/external/selinux/libselinux/src/ |
D | compute_av.c | 57 &avd->auditallow, &avd->auditdeny, in security_compute_av_flags_raw() 98 avd->auditallow = lavd.auditallow; in security_compute_av_raw() 150 avd->auditallow = lavd.auditallow; in security_compute_av()
|
D | mapping.c | 234 if (avd->auditallow & mapping->perms[i]) in map_decision() 236 avd->auditallow = result; in map_decision()
|
D | avc.c | 704 audited = requested & avd->auditallow; in avc_audit() 739 avd->auditallow = 0; in avd_init() 957 node->ae.avd.auditallow |= perms; in avc_update_node() 960 node->ae.avd.auditallow &= ~perms; in avc_update_node()
|
/external/selinux/libselinux/utils/ |
D | compute_av.c | 42 if (avd.auditallow) { in main() 44 print_access_vector(tclass, avd.auditallow); in main()
|
/external/selinux/libsepol/include/sepol/policydb/ |
D | flask_types.h | 56 sepol_access_vector_t auditallow; member
|
/external/selinux/secilc/docs/ |
D | cil_access_vector_rules.md | 92 auditallow section in Access Vector Rules 100 (auditallow source_id target_id|self classpermissionset_id ...) 112 <td align="left"><p><code>auditallow</code></p></td> 113 <td align="left"><p>The <code>auditallow</code> keyword.</p></td> 138 (auditallow release_app.process secmark_demo.browser_packet (packet (send recv))) 311 …is to work there must *also* be valid equivalent [`auditallow`](cil_access_vector_rules.md#audital… 354 (auditallow type_1 type_2 (tcp_socket (ioctl))) ;; pre-requisite
|
D | README.md | 25 * [auditallow](cil_access_vector_rules.md#auditallow)
|
D | cil_conditional_statements.md | 49 ….e. [`allow`](cil_access_vector_rules.md#allow), [`auditallow`](cil_access_vector_rules.md#audital…
|
/external/selinux/secilc/test/ |
D | integration.cil | 91 (auditallow device_t exec_t (file (read write))) 128 (auditallow device_t auditadm_t (file (open)))
|
D | policy.cil | 160 (auditallow device_t exec_t (file (read write))) 197 (auditallow device_t auditadm_t (file (open)))
|
/external/selinux/checkpolicy/ |
D | policy_scan.l | 157 auditallow { return(AUDITALLOW); }
|
/external/selinux/libselinux/include/selinux/ |
D | selinux.h | 135 access_vector_t auditallow; member
|
/external/selinux/libsepol/tests/policies/test-cond/ |
D | refpolicy-base.conf | 1471 auditallow kernel_t security_t:security load_policy; 1556 auditallow kernel_t security_t:security { load_policy setenforce setbool }; 1566 auditallow kernel_t self:process execstack; 1570 auditallow kernel_t self:process execheap; 1573 auditallow kernel_t self:process execmem;
|
/external/selinux/libsepol/src/ |
D | conditional.c | 884 avd->auditallow |= node->datum.data; in cond_compute_av()
|
D | services.c | 933 avd->auditallow = 0; in context_struct_compute_av() 960 avd->auditallow |= node->datum.data; in context_struct_compute_av()
|
/external/bcc/libbpf-tools/powerpc/ |
D | vmlinux_510.h | 80619 u32 auditallow; member 80633 struct extended_perms_data *auditallow; member
|
D | vmlinux.h | 80619 u32 auditallow; member 80633 struct extended_perms_data *auditallow; member
|
/external/libbpf/.github/actions/build-selftests/ |
D | vmlinux.h | 51719 u32 auditallow; member 51733 struct extended_perms_data *auditallow; member
|
/external/bcc/libbpf-tools/arm64/ |
D | vmlinux.h | 47070 u32 auditallow; member 47084 struct extended_perms_data *auditallow; member
|
D | vmlinux_510.h | 47070 u32 auditallow; member 47084 struct extended_perms_data *auditallow; member
|
/external/bcc/libbpf-tools/x86/ |
D | vmlinux.h | 55308 u32 auditallow; member 55322 struct extended_perms_data *auditallow; member
|
D | vmlinux_505.h | 55308 u32 auditallow; member 55322 struct extended_perms_data *auditallow; member
|