Searched refs:denial (Results 1 – 25 of 30) sorted by relevance
12
/system/sepolicy/private/ |
D | runas_app.te | 23 # Suppress denial logspam when simpleperf is trying to find a matching process 34 # Suppress bionic loader denial /data/local/tests directories.
|
D | vendor_misc_writer.te | 5 # Silence the denial when calling libfstab's ReadDefaultFstab, which tries to
|
D | preloads_copy.te | 16 # Silence the denial when /postinstall cannot be mounted, e.g., system_other
|
D | misctrl.te | 15 # so we can just ignore the SELinux denial.
|
D | mtectrl.te | 19 # so we can just ignore the SELinux denial.
|
D | kcmdlinectrl.te | 20 # so we can just ignore the SELinux denial.
|
D | cppreopts.te | 29 # Silence the denial when /postinstall cannot be mounted, e.g., system_other
|
D | perfetto.te | 72 # under adbd is harmless. Avoid generating denial logs. 78 # Similarly, CTS tests end up hitting a denial on shell pipes.
|
D | simpleperf.te | 42 # Suppress denial logspam when simpleperf is trying to find a matching process
|
D | netd.te | 78 # exist, suppress the denial. 208 # a false report of a create denial. Silence these denials and make sure that
|
D | postinstall_dexopt.te | 58 # Suppress deletion denial (we do not want to update the profile).
|
D | update_engine.te | 51 # denial.
|
D | otapreopt_chroot.te | 28 # Mounting /vendor can have this side-effect. Ignore denial.
|
D | virtualizationmanager.te | 113 # a harmless denial for CompOS log files, so ignore that.
|
D | untrusted_app_all.te | 147 # For P, we assume that apps are safely handling the denial.
|
D | kernel.te | 176 # If you encounter an execute_no_trans denial on the kernel domain, then
|
D | zygote.te | 221 # undesirable, so suppress the denial.
|
D | app_neverallows.te | 227 # Locking of files on /system could lead to denial of service attacks
|
D | init.te | 690 # Send an SELinux userspace denial to the kernel audit subsystem,
|
/system/logging/logd/ |
D | LogAudit.h | 42 std::string denialParse(const std::string& denial, char terminator,
|
D | LogAudit.cpp | 161 std::string LogAudit::denialParse(const std::string& denial, char terminator, in denialParse() argument 163 size_t start_index = denial.find(search_term); in denialParse() 166 return denial.substr( in denialParse() 167 start_index, denial.find(terminator, start_index) - start_index); in denialParse()
|
D | logd.rc | 21 # Limit SELinux denial generation, defaulting to 5/second
|
/system/sepolicy/microdroid/system/private/ |
D | property_contexts | 177 # access denial logs.
|
D | domain.te | 259 # Allow all processes to "read" non_existing_prop to suppress libc's access denial logs. 524 # a false report of a create denial. Silence these denials and make sure that
|
D | init.te | 389 # Send an SELinux userspace denial to the kernel audit subsystem,
|
12