Home
last modified time | relevance | path

Searched refs:denial (Results 1 – 25 of 30) sorted by relevance

12

/system/sepolicy/private/
Drunas_app.te23 # Suppress denial logspam when simpleperf is trying to find a matching process
34 # Suppress bionic loader denial /data/local/tests directories.
Dvendor_misc_writer.te5 # Silence the denial when calling libfstab's ReadDefaultFstab, which tries to
Dpreloads_copy.te16 # Silence the denial when /postinstall cannot be mounted, e.g., system_other
Dmisctrl.te15 # so we can just ignore the SELinux denial.
Dmtectrl.te19 # so we can just ignore the SELinux denial.
Dkcmdlinectrl.te20 # so we can just ignore the SELinux denial.
Dcppreopts.te29 # Silence the denial when /postinstall cannot be mounted, e.g., system_other
Dperfetto.te72 # under adbd is harmless. Avoid generating denial logs.
78 # Similarly, CTS tests end up hitting a denial on shell pipes.
Dsimpleperf.te42 # Suppress denial logspam when simpleperf is trying to find a matching process
Dnetd.te78 # exist, suppress the denial.
208 # a false report of a create denial. Silence these denials and make sure that
Dpostinstall_dexopt.te58 # Suppress deletion denial (we do not want to update the profile).
Dupdate_engine.te51 # denial.
Dotapreopt_chroot.te28 # Mounting /vendor can have this side-effect. Ignore denial.
Dvirtualizationmanager.te113 # a harmless denial for CompOS log files, so ignore that.
Duntrusted_app_all.te147 # For P, we assume that apps are safely handling the denial.
Dkernel.te176 # If you encounter an execute_no_trans denial on the kernel domain, then
Dzygote.te221 # undesirable, so suppress the denial.
Dapp_neverallows.te227 # Locking of files on /system could lead to denial of service attacks
Dinit.te690 # Send an SELinux userspace denial to the kernel audit subsystem,
/system/logging/logd/
DLogAudit.h42 std::string denialParse(const std::string& denial, char terminator,
DLogAudit.cpp161 std::string LogAudit::denialParse(const std::string& denial, char terminator, in denialParse() argument
163 size_t start_index = denial.find(search_term); in denialParse()
166 return denial.substr( in denialParse()
167 start_index, denial.find(terminator, start_index) - start_index); in denialParse()
Dlogd.rc21 # Limit SELinux denial generation, defaulting to 5/second
/system/sepolicy/microdroid/system/private/
Dproperty_contexts177 # access denial logs.
Ddomain.te259 # Allow all processes to "read" non_existing_prop to suppress libc's access denial logs.
524 # a false report of a create denial. Silence these denials and make sure that
Dinit.te389 # Send an SELinux userspace denial to the kernel audit subsystem,

12