/frameworks/native/cmds/servicemanager/ |
service_manager.c | 15 #include <selinux/android.h> 16 #include <selinux/avc.h> 75 ALOGE("SELinux: getpidcon(pid=%d) failed to retrieve pid context.\n", spid); 109 ALOGE("SELinux: Failed to find sehandle. Aborting service_manager.\n"); 114 ALOGE("SELinux: No match for %s in service_contexts.\n", name); 393 ALOGE("SELinux: Failed to acquire sehandle. Aborting.\n"); 398 ALOGE("SELinux: Failed to acquire service_manager context. Aborting.\n");
|
/external/selinux/libselinux/man/man5/ |
selabel_db.5 | 4 .TH "selabel_db" "5" "01 DEC 2011" "Security Enhanced Linux" "SELinux API documentation" 6 selabel_db \- userspace SELinux labeling interface and configuration file format for the RDBMS objects context backend 9 .B #include <selinux/label.h> 124 .I /etc/selinux/{SELINUXTYPE}/contexts/sepgsql_context 127 Where \fI{SELINUXTYPE}\fR is the entry from the selinux configuration file \fIconfig\fR (see \fBselinux_config\fR(5)). 219 .BR selinux "(8), " selabel_open "(3), " selabel_lookup "(3), " selabel_stats "(3), " selabel_close "(3), " selinux_set_callback "(3), " selinux_sepgsql_context_path "(3), " freecon "(3), " selinux_config "(5) "
|
/external/selinux/policycoreutils/sandbox/ |
sandbox | 32 import selinux 144 level = selinux.getcon_raw()[1].split(":")[4] 322 help=_("run sandbox with SELinux type")) 378 raise ValueError(_("Sandbox Policy is not currently installed.\nYou need to install the selinux-policy-sandbox package in order to run this command")) 388 self.setype = selinux.getcon()[1].split(":")[2] 422 con = selinux.getcon()[1].split(":") 428 selinux.chcon(self.__options.homedir, self.__filecon, recursive=True) 431 selinux.setfscreatecon(self.__filecon) 435 selinux.chcon(self.__options.tmpdir, self.__filecon, recursive=True) 438 selinux.setfscreatecon(self.__filecon [all...] |
/external/selinux/policycoreutils/scripts/ |
chcat | 31 import selinux namespace 115 (rc, c) = selinux.getfilecon(f) 194 (rc, c) = selinux.getfilecon(f) 325 (rc, raw) = selinux.selinux_trans_to_raw_context("a:b:c:%s" % c) 362 fd = open(selinux.selinux_translations_path()) 382 cats = seobject.translate(selinux.getseuserbyname(u)[2]) 395 if selinux.is_selinux_mls_enabled() != 1: 398 if selinux.is_selinux_enabled() != 1: 399 error("Requires an SELinux enabled system")
|
fixfiles.8 | 3 fixfiles \- fix file SELinux security contexts. 32 The file /etc/selinux/fixfiles_exclude_dirs can contain a list of directories
|
/external/selinux/policycoreutils/sestatus/ |
sestatus.c | 12 #include <selinux/selinux.h> 13 #include <selinux/get_default_type.h> 216 printf("\nWithout options, show SELinux status.\n"); 220 printf_tab("SELinux status:"); 246 printf_tab("SELinux root directory:");
|
/system/sepolicy/ |
te_macros | 220 # Allow domain to check SELinux permissions via selinuxfs. 229 # Allow domain to check SELinux contexts via selinuxfs. 237 # Allow domain to set SELinux to enforcing. 245 # Allow domain to set SELinux booleans. 293 # SELinux rules which apply only to recovery mode 299 # SELinux rules which apply only to userdebug or eng builds
|
recovery.te | 34 # We may be asked to set an SELinux label for a type not known to the 39 # 0eb17d944704b3eb140bb9dded299d3be3aed77e in build/ added SELinux
|
/external/selinux/libselinux/ |
