HomeSort by relevance Sort by last modified time
    Searched full:selinux (Results 451 - 475 of 1108) sorted by null

<<11121314151617181920>>

  /external/selinux/policycoreutils/audit2allow/
sepolgen-ifgen 34 import selinux
67 p = selinux.selinux_current_policy_path()
70 i = selinux.security_policyvers()
71 p = selinux.selinux_binary_policy_path() + "." + str(i)
74 p = selinux.selinux_binary_policy_path() + "." + str(i)
92 # SELinux Disabled Machine
audit2allow.1 29 \- generate SELinux policy allow/dontaudit rules from logs of denied operations
32 \- translates SELinux audit messages into a description of why the access was denied (audit2allow \-w)
89 Translates SELinux audit messages into a description of why the access was denied
158 # SELinux provides a policy devel environment under
159 # /usr/share/selinux/devel including all of the shipped
163 $ make \-f /usr/share/selinux/devel/Makefile local.pp
202 $ cd /etc/selinux/$SELINUXTYPE/src/policy
  /external/selinux/policycoreutils/restorecond/
user.c 52 static const char *PATH="/org/selinux/Restorecond";
53 //static const char *BUSNAME="org.selinux.Restorecond";
54 static const char *INTERFACE="org.selinux.RestorecondIface";
55 static const char *RULE="type='signal',interface='org.selinux.RestorecondIface'";
101 #include <selinux/selinux.h>
restorecond.c 68 static const char *server_watch_file = "/etc/selinux/restorecond.conf";
69 static const char *user_watch_file = "/etc/selinux/restorecond_user.conf";
73 #include <selinux/selinux.h>
165 /* If we are not running SELinux then just exit */
  /system/security/keystore/
permissions.cpp 25 #include <selinux/android.h>
29 /* perm_labels associcated with keystore_key SELinux class verbs. */
98 ALOGE("SELinux: Could not acquire target context. Aborting keystore.\n");
102 ALOGI("SELinux: Keystore SELinux is disabled.\n");
123 ALOGE("SELinux: Failed to get source pid context.\n");
  /external/selinux/secilc/docs/
cil_user_statements.md 7 Declares an SELinux user identifier in the current namespace.
27 <td align="left"><p>The SELinux <code>user</code> identifier.</p></td>
34 This will declare an SELinux user as `unconfined.user`:
63 <td align="left"><p>A previously declared SELinux <code>user</code> or <code>userattribute</code> identifier.</p></td>
199 <td align="left"><p>A previously declared SELinux <code>user</code> identifier.</p></td>
245 <td align="left"><p>A previously declared SELinux <code>user</code> identifier.</p></td>
290 - While this is added to the binary policy, it is not enforced by the SELinux kernel services.
310 <td align="left"><p>A previously declared SELinux <code>user</code> identifier.</p></td>
314 <td align="left"><p>A previously declared SELinux <code>user</code> identifier.</p></td>
353 <td align="left"><p>A previously declared SELinux <code>user</code> identifier.</p></td
    [all...]
  /external/selinux/policycoreutils/sepolicy/sepolicy/
interface.py 6 # policygentool is a tool for the initial generation of SELinux policy
94 """ Get all domains with SELinux user role interface"""
120 def get_interface_dict(path="/usr/share/selinux/devel/policy.xml"):
162 def get_interface_format_text(interface, path="/usr/share/selinux/devel/policy.xml"):
194 rc, output = commands.getstatusoutput("python /usr/share/selinux/devel/include/support/segenxml.py -w -m %s" % basedir + filename)
203 def interface_compile_test(interface, path="/usr/share/selinux/devel/policy.xml"):
218 rc, output = commands.getstatusoutput("make -f /usr/share/selinux/devel/Makefile %s" % policy_files['pp'])
  /prebuilts/go/darwin-x86/src/
make.bash 78 # Test for bad SELinux.
79 # On Fedora 16 the selinux filesystem is mounted at /sys/fs/selinux,
80 # so loop through the possible selinux mount points.
81 for se_mount in /selinux /sys/fs/selinux
85 echo "WARNING: the default SELinux policy on, at least, Fedora 12 breaks "
  /prebuilts/go/linux-x86/src/
make.bash 78 # Test for bad SELinux.
79 # On Fedora 16 the selinux filesystem is mounted at /sys/fs/selinux,
80 # so loop through the possible selinux mount points.
81 for se_mount in /selinux /sys/fs/selinux
85 echo "WARNING: the default SELinux policy on, at least, Fedora 12 breaks "
  /external/selinux/libselinux/src/
Makefile 32 SWIGPYOUT= selinux.py
121 selinuxswig_python_exception.i: ../include/selinux/selinux.h
157 test -d $(PYLIBDIR)/site-packages/selinux || install -m 755 -d $(PYLIBDIR)/site-packages/selinux
158 install -m 755 $(SWIGSO) $(PYLIBDIR)/site-packages/selinux/_selinux.so
159 install -m 755 $(AUDIT2WHYSO) $(PYLIBDIR)/site-packages/selinux/audit2why.so
160 install -m 644 $(SWIGPYOUT) $(PYLIBDIR)/site-packages/selinux/__init__.py
164 install -m 755 $(SWIGRUBYSO) $(RUBYINSTALL)/selinux.so
label_internal.h 14 #include <selinux/selinux.h>
15 #include <selinux/label.h>
