HomeSort by relevance Sort by last modified time
    Searched full:selinux (Results 851 - 875 of 1108) sorted by null

<<31323334353637383940>>

  /prebuilts/clang/host/linux-x86/clang-2690385/bin/
asan_device_setup 381 # Make SELinux happy by keeping app_process wrapper and the shell
  /system/core/adb/
bugreport_test.cpp 44 // SELinux and its transitive dependencies...
  /system/sepolicy/
app.te 253 # Check SELinux policy and contexts.
  /external/autotest/client/profilers/powertop/src/po/
fr.po 210 "SE-Alert alerts you about SELinux policy violations, but also\n"
214 "SE-Alert vous avertit des violations des politiques SELinux, mais il a\n"
hu.po 211 "SE-Alert alerts you about SELinux policy violations, but also\n"
216 "Az SE-Alert figyelmeztet az SELinux szabálysértéseknél, de ugyanakkor \n"
es.po 205 "SE-Alert alerts you about SELinux policy violations, but also\n"
it.po 203 "SE-Alert alerts you about SELinux policy violations, but also\n"
pl.po 204 "SE-Alert alerts you about SELinux policy violations, but also\n"
  /external/selinux/checkpolicy/
checkpolicy.c 109 "[-c policyvers (%d-%d)] [-o output_file] [-t target_platform (selinux,xen)]"
426 else if (!strcasecmp(optarg, "SELinux"))
  /external/selinux/sepolgen/src/sepolgen/
refparser.py 24 # normal SELinux policy language plus the refpolicy style M4 macro
487 # Basic SELinux policy language
  /frameworks/base/services/core/java/com/android/server/fingerprint/
FingerprintService.java 42 import android.os.SELinux;
    [all...]
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/sepolgen/
refparser.py 24 # normal SELinux policy language plus the refpolicy style M4 macro
488 # Basic SELinux policy language
  /system/core/debuggerd/
debuggerd.cpp 40 #include <selinux/android.h>
162 ALOGE("SELinux: No permission defined for debugger action %d", request->action);
  /system/sepolicy/tools/
check_seapp.c 385 *errmsg = "Expecting a valid SELinux type";
404 *errmsg = "Expecting a valid SELinux MLS value";
  /external/iproute2/misc/
ss.c 62 #include <selinux/selinux.h>
64 /* Stubs for SELinux functions */
    [all...]
  /external/selinux/libsemanage/src/
direct_api.c 25 #include <selinux/selinux.h>
    [all...]
  /bootable/recovery/updater/
install.cpp 30 #include <selinux/selinux.h>
    [all...]
  /frameworks/base/core/java/android/content/pm/
ApplicationInfo.java 610 * String retrieved from the seinfo tag found in selinux policy. This value
612 * construct. This value is useful in setting an SELinux security context on
    [all...]
  /frameworks/base/core/java/android/os/
Process.java 499 * @param seInfo null-ok SELinux information for the new process.
633 * @param seInfo null-ok SELinux information for the new process.
    [all...]
  /frameworks/base/services/core/java/com/android/server/pm/
PackageInstallerService.java 69 import android.os.SELinux;
    [all...]
  /frameworks/native/vulkan/doc/implementors_guide/
implementors_guide.html 787 <div class="paragraph"><p>On debuggable devices (<span class="monospaced">ro.debuggable</span> property exists and is non-zero, generally rooted or engineering builds) the loader will also search the directory <span class="monospaced">/data/local/debug/vulkan</span> and attempt to load layer libraries it finds there. This directory doesn&#8217;t exist by default. On Android N and later, because this location is writable by adb, SELinux policies prevent mapping code located here as executable. So to use layers from here, SELinux enforcement must be disabled: <span class="monospaced">adb shell setenforce 0</span>. This mechanism is not intended for application developers, only for IHV and OEM engineers working on test devices that don&#8217;t have private or sensitive data.</p></div>
    [all...]
  /art/runtime/jit/
profile_saver.cc 575 // Another app could have already created the file, and selinux may not
  /build/tools/releasetools/
build_image.py 560 # We inherit the selinux policies of /system since we contain some of its files.
  /docs/source.android.com/src/source/
initializing.jd 130 <p class="note"><strong>Note:</strong> To use SELinux tools for policy
  /external/dbus/dbus/
dbus-protocol.h 440 /** Asked for SELinux security context and it wasn't available. */

Completed in 719 milliseconds

<<31323334353637383940>>