/system/sepolicy/prebuilts/api/28.0/private/ |
mediaprovider.te | 19 dontaudit mediaprovider cache_private_backup_file:dir getattr; 20 dontaudit mediaprovider cache_recovery_file:dir getattr;
|
isolated_app.te | 48 dontaudit isolated_app shell_data_file:dir search;
|
/system/sepolicy/private/ |
mediaprovider.te | 19 dontaudit mediaprovider cache_private_backup_file:dir getattr; 20 dontaudit mediaprovider cache_recovery_file:dir getattr;
|
isolated_app.te | 48 dontaudit isolated_app shell_data_file:dir search;
|
/system/sepolicy/prebuilts/api/27.0/public/ |
te_macros | 18 dontaudit $1 $3:process noatsecure; 19 # XXX dontaudit candidate but requires further study. 105 dontaudit su pdx_$1_endpoint_socket:unix_stream_socket *; 106 dontaudit su pdx_$1_channel_socket:unix_stream_socket *;
|
/system/sepolicy/prebuilts/api/28.0/public/ |
te_macros | 18 dontaudit $1 $3:process noatsecure; 19 # XXX dontaudit candidate but requires further study. 105 dontaudit su pdx_$1_endpoint_socket:unix_stream_socket *; 106 dontaudit su pdx_$1_channel_socket:unix_stream_socket *;
|
/system/sepolicy/public/ |
te_macros | 18 dontaudit $1 $3:process noatsecure; 19 # XXX dontaudit candidate but requires further study. 105 dontaudit su pdx_$1_endpoint_socket:unix_stream_socket *; 106 dontaudit su pdx_$1_channel_socket:unix_stream_socket *;
|
/external/selinux/python/sepolgen/src/sepolgen/ |
policygen.py | 84 self.dontaudit = False 120 def set_gen_dontaudit(self, dontaudit): 121 self.dontaudit = dontaudit 159 if self.dontaudit: 160 rule.rule_type = rule.DONTAUDIT 166 if av.type == audit2why.DONTAUDIT: 167 rule.comment += "\n#!!!! This avc has a dontaudit rule in the current policy"
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/sepolgen/ |
policygen.py | 84 self.dontaudit = False 120 def set_gen_dontaudit(self, dontaudit): 121 self.dontaudit = dontaudit 159 if self.dontaudit: 160 rule.rule_type = rule.DONTAUDIT 166 if av.type == audit2why.DONTAUDIT: 167 rule.comment += "\n#!!!! This avc has a dontaudit rule in the current policy"
|
/system/sepolicy/prebuilts/api/27.0/private/ |
isolated_app.te | 51 dontaudit isolated_app shell_data_file:dir search;
|
/system/sepolicy/ |
treble_sepolicy_tests_for_release.mk | 30 $(hide) sed '/dontaudit/d' $@ > $@.dontaudit
|
Android.mk | 287 $(hide) sed '/dontaudit/d' $@ > $@.dontaudit 399 $(hide) sed '/dontaudit/d' $@ > $@.dontaudit 551 $(hide) sed '/dontaudit/d' $@ > $@.dontaudit 598 $(hide) sed '/dontaudit/d' $@ > $@.dontaudit 744 $(hide) sed '/dontaudit/d' $@ > $@.dontaudit [all...] |
/external/selinux/checkpolicy/ |
policy_scan.l | 146 DONTAUDIT | 147 dontaudit { return(DONTAUDIT); }
|
/system/sepolicy/prebuilts/api/26.0/public/ |
te_macros | 18 dontaudit $1 $3:process noatsecure; 19 # XXX dontaudit candidate but requires further study.
|
/external/selinux/python/audit2allow/ |
audit2allow | 73 parser.add_option("-D", "--dontaudit", action="store_true", 74 dest="dontaudit", default=False, 75 help="generate policy with dontaudit rules") 254 if rc == audit2why.DONTAUDIT: 255 print("\t\tUnknown - should be dontaudit'd by active policy") 307 g.set_gen_dontaudit(self.__options.dontaudit)
|
audit2why | 73 parser.add_option("-D", "--dontaudit", action="store_true", 74 dest="dontaudit", default=False, 75 help="generate policy with dontaudit rules") 254 if rc == audit2why.DONTAUDIT: 255 print("\t\tUnknown - should be dontaudit'd by active policy") 307 g.set_gen_dontaudit(self.__options.dontaudit)
|
/external/selinux/libsepol/tests/policies/test-cond/ |
refpolicy-base.conf | [all...] |
/external/selinux/prebuilts/bin/ |
sediff.py | 58 terule.add_argument("--dontaudit", action="store_true", help="Print dontaudit rule differences") 112 args.allow, args.neverallow, args.auditallow, args.dontaudit, [all...] |
/external/selinux/python/semanage/ |
seobject.py | 449 def toggle(self, dontaudit): 450 if dontaudit not in ["on", "off"]: 451 raise ValueError(_("dontaudit requires either 'on' or 'off'")) 453 semanage_set_disable_dontaudit(self.sh, dontaudit == "off") [all...] |