow rild net_radio_prop:property_service set;
32 auditallow rild system_radio_prop:property_service set;
Dnetd.te35 auditallow netd system_prop:property_service set;
Dvold.te29 auditallow vold block_device:blk_file create_file_perms;
/external/selinux/libselinux/utils/
Dcompute_av.c42 if (avd.auditallow) { in main()
44 print_access_vector(tclass, avd.auditallow); in main()
/external/selinux/policycoreutils/sepolicy/
Dsearch.c88 bool auditallow; member
656 if (!opt->all && !opt->allow && !opt->nallow && !opt->auditallow && !opt->dontaudit) { in perform_av_query()
672 if (opt->auditallow || opt->all) in perform_av_query()
884 bool auditallow, in search() argument
903 cmd_opts.auditallow = auditallow; in search()
1014 int auditallow = Dict_ContainsInt(dict, "auditallow"); in wrap_search() local
1028 …return search(allow, neverallow, auditallow, dontaudit, transition, role_allow, src_name, tgt_name… in wrap_search()
/external/libselinux/src/
Dmapping.c201 if (avd->auditallow & current_mapping[tclass].perms[i]) in map_decision()
203 avd->auditallow = result; in map_decision()
Dcompute_av.c55 &avd->auditallow, &avd->auditdeny, in security_compute_av()
Davc.c666 audited = requested & avd->auditallow; in avc_audit()
698 avd->auditallow = 0; in hidden_def()
897 node->ae.avd.auditallow |= perms; in avc_update_node()
900 node->ae.avd.auditallow &= ~perms; in avc_update_node()
/external/selinux/libsepol/include/sepol/policydb/
Dflask_types.h59 sepol_access_vector_t auditallow; member
/external/selinux/secilc/test/
Dintegration.cil91 (auditallow device_t exec_t (file (read write)))
128 (auditallow device_t auditadm_t (file (open)))
Dpolicy.cil147 (auditallow device_t exec_t (file (read write)))
184 (auditallow device_t auditadm_t (file (open)))
/external/libselinux/include/selinux/
Dselinux.h112 access_vector_t auditallow; member
/external/selinux/checkpolicy/
Dpolicy_scan.l140 auditallow { return(AUDITALLOW); }
/external/selinux/libselinux/include/selinux/
Dselinux.h131 access_vector_t auditallow; member
/external/sepolicy/tools/sepolicy-analyze/
DREADME18 conditional rules, audit-related rules (auditallow or dontaudit),
/external/selinux/libsepol/tests/policies/test-cond/
Drefpolicy-base.conf1471 auditallow kernel_t security_t:security load_policy;
1556 auditallow kernel_t security_t:security { load_policy setenforce setbool };
1566 auditallow kernel_t self:process execstack;
1570 auditallow kernel_t self:process execheap;
1573 auditallow kernel_t self:process execmem;
/external/selinux/libsepol/src/
Dconditional.c901 avd->auditallow |= node->datum.data; in cond_compute_av()
Dservices.c860 avd->auditallow = 0; in context_struct_compute_av()
890 avd->auditallow |= node->datum.data; in context_struct_compute_av()
/external/selinux/libselinux/
DChangeLog287 specified via auditallow.