/build/tools/releasetools/ |
ota_from_target_files | 192 selabel = None 199 if key == "selabel": 200 selabel = value 209 i.selabel = selabel 217 i.uid, i.gid, i.mode, i.selabel, i.capabilities = 0, 0, 0o644, None, None 220 i.uid, i.gid, i.mode, i.selabel, i.capabilities = 0, 0, 0o544, None, None 232 self.selabel = None 260 """Count up the (uid, gid, mode, selabel, capabilities) tuples for 265 Returns a dict of {(uid, gid, dmode, fmode, selabel, capabilities): count [all...] |
ota_from_target_files.py | 192 selabel = None 199 if key == "selabel": 200 selabel = value 209 i.selabel = selabel 217 i.uid, i.gid, i.mode, i.selabel, i.capabilities = 0, 0, 0o644, None, None 220 i.uid, i.gid, i.mode, i.selabel, i.capabilities = 0, 0, 0o544, None, None 232 self.selabel = None 260 """Count up the (uid, gid, mode, selabel, capabilities) tuples for 265 Returns a dict of {(uid, gid, dmode, fmode, selabel, capabilities): count [all...] |
/bootable/recovery/updater/ |
install.c | 669 char* selabel; member in struct:perm_parsed_args 749 if (strcmp("selabel", args[i]) == 0) { 751 parsed.selabel = args[i+1]; 754 uiPrintf(state, "ParsePermArgs: invalid selabel \"%s\"\n", args[i + 1]); 779 if (lsetfilecon(filename, parsed.selabel) != 0) { 781 filename, parsed.selabel, strerror(errno)); [all...] |