OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:selinux
(Results
451 - 475
of
1108
) sorted by null
<<
11
12
13
14
15
16
17
18
19
20
>>
/external/selinux/policycoreutils/audit2allow/
sepolgen-ifgen
34
import
selinux
67
p =
selinux
.selinux_current_policy_path()
70
i =
selinux
.security_policyvers()
71
p =
selinux
.selinux_binary_policy_path() + "." + str(i)
74
p =
selinux
.selinux_binary_policy_path() + "." + str(i)
92
#
SELinux
Disabled Machine
audit2allow.1
29
\- generate
SELinux
policy allow/dontaudit rules from logs of denied operations
32
\- translates
SELinux
audit messages into a description of why the access was denied (audit2allow \-w)
89
Translates
SELinux
audit messages into a description of why the access was denied
158
#
SELinux
provides a policy devel environment under
159
# /usr/share/
selinux
/devel including all of the shipped
163
$ make \-f /usr/share/
selinux
/devel/Makefile local.pp
202
$ cd /etc/
selinux
/$SELINUXTYPE/src/policy
/external/selinux/policycoreutils/restorecond/
user.c
52
static const char *PATH="/org/
selinux
/Restorecond";
53
//static const char *BUSNAME="org.
selinux
.Restorecond";
54
static const char *INTERFACE="org.
selinux
.RestorecondIface";
55
static const char *RULE="type='signal',interface='org.
selinux
.RestorecondIface'";
101
#include <
selinux
/
selinux
.h>
restorecond.c
68
static const char *server_watch_file = "/etc/
selinux
/restorecond.conf";
69
static const char *user_watch_file = "/etc/
selinux
/restorecond_user.conf";
73
#include <
selinux
/
selinux
.h>
165
/* If we are not running
SELinux
then just exit */
/system/security/keystore/
permissions.cpp
25
#include <
selinux
/android.h>
29
/* perm_labels associcated with keystore_key
SELinux
class verbs. */
98
ALOGE("
SELinux
: Could not acquire target context. Aborting keystore.\n");
102
ALOGI("
SELinux
: Keystore
SELinux
is disabled.\n");
123
ALOGE("
SELinux
: Failed to get source pid context.\n");
/external/selinux/secilc/docs/
cil_user_statements.md
7
Declares an
SELinux
user identifier in the current namespace.
27
<td align="left"><p>The
SELinux
<code>user</code> identifier.</p></td>
34
This will declare an
SELinux
user as `unconfined.user`:
63
<td align="left"><p>A previously declared
SELinux
<code>user</code> or <code>userattribute</code> identifier.</p></td>
199
<td align="left"><p>A previously declared
SELinux
<code>user</code> identifier.</p></td>
245
<td align="left"><p>A previously declared
SELinux
<code>user</code> identifier.</p></td>
290
- While this is added to the binary policy, it is not enforced by the
SELinux
kernel services.
310
<td align="left"><p>A previously declared
SELinux
<code>user</code> identifier.</p></td>
314
<td align="left"><p>A previously declared
SELinux
<code>user</code> identifier.</p></td>
353
<td align="left"><p>A previously declared
SELinux
<code>user</code> identifier.</p></td
[
all
...]
/external/selinux/policycoreutils/sepolicy/sepolicy/
interface.py
6
# policygentool is a tool for the initial generation of
SELinux
policy
94
""" Get all domains with
SELinux
user role interface"""
120
def get_interface_dict(path="/usr/share/
selinux
/devel/policy.xml"):
162
def get_interface_format_text(interface, path="/usr/share/
selinux
/devel/policy.xml"):
194
rc, output = commands.getstatusoutput("python /usr/share/
selinux
/devel/include/support/segenxml.py -w -m %s" % basedir + filename)
203
def interface_compile_test(interface, path="/usr/share/
selinux
/devel/policy.xml"):
218
rc, output = commands.getstatusoutput("make -f /usr/share/
selinux
/devel/Makefile %s" % policy_files['pp'])
/prebuilts/go/darwin-x86/src/
make.bash
78
# Test for bad
SELinux
.
79
# On Fedora 16 the
selinux
filesystem is mounted at /sys/fs/
selinux
,
80
# so loop through the possible
selinux
mount points.
81
for se_mount in /
selinux
/sys/fs/
selinux
85
echo "WARNING: the default
SELinux
policy on, at least, Fedora 12 breaks "
/prebuilts/go/linux-x86/src/
make.bash
78
# Test for bad
SELinux
.
79
# On Fedora 16 the
selinux
filesystem is mounted at /sys/fs/
selinux
,
80
# so loop through the possible
selinux
mount points.
81
for se_mount in /
selinux
/sys/fs/
selinux
85
echo "WARNING: the default
SELinux
policy on, at least, Fedora 12 breaks "
/external/selinux/libselinux/src/
Makefile
32
SWIGPYOUT=
selinux
.py
121
selinuxswig_python_exception.i: ../include/
selinux
/
selinux
.h
157
test -d $(PYLIBDIR)/site-packages/
selinux
|| install -m 755 -d $(PYLIBDIR)/site-packages/
selinux
158
install -m 755 $(SWIGSO) $(PYLIBDIR)/site-packages/
selinux
/_selinux.so
159
install -m 755 $(AUDIT2WHYSO) $(PYLIBDIR)/site-packages/
selinux
/audit2why.so
160
install -m 644 $(SWIGPYOUT) $(PYLIBDIR)/site-packages/
selinux
/__init__.py
164
install -m 755 $(SWIGRUBYSO) $(RUBYINSTALL)/
selinux
.so
label_internal.h
14
#include <
selinux
/
selinux
.h>
15
#include <
selinux
/label.h>
/external/selinux/libselinux/man/man5/
selabel_x.5
4
.TH "selabel_x" "5" "29 Nov 2011" "Security Enhanced Linux" "
SELinux
API documentation"
6
selabel_x \- userspace
SELinux
labeling interface and configuration file format for the X Window System contexts backend. This backend is also used to determine the default context for labeling remotely connected X clients
9
.B #include <
selinux
/label.h>
90
.I /etc/
selinux
/{SELINUXTYPE}/contexts/x_contexts
93
Where \fI{SELINUXTYPE}\fR is the entry from the
selinux
configuration file \fIconfig\fR (see \fBselinux_config\fR(5)).
