HomeSort by relevance Sort by last modified time
    Searched full:selinux (Results 501 - 525 of 1108) sorted by null

<<21222324252627282930>>

  /external/selinux/libsemanage/man/man3/
semanage_bool_set_active.3 3 semanage_bool_set_active \- update an existing SELinux boolean in the currently active policy
semanage_del.3 4 semanage_del \- SELinux Management API
semanage_exists.3 4 semanage_exists \- SELinux Management API
semanage_modify.3 4 semanage_modify \- SELinux Management API
semanage_query.3 4 semanage_query \- SELinux Management API
  /external/selinux/policycoreutils/gui/
modulesPage.py 1 ## modulesPage.py - show selinux mappings
27 import selinux namespace
74 status, self.policy_type = selinux.selinux_getpolicytype()
110 Popen(["/usr/share/system-config-selinux/polgengui.py"])
  /external/selinux/policycoreutils/hll/pp/
Makefile 8 HLLDIR ?= $(LIBEXECDIR)/selinux/hll
  /external/selinux/policycoreutils/mcstrans/share/util/
mlscolor-test 4 from selinux import *
  /external/selinux/policycoreutils/sandbox/
sandbox.5 3 sandbox.conf \- user config file for the SELinux sandbox
sandbox.8 3 sandbox \- Run cmd under an SELinux sandbox
16 application within a tightly confined SELinux domain. The default sandbox domain only allows applications the ability to read and write stdin, stdout and any other file descriptors handed to it. It is not allowed to open any other files. The \-M option will mount an alternate homedir and tmpdir to be used by the sandbox.
22 allows you to run X applications within a sandbox. These applications will start up their own X Server and create a temporary home directory and /tmp. The default SELinux policy does not allow any capabilities or network access. It also prevents all access to the users other processes and files. Files specified on the command that are in the home directory or /tmp will be copied into the sandbox directories.
97 runcon(1), seunshare(8), selinux(8)
  /external/selinux/policycoreutils/semodule/
semodule.8 3 semodule \- Manage SELinux policy modules.
10 semodule is the tool used to manage SELinux policy modules,
104 # Turn on all AVC Messages for which SELinux currently is "dontaudit"ing.
121 $ semodule \-B \-S "/tmp/var/lib/selinux"
  /external/selinux/policycoreutils/semodule_deps/
semodule_deps.8 3 semodule_deps \- show the dependencies between SELinux policy packages.
  /external/selinux/policycoreutils/sepolicy/sepolicy/help/
file_equiv.txt 0 SELinux can either setup labeling directory using the Application/files screen, or you can setup file equivalence.
lockdown_ptrace.txt 8 SELinux defines this access as ptrace and sys_ptrace. These accesses allow one process to read the memory of another process. ptrace allows developers and administrators to debug how a process is running using tools like strace, ptrace and gdb. You can even use gdb (GNU Debugger to manipulate another process running memory and environment.
  /external/selinux/policycoreutils/sepolicy/sepolicy/templates/
boolean.py 4 # policygentool is a tool for the initial generation of SELinux policy
unit_file.py 4 # policygentool is a tool for the initial generation of SELinux policy
  /external/toybox/toys/android/
restorecon.c 27 #include <selinux/android.h>
  /external/toybox/toys/other/
chcon.c 14 Change the SELinux security context of listed file[s].
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/linux/
xattr.h 36 #define XATTR_SELINUX_SUFFIX "selinux"
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/linux/
xattr.h 36 #define XATTR_SELINUX_SUFFIX "selinux"
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/setools/
polcapquery.py 27 Query SELinux policy capabilities
  /system/extras/ext4_utils/
make_ext4fs_main.c 34 #include <selinux/selinux.h>
35 #include <selinux/label.h>
37 #include <selinux/android.h>
  /system/sepolicy/
debuggerd.te 60 # Check SELinux permissions.
  /system/vold/
Utils.h 22 #include <selinux/selinux.h>
40 /* SELinux contexts used depending on the block device type */
49 /* fs_prepare_dir wrapper that creates with SELinux context */
  /external/selinux/libsemanage/utils/
semanage_migrate_store 16 import selinux namespace
141 curstore = selinux.selinux_getpolicytype()[1]
152 print("SELinux policy is not managed or store cannot be accessed.", file=sys.stderr)
183 return "%s/etc/selinux" % ROOT
221 help="Set path for the policy store (default: /var/lib/selinux)")
234 PATH = "/var/lib/selinux"
270 # already migrated or not an selinux store

Completed in 266 milliseconds

<<21222324252627282930>>