/build/tools/releasetools/ |
ota_from_target_files | 244 selabel = None 251 if key == "selabel": 252 selabel = value 261 i.selabel = selabel 270 i.uid, i.gid, i.mode, i.selabel, i.capabilities = 0, 0, 0o644, None, None 273 i.uid, i.gid, i.mode, i.selabel, i.capabilities = 0, 0, 0o544, None, None 285 self.selabel = None 313 """Count up the (uid, gid, mode, selabel, capabilities) tuples for 318 Returns a dict of {(uid, gid, dmode, fmode, selabel, capabilities): count [all...] |
ota_from_target_files.py | 244 selabel = None 251 if key == "selabel": 252 selabel = value 261 i.selabel = selabel 270 i.uid, i.gid, i.mode, i.selabel, i.capabilities = 0, 0, 0o644, None, None 273 i.uid, i.gid, i.mode, i.selabel, i.capabilities = 0, 0, 0o544, None, None 285 self.selabel = None 313 """Count up the (uid, gid, mode, selabel, capabilities) tuples for 318 Returns a dict of {(uid, gid, dmode, fmode, selabel, capabilities): count [all...] |
/bootable/recovery/updater/ |
install.cpp | 704 char* selabel; member in struct:perm_parsed_args 784 if (strcmp("selabel", args[i]) == 0) { 786 parsed.selabel = args[i+1]; 789 uiPrintf(state, "ParsePermArgs: invalid selabel \"%s\"\n", args[i + 1]); 814 if (lsetfilecon(filename, parsed.selabel) != 0) { 816 filename, parsed.selabel, strerror(errno)); [all...] |