  /external/selinux/libselinux/man/man5/
selabel_x.5 4 .TH "selabel_x" "5" "29 Nov 2011" "Security Enhanced Linux" "SELinux API documentation"
6 selabel_x \- userspace SELinux labeling interface and configuration file format for the X Window System contexts backend. This backend is also used to determine the default context for labeling remotely connected X clients
9 .B #include <selinux/label.h>
90 .I /etc/selinux/{SELINUXTYPE}/contexts/x_contexts
93 Where \fI{SELINUXTYPE}\fR is the entry from the selinux configuration file \fIconfig\fR (see \fBselinux_config\fR(5)).
166 .BR selinux "(8), " selabel_open "(3), " selabel_lookup "(3), " selabel_stats "(3), " selabel_close "(3), " selinux_set_callback "(3), " selinux_x_context_path "(3), " freecon "(3), " selinux_config "(5) "
secolor.conf.5 1 .TH "secolor.conf" "5" "08 April 2011" "SELinux API documentation"
3 secolor.conf \- The SELinux color configuration file
10 when context related information is to be displayed in color by an SELinux-aware application.
178 .BR selinux "(8), " selinux_raw_context_to_color "(3), " selinux_colors_path "(3)"
  /external/selinux/policycoreutils/gui/
usersPage.py 1 ## usersPage.py - show selinux mappings
46 semanagePage.__init__(self, xml, "users", _("SELinux User"))
52 col = gtk.TreeViewColumn(_("SELinux\nUser"), gtk.CellRendererText(), text=0)
61 col = gtk.TreeViewColumn(_("SELinux Roles"), gtk.CellRendererText(), text=2)
140 raise ValueError(_("SELinux user '%s' is required") % user)
  /external/selinux/policycoreutils/sepolicy/
sepolicy-generate.8 3 sepolicy-generate \- Generate an initial SELinux policy module template.
50 Use \fBsepolicy generate\fP to generate an SELinux policy Module.
78 This file is an RPM SPEC file that can be used to install the SELinux policy on to machines and setup the labeling. The spec file also installs the interface file and a man page describing the policy. You can use \fBsepolicy manpage \-d NAME\fP to generate the man page.
109 SELinux user(s) which will transition to this domain
177 sepolicy(8), selinux(8)
  /external/selinux/secilc/
secilc.8.xml 17 <refmiscinfo class="manual">SELinux CIL Compiler</refmiscinfo>
21 <refpurpose>invoke the SELinux Common Intermediate Language (CIL) Compiler</refpurpose>
50 <listitem><para>Specify target architecture. May be <emphasis role="bold">selinux</emphasis> or <emphasis role="bold">xen</emphasis> (default: <emphasis role="bold">selinux</emphasis>)</para></listitem>
60 <listitem><para>Build a binary policy with a given <emphasis role="italic">version</emphasis> (default: depends on the systems SELinux policy <emphasis role="italic">version</emphasis>, see <citerefentry><refentrytitle>sestatus</refentrytitle><manvolnum>8</manvolnum></citerefentry>)</para></listitem>
  /external/selinux/sepolgen/
HACKING 50 /usr/share/selinux/devel/include. This uses the LGPL parsing library
59 Infrastructure for parsing SELinux related messages as produced by the
61 is only meant to capture SELinux messages - primarily access vector
74 Information about the SELinux object classes. This is semantic
79 [selist]: http://www.nsa.gov/research/selinux/info/list.cfm
  /external/selinux/policycoreutils/po/
pl.po 74 msgid "Sorry, run_init may be used only on a SELinux kernel.\n"
100 msgid "SELinux policy is not managed or store cannot be accessed."
138 msgid "Could not list SELinux modules"
249 msgid "Could not set SELinux user for %s"
294 #: ../gui/system-config-selinux.glade:100
302 #: ../gui/system-config-selinux.glade:128
303 #: ../gui/system-config-selinux.glade:915
304 #: ../gui/system-config-selinux.glade:2285 ../gui/usersPage.py:44
308 msgid "SELinux User"
311 #: ../semanage/seobject.py:707 ../gui/system-config-selinux.glade:15
    [all...]
POTFILES 32 ../gui/selinux.tbl
35 ../gui/system-config-selinux.glade
36 ../gui/system-config-selinux.py
  /bootable/recovery/minzip/
Zip.h 21 #include <selinux/selinux.h>
22 #include <selinux/label.h>
  /build/tools/fs_config/
fs_config.c 25 #include <selinux/selinux.h>
26 #include <selinux/label.h>
  /cts/tests/tests/security/src/android/security/cts/
KernelSettingsTest.java 38 * Ensure that SELinux is in enforcing mode.
42 assertEquals("1", getFile("/sys/fs/selinux/enforce"));
44 fail("SELinux is not compiled into this kernel, or is disabled.");
  /docs/source.android.com/src/security/enhancements/
enhancements50.jd 18 <li><strong>Android sandbox reinforced with SELinux</strong>. Android now
19 requires SELinux in enforcing mode for all domains. SELinux is a
  /external/selinux/libselinux/utils/
selabel_lookup.c 6 #include <selinux/selinux.h>
7 #include <selinux/label.h>
selabel_lookup_best_match.c 7 #include <selinux/selinux.h>
8 #include <selinux/label.h>

Completed in 716 milliseconds

<<11121314151617181920>>