Searched
full:selinux (Results
851 -
875 of
1108) sorted by null
<<31323334353637383940>>
/prebuilts/clang/host/linux-x86/clang-2690385/bin/ |
asan_device_setup | 381 # Make SELinux happy by keeping app_process wrapper and the shell
|
/system/core/adb/ |
bugreport_test.cpp | 44 // SELinux and its transitive dependencies...
|
/system/sepolicy/ |
app.te | 253 # Check SELinux policy and contexts.
|
/external/autotest/client/profilers/powertop/src/po/ |
fr.po | 210 "SE-Alert alerts you about SELinux policy violations, but also\n" 214 "SE-Alert vous avertit des violations des politiques SELinux, mais il a\n"
|
hu.po | 211 "SE-Alert alerts you about SELinux policy violations, but also\n" 216 "Az SE-Alert figyelmeztet az SELinux szabálysértéseknél, de ugyanakkor \n"
|
es.po | 205 "SE-Alert alerts you about SELinux policy violations, but also\n"
|
it.po | 203 "SE-Alert alerts you about SELinux policy violations, but also\n"
|
pl.po | 204 "SE-Alert alerts you about SELinux policy violations, but also\n"
|
/external/selinux/checkpolicy/ |
checkpolicy.c | 109 "[-c policyvers (%d-%d)] [-o output_file] [-t target_platform (selinux,xen)]" 426 else if (!strcasecmp(optarg, "SELinux"))
|
/external/selinux/sepolgen/src/sepolgen/ |
refparser.py | 24 # normal SELinux policy language plus the refpolicy style M4 macro 487 # Basic SELinux policy language
|
/frameworks/base/services/core/java/com/android/server/fingerprint/ |
FingerprintService.java | 42 import android.os.SELinux; [all...] |
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/sepolgen/ |
refparser.py | 24 # normal SELinux policy language plus the refpolicy style M4 macro 488 # Basic SELinux policy language
|
/system/core/debuggerd/ |
debuggerd.cpp | 40 #include <selinux/android.h> 162 ALOGE("SELinux: No permission defined for debugger action %d", request->action);
|
/system/sepolicy/tools/ |
check_seapp.c | 385 *errmsg = "Expecting a valid SELinux type"; 404 *errmsg = "Expecting a valid SELinux MLS value";
|
/external/iproute2/misc/ |
ss.c | 62 #include <selinux/selinux.h> 64 /* Stubs for SELinux functions */ [all...] |
/external/selinux/libsemanage/src/ |
direct_api.c | 25 #include <selinux/selinux.h> [all...] |
/bootable/recovery/updater/ |
install.cpp | 30 #include <selinux/selinux.h> [all...] |
/frameworks/base/core/java/android/content/pm/ |
ApplicationInfo.java | 610 * String retrieved from the seinfo tag found in selinux policy. This value 612 * construct. This value is useful in setting an SELinux security context on [all...] |
/frameworks/base/core/java/android/os/ |
Process.java | 499 * @param seInfo null-ok SELinux information for the new process. 633 * @param seInfo null-ok SELinux information for the new process. [all...] |
/frameworks/base/services/core/java/com/android/server/pm/ |
PackageInstallerService.java | 69 import android.os.SELinux; [all...] |
/frameworks/native/vulkan/doc/implementors_guide/ |
implementors_guide.html | 787 <div class="paragraph"><p>On debuggable devices (<span class="monospaced">ro.debuggable</span> property exists and is non-zero, generally rooted or engineering builds) the loader will also search the directory <span class="monospaced">/data/local/debug/vulkan</span> and attempt to load layer libraries it finds there. This directory doesn’t exist by default. On Android N and later, because this location is writable by adb, SELinux policies prevent mapping code located here as executable. So to use layers from here, SELinux enforcement must be disabled: <span class="monospaced">adb shell setenforce 0</span>. This mechanism is not intended for application developers, only for IHV and OEM engineers working on test devices that don’t have private or sensitive data.</p></div> [all...] |
/art/runtime/jit/ |
profile_saver.cc | 575 // Another app could have already created the file, and selinux may not
|
/build/tools/releasetools/ |
build_image.py | 560 # We inherit the selinux policies of /system since we contain some of its files.
|
/docs/source.android.com/src/source/ |
initializing.jd | 130 <p class="note"><strong>Note:</strong> To use SELinux tools for policy
|
/external/dbus/dbus/ |
dbus-protocol.h | 440 /** Asked for SELinux security context and it wasn't available. */
|
Completed in 719 milliseconds
<<31323334353637383940>>