ChangeLog | 15 * Add explicit dependency for pywrap on selinux.py, from Wenzong Fan. 40 * is_selinux_enabled: Add /etc/selinux/config test, from Stephen Smalley. 52 * Fix audit2why error handling if SELinux is disabled, from Stephen Smalley. 55 * Only check SELinux enabled status once in selinux_check_access, from Stephen Smalley. 61 * Set the system to permissive if failing to disable SELinux because 63 * Fix type in selinux.8 manpage, from Nicolas Iooss 84 * Fix avc_has_perm() returns -1 even when SELinux is in permissive mode. 103 * Export SELINUX_TRANS_DIR definition in selinux.h from Dan Walsh. 114 * man: make selinux.8 mention service man pages 150 * stop messages when SELinux disable [all...] |
/external/selinux/policycoreutils/semanage/ |
seobject.py | 5 # semanage is a tool for managing SELinux configuration files 27 import selinux namespace 177 (rc, trans) = selinux.selinux_raw_to_trans_context(context) 195 (rc, raw) = selinux.selinux_trans_to_raw_context(context) 216 rc, localstore = selinux.selinux_getpolicytype() 241 raise ValueError(_("SELinux policy is not managed or store cannot be accessed.")) 307 raise ValueError(_("Could not list SELinux modules")) 432 raise ValueError(_("Could not list SELinux modules")) 503 rec, self.oldsename, self.oldserange = selinux.getseuserbyname(name) 552 raise ValueError(_("Could not set SELinux user for %s") % name [all...] |
/external/autotest/client/virt/tests/ |
multicast.py | 37 cmd_selinux = ("if [ -e /selinux/enforce ]; then setenforce 0; " 38 "else echo 'no /selinux/enforce file present'; fi")
|
/external/dbus/bus/ |
config-parser-common.c | 110 else if (strcmp (name, "selinux") == 0) 175 return "selinux";
|
test-main.c | 32 #include "selinux.h" 66 die ("could not init selinux support");
|
/external/libselinux/src/ |
label.c | 13 #include <selinux/selinux.h>
|
/external/selinux/libselinux/src/ |
init.c | 27 /* Verify the mount point for selinux file system has a selinuxfs. 30 * Is mounted with an selinux file system,
|
/external/selinux/libselinux/utils/ |
matchpathcon.c | 11 #include <selinux/selinux.h>
|
/external/selinux/libsemanage/src/ |
booleans_activedb.c | 15 #include <selinux/selinux.h>
|
seuser_record.c | 134 /* Selinux Name */ 150 "out of memory, could not set seuser (SELinux) name");
|
user_extra_record.c | 3 /* Object: semanage_user_extra_t (SELinux User/Class Extra Data) 4 * Object: semanage_user_extra_key_t (SELinux User/Class Key)
|
/external/selinux/policycoreutils/hll/pp/ |
pp.c | 52 fprintf(stderr, "Read an SELinux policy package (.pp) and output the equivilent CIL.\n"); 53 fprintf(stderr, "If IN_FILE is not provided or is -, read SELinux policy package from\n");
|
/external/selinux/policycoreutils/setfiles/ |
restorecon.8 | 3 restorecon \- restore file(s) default SELinux security contexts. 56 Deprecated, SELinux policy will probably block this access. Use shell redirection to save list of files with incorrect context in filename.
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/setools/policyrep/ |
__init__.py | 30 import selinux namespace 73 """The complete SELinux policy.""" 113 self.log.info("Opening SELinux policy \"{0}\"".format(filename)) 121 self.log.info("Successfully opened SELinux policy \"{0}\"".format(filename)) 128 if selinux.selinuxfs_exists(): 129 yield selinux.selinux_current_policy_path() 132 base_policy_path = selinux.selinux_binary_policy_path() 149 raise RuntimeError("Unable to locate an SELinux policy to load.")
|
/system/core/init/ |
ueventd.cpp | 27 #include <selinux/selinux.h>
|
/art/tools/ |
setup-buildbot-device.sh | 23 echo -e "${green}Turn off selinux${nc}"
|
/build/target/product/ |
embedded.mk | 79 # SELinux packages
|