HomeSort by relevance Sort by last modified time
    Searched full:selinux (Results 526 - 550 of 1108) sorted by null

<<21222324252627282930>>

  /frameworks/native/cmds/servicemanager/
service_manager.c 15 #include <selinux/android.h>
16 #include <selinux/avc.h>
75 ALOGE("SELinux: getpidcon(pid=%d) failed to retrieve pid context.\n", spid);
109 ALOGE("SELinux: Failed to find sehandle. Aborting service_manager.\n");
114 ALOGE("SELinux: No match for %s in service_contexts.\n", name);
393 ALOGE("SELinux: Failed to acquire sehandle. Aborting.\n");
398 ALOGE("SELinux: Failed to acquire service_manager context. Aborting.\n");
  /external/selinux/libselinux/man/man5/
selabel_db.5 4 .TH "selabel_db" "5" "01 DEC 2011" "Security Enhanced Linux" "SELinux API documentation"
6 selabel_db \- userspace SELinux labeling interface and configuration file format for the RDBMS objects context backend
9 .B #include <selinux/label.h>
124 .I /etc/selinux/{SELINUXTYPE}/contexts/sepgsql_context
127 Where \fI{SELINUXTYPE}\fR is the entry from the selinux configuration file \fIconfig\fR (see \fBselinux_config\fR(5)).
219 .BR selinux "(8), " selabel_open "(3), " selabel_lookup "(3), " selabel_stats "(3), " selabel_close "(3), " selinux_set_callback "(3), " selinux_sepgsql_context_path "(3), " freecon "(3), " selinux_config "(5) "
  /external/selinux/policycoreutils/sandbox/
sandbox 32 import selinux
144 level = selinux.getcon_raw()[1].split(":")[4]
322 help=_("run sandbox with SELinux type"))
378 raise ValueError(_("Sandbox Policy is not currently installed.\nYou need to install the selinux-policy-sandbox package in order to run this command"))
388 self.setype = selinux.getcon()[1].split(":")[2]
422 con = selinux.getcon()[1].split(":")
428 selinux.chcon(self.__options.homedir, self.__filecon, recursive=True)
431 selinux.setfscreatecon(self.__filecon)
435 selinux.chcon(self.__options.tmpdir, self.__filecon, recursive=True)
438 selinux.setfscreatecon(self.__filecon
    [all...]
  /external/selinux/policycoreutils/scripts/
chcat 31 import selinux namespace
115 (rc, c) = selinux.getfilecon(f)
194 (rc, c) = selinux.getfilecon(f)
325 (rc, raw) = selinux.selinux_trans_to_raw_context("a:b:c:%s" % c)
362 fd = open(selinux.selinux_translations_path())
382 cats = seobject.translate(selinux.getseuserbyname(u)[2])
395 if selinux.is_selinux_mls_enabled() != 1:
398 if selinux.is_selinux_enabled() != 1:
399 error("Requires an SELinux enabled system")
fixfiles.8 3 fixfiles \- fix file SELinux security contexts.
32 The file /etc/selinux/fixfiles_exclude_dirs can contain a list of directories
  /external/selinux/policycoreutils/sestatus/
sestatus.c 12 #include <selinux/selinux.h>
13 #include <selinux/get_default_type.h>
216 printf("\nWithout options, show SELinux status.\n");
220 printf_tab("SELinux status:");
246 printf_tab("SELinux root directory:");
  /system/sepolicy/
te_macros 220 # Allow domain to check SELinux permissions via selinuxfs.
229 # Allow domain to check SELinux contexts via selinuxfs.
237 # Allow domain to set SELinux to enforcing.
245 # Allow domain to set SELinux booleans.
293 # SELinux rules which apply only to recovery mode
299 # SELinux rules which apply only to userdebug or eng builds
recovery.te 34 # We may be asked to set an SELinux label for a type not known to the
39 # 0eb17d944704b3eb140bb9dded299d3be3aed77e in build/ added SELinux
  /external/selinux/libselinux/
ChangeLog 15 * Add explicit dependency for pywrap on selinux.py, from Wenzong Fan.
40 * is_selinux_enabled: Add /etc/selinux/config test, from Stephen Smalley.
