HomeSort by relevance Sort by last modified time
    Searched full:selinux (Results 726 - 750 of 1108) sorted by null

<<21222324252627282930>>

  /docs/source.android.com/src/devices/camera/
versioning.jd 228 <li><strong>Update SELinux policies for cameraserver</strong>. If
229 device-specific SELinux policies give mediaserver permissions to run the camera,
230 you must update the SELinux policies to give cameraserver proper permissions. We
231 do not encourage replicating the mediaserver's SELinux policies for cameraserver
  /docs/source.android.com/src/devices/storage/
adoptable.jd 63 partition, including SELinux labels, etc. When multi-user is supported on the
  /external/dbus/cmake/
config.h.cmake 65 /* selinux */
  /external/iproute2/include/linux/
netlink.h 15 #define NETLINK_SELINUX 7 /* SELinux event notifications */
  /external/iproute2/man/man8/
ss.8 179 Display all TCP sockets with process SELinux security contexts.
  /external/kernel-headers/original/uapi/linux/
netlink.h 15 #define NETLINK_SELINUX 7 /* SELinux event notifications */
prctl.h 169 * asking selinux for a specific new context (e.g. with runcon) will result
  /external/libcap/libcap/include/uapi/linux/
prctl.h 142 * asking selinux for a specific new context (e.g. with runcon) will result
  /external/libnl/include/linux/
netlink.h 14 #define NETLINK_SELINUX 7 /* SELinux event notifications */
  /external/selinux/libselinux/src/
query_user_context.c 6 #include <selinux/get_context_list.h>
  /external/selinux/policycoreutils/gui/
semanagePage.py 1 ## semanagePage.py - show selinux mappings
  /external/selinux/policycoreutils/secon/
secon.c 15 #include <selinux/selinux.h>
16 #include <selinux/context.h>
341 errx(EXIT_FAILURE, "SELinux is not enabled");
  /external/selinux/policycoreutils/sepolicy/sepolicy/templates/
executable.py 4 # policygentool is a tool for the initial generation of SELinux policy
  /external/selinux/secilc/docs/
cil_type_statements.md 276 The type change rule is used to define a different label of an object for userspace SELinux-aware applications. These applications would use **`security_compute_relabel`**`(3)` and [`typechange`](cil_type_statements.md#typechange) rules in the policy to determine the new context to be applied. Note that an [`allow`](cil_access_vector_rules.md#allow) rule must be used to authorise the change.
336 The type member rule is used to define a new polyinstantiated label of an object for SELinux-aware applications. These applications would use **`avc_compute_member`**`(3)` or **`security_compute_member`**`(3)` with the [`typemember`](cil_type_statements.md#typemember) rules in the policy to determine the context to be applied. The application would then manage any required polyinstantiation. Note that an [`allow`](cil_access_vector_rules.md#allow) rule must be used to authorise the membership.
468 Policy database version 23 introduced the permissive statement to allow the named domain to run in permissive mode instead of running all SELinux domains in permissive mode (that was the only option prior to version 23). Note that the permissive statement only tests the source context for any policy denial.
495 This example will allow SELinux to run the `healthd.process` domain in permissive mode even when enforcing is enabled:
  /external/selinux/sepolgen/src/sepolgen/
audit.py 137 import selinux.audit2why as audit2why namespace
335 selinux related messages.
342 invalid_msgs - selinux related messages that are not valid. Messages
366 # message is an SELinux related message and then parses it into
  /external/toybox/toys/other/
login.c 5 * No support for PAM/securetty/selinux/login script/issue/utmp
  /frameworks/native/cmds/installd/
installd.cpp 18 #include <selinux/android.h>
19 #include <selinux/avc.h>
699 LOG_PRI_VA(priority, "SELinux", fmt, ap);
731 ALOGE("Could not open selinux status; exiting.\n");
otapreopt.cpp 21 #include <selinux/android.h>
22 #include <selinux/avc.h>
852 LOG_PRI_VA(priority, "SELinux", fmt, ap);
873 ALOGE("Could not open selinux status; exiting.\n");
  /hardware/qcom/msm8994/original-kernel-headers/linux/
netlink.h 14 #define NETLINK_SELINUX 7 /* SELinux event notifications */
  /hardware/qcom/msm8996/original-kernel-headers/linux/
netlink.h 14 #define NETLINK_SELINUX 7 /* SELinux event notifications */
  /packages/apps/Settings/res/xml/
device_info_settings.xml 139 <!-- SELinux status information -->
  /packages/apps/TvSettings/Settings/res/xml/
device_info_settings.xml 112 <!-- SELinux status information -->
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/linux/
netlink.h 14 #define NETLINK_SELINUX 7 /* SELinux event notifications */
pfkeyv2.h 223 __u8 sadb_x_ctx_alg; /* LSMs: e.g., selinux == 1 */
xfrm.h 218 __u8 ctx_alg; /* LSMs: e.g., selinux == 1 */

Completed in 1032 milliseconds

<<21222324252627282930>>