166
.BR
selinux
"(8), " selabel_open "(3), " selabel_lookup "(3), " selabel_stats "(3), " selabel_close "(3), " selinux_set_callback "(3), " selinux_x_context_path "(3), " freecon "(3), " selinux_config "(5) "
secolor.conf.5
1
.TH "secolor.conf" "5" "08 April 2011" "
SELinux
API documentation"
3
secolor.conf \- The
SELinux
color configuration file
10
when context related information is to be displayed in color by an
SELinux
-aware application.
178
.BR
selinux
"(8), " selinux_raw_context_to_color "(3), " selinux_colors_path "(3)"
/external/selinux/policycoreutils/gui/
usersPage.py
1
## usersPage.py - show
selinux
mappings
46
semanagePage.__init__(self, xml, "users", _("
SELinux
User"))
52
col = gtk.TreeViewColumn(_("
SELinux
\nUser"), gtk.CellRendererText(), text=0)
61
col = gtk.TreeViewColumn(_("
SELinux
Roles"), gtk.CellRendererText(), text=2)
140
raise ValueError(_("
SELinux
user '%s' is required") % user)
/external/selinux/policycoreutils/sepolicy/
sepolicy-generate.8
3
sepolicy-generate \- Generate an initial
SELinux
policy module template.
50
Use \fBsepolicy generate\fP to generate an
SELinux
policy Module.
78
This file is an RPM SPEC file that can be used to install the
SELinux
policy on to machines and setup the labeling. The spec file also installs the interface file and a man page describing the policy. You can use \fBsepolicy manpage \-d NAME\fP to generate the man page.
109
SELinux
user(s) which will transition to this domain
177
sepolicy(8),
selinux
(8)
/external/selinux/secilc/
secilc.8.xml
17
<refmiscinfo class="manual">
SELinux
CIL Compiler</refmiscinfo>
21
<refpurpose>invoke the
SELinux
Common Intermediate Language (CIL) Compiler</refpurpose>
50
<listitem><para>Specify target architecture. May be <emphasis role="bold">
selinux
</emphasis> or <emphasis role="bold">xen</emphasis> (default: <emphasis role="bold">
selinux
</emphasis>)</para></listitem>
60
<listitem><para>Build a binary policy with a given <emphasis role="italic">version</emphasis> (default: depends on the systems
SELinux
policy <emphasis role="italic">version</emphasis>, see <citerefentry><refentrytitle>sestatus</refentrytitle><manvolnum>8</manvolnum></citerefentry>)</para></listitem>
/external/selinux/sepolgen/
HACKING
50
/usr/share/
selinux
/devel/include. This uses the LGPL parsing library
59
Infrastructure for parsing
SELinux
related messages as produced by the
61
is only meant to capture
SELinux
messages - primarily access vector
74
Information about the
SELinux
object classes. This is semantic
79
[selist]: http://www.nsa.gov/research/
selinux
/info/list.cfm
/external/selinux/policycoreutils/po/
pl.po
74
msgid "Sorry, run_init may be used only on a
SELinux
kernel.\n"
100
msgid "
SELinux
policy is not managed or store cannot be accessed."
138
msgid "Could not list
SELinux
modules"
249
msgid "Could not set
SELinux
user for %s"
294
#: ../gui/system-config-
selinux
.glade:100
302
#: ../gui/system-config-
selinux
.glade:128
303
#: ../gui/system-config-
selinux
.glade:915
304
#: ../gui/system-config-
selinux
.glade:2285 ../gui/usersPage.py:44
308
msgid "
SELinux
User"
311
#: ../semanage/seobject.py:707 ../gui/system-config-
selinux
.glade:15
[
all
...]
POTFILES
32
../gui/
selinux
.tbl
35
../gui/system-config-
selinux
.glade
36
../gui/system-config-
selinux
.py
/bootable/recovery/minzip/
Zip.h
21
#include <
selinux
/
selinux
.h>
22
#include <
selinux
/label.h>
/build/tools/fs_config/
fs_config.c
25
#include <
selinux
/
selinux
.h>
26
#include <
selinux
/label.h>
/cts/tests/tests/security/src/android/security/cts/
KernelSettingsTest.java
38
* Ensure that
SELinux
is in enforcing mode.
42
assertEquals("1", getFile("/sys/fs/
selinux
/enforce"));
44
fail("
SELinux
is not compiled into this kernel, or is disabled.");
/docs/source.android.com/src/security/enhancements/
enhancements50.jd
18
<li><strong>Android sandbox reinforced with
SELinux
</strong>. Android now
19
requires
SELinux
in enforcing mode for all domains.
SELinux
is a
/external/selinux/libselinux/utils/
selabel_lookup.c
6
#include <
selinux
/
selinux
.h>
7
#include <
selinux
/label.h>
selabel_lookup_best_match.c
7
#include <
selinux
/
selinux
.h>
8
#include <
selinux
/label.h>
Completed in 716 milliseconds
<<
11
12
13
14
15
16
17
18
19
20
>>