52 * Fix audit2why error handling if SELinux is disabled, from Stephen Smalley.
55 * Only check SELinux enabled status once in selinux_check_access, from Stephen Smalley.
61 * Set the system to permissive if failing to disable SELinux because
63 * Fix type in selinux.8 manpage, from Nicolas Iooss
84 * Fix avc_has_perm() returns -1 even when SELinux is in permissive mode.
103 * Export SELINUX_TRANS_DIR definition in selinux.h from Dan Walsh.
114 * man: make selinux.8 mention service man pages
150 * stop messages when SELinux disable
    [all...]
  /external/selinux/policycoreutils/semanage/
seobject.py 5 # semanage is a tool for managing SELinux configuration files
27 import selinux namespace
177 (rc, trans) = selinux.selinux_raw_to_trans_context(context)
195 (rc, raw) = selinux.selinux_trans_to_raw_context(context)
216 rc, localstore = selinux.selinux_getpolicytype()
241 raise ValueError(_("SELinux policy is not managed or store cannot be accessed."))
307 raise ValueError(_("Could not list SELinux modules"))
432 raise ValueError(_("Could not list SELinux modules"))
503 rec, self.oldsename, self.oldserange = selinux.getseuserbyname(name)
552 raise ValueError(_("Could not set SELinux user for %s") % name
    [all...]
  /external/autotest/client/virt/tests/
multicast.py 37 cmd_selinux = ("if [ -e /selinux/enforce ]; then setenforce 0; "
38 "else echo 'no /selinux/enforce file present'; fi")
  /external/dbus/bus/
config-parser-common.c 110 else if (strcmp (name, "selinux") == 0)
175 return "selinux";
test-main.c 32 #include "selinux.h"
66 die ("could not init selinux support");
  /external/libselinux/src/
label.c 13 #include <selinux/selinux.h>
  /external/selinux/libselinux/src/
init.c 27 /* Verify the mount point for selinux file system has a selinuxfs.
30 * Is mounted with an selinux file system,
  /external/selinux/libselinux/utils/
matchpathcon.c 11 #include <selinux/selinux.h>
  /external/selinux/libsemanage/src/
booleans_activedb.c 15 #include <selinux/selinux.h>
seuser_record.c 134 /* Selinux Name */
150 "out of memory, could not set seuser (SELinux) name");
user_extra_record.c 3 /* Object: semanage_user_extra_t (SELinux User/Class Extra Data)
4 * Object: semanage_user_extra_key_t (SELinux User/Class Key)
  /external/selinux/policycoreutils/hll/pp/
pp.c 52 fprintf(stderr, "Read an SELinux policy package (.pp) and output the equivilent CIL.\n");
53 fprintf(stderr, "If IN_FILE is not provided or is -, read SELinux policy package from\n");
  /external/selinux/policycoreutils/setfiles/
restorecon.8 3 restorecon \- restore file(s) default SELinux security contexts.
56 Deprecated, SELinux policy will probably block this access. Use shell redirection to save list of files with incorrect context in filename.
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/setools/policyrep/
__init__.py 30 import selinux namespace
73 """The complete SELinux policy."""
113 self.log.info("Opening SELinux policy \"{0}\"".format(filename))
121 self.log.info("Successfully opened SELinux policy \"{0}\"".format(filename))
128 if selinux.selinuxfs_exists():
129 yield selinux.selinux_current_policy_path()
132 base_policy_path = selinux.selinux_binary_policy_path()
149 raise RuntimeError("Unable to locate an SELinux policy to load.")
  /system/core/init/
ueventd.cpp 27 #include <selinux/selinux.h>
  /art/tools/
setup-buildbot-device.sh 23 echo -e "${green}Turn off selinux${nc}"
  /build/target/product/
embedded.mk 79 # SELinux packages

Completed in 497 milliseconds

<<21222324252627282930>>