OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:labeling
(Results
1 - 25
of
278
) sorted by null
1
2
3
4
5
6
7
8
9
10
11
>>
/external/selinux/policycoreutils/sepolicy/sepolicy/help/
system_relabel.txt
1
SELinux is a
labeling
system. Sometimes the labels on disk can get messed up. One way to fix this is to trigger a full relabel on the next boot.
start.txt
6
Alternatively you can select to manage SELinux on the system, lockdown the system via SELinux. You can also manage confined users and confined user mappings. Finally you could setup File System
Labeling
equivalence.
file_equiv.txt
1
SELinux can either setup
labeling
directory using the Application/files screen, or you can setup file equivalence.
/device/lge/bullhead/sepolicy/
genfs_contexts
1
# proc
labeling
/external/libselinux/include/selinux/
label.h
2
*
Labeling
interface for userspace object managers and others.
60
* selabel_open - Create a
labeling
handle.
61
* @backend: one of the constants specifying a supported
labeling
backend.
65
* Open a
labeling
backend for use. The available backend identifiers are
76
* selabel_close - Close a
labeling
handle.
85
* selabel_lookup - Perform
labeling
lookup operation.
91
* Perform a
labeling
lookup operation. Return %0 on success, -%1 with
128
* selabel_stats - log
labeling
operation statistics.
/external/selinux/libselinux/include/selinux/
label.h
2
*
Labeling
interface for userspace object managers and others.
62
* selabel_open - Create a
labeling
handle.
63
* @backend: one of the constants specifying a supported
labeling
backend.
67
* Open a
labeling
backend for use. The available backend identifiers are
78
* selabel_close - Close a
labeling
handle.
87
* selabel_lookup - Perform
labeling
lookup operation.
93
* Perform a
labeling
lookup operation. Return %0 on success, -%1 with
149
* selabel_stats - log
labeling
operation statistics.
/external/selinux/libselinux/man/man3/
avc_compute_create.3
25
is used to compute a SID to use for
labeling
a new object in a particular class based on a SID pair. This call is identical to
30
is used to compute a SID to use for
labeling
a polyinstantiated object instance of a particular class based on a SID pair. This call is identical to
selabel_stats.3
6
selabel_stats \- obtain SELinux
labeling
statistics
selabel_open.3
6
selabel_open, selabel_close \- userspace SELinux
labeling
interface
24
is used to initialize a
labeling
handle to be used for lookup operations. The
security_compute_av.3
73
is used to compute a context to use for
labeling
a new object in a particular
95
is used to compute the context to use when
labeling
a polyinstantiated object
/device/moto/shamu/sepolicy/
qmux.te
19
# TODO constrain further, by
labeling
/sys/devices/virtual/hsicctl/hsicctl0/modem_file
/external/libselinux/src/
label_internal.h
32
*
Labeling
internal structures
52
/*
labeling
operations */
/external/selinux/secilc/docs/
README.md
76
* [File
Labeling
Statements](cil_file_labeling_statements.md#file-
labeling
-statements)
81
* [Multi-Level Security
Labeling
Statements](cil_mls_labeling_statements.md#multi-level-security-
labeling
-statements)
98
* [Network
Labeling
Statements](cil_network_labeling_statements.md#network-
labeling
-statements)
cil_context_statement.md
8
- Anonymous - They are defined within the CIL
labeling
statement using user, role etc. identifiers.
15
Declare an SELinux security context identifier for
labeling
. The range (or current and clearance levels) MUST be defined whether the policy is MLS/MCS enabled or not.
51
<td align="left"><p>A single previously declared <code>levelrange</code> identifier. This entry may also be defined by anonymous or named <code>level</code>, <code>sensitivity</code>, <code>sensitivityalias</code>, <code>category</code>, <code>categoryalias</code> or <code>categoryset</code> as discussed in the <a href="#mls_labeling_statements">Multi-Level Security
Labeling
Statements</a> section and shown in the examples.</p></td>
/external/selinux/libselinux/man/man5/
selabel_media.5
6
selabel_media \- userspace SELinux
labeling
interface and configuration file format for the media contexts backend
72
The context to be used for
labeling
the device.
selabel_x.5
6
selabel_x \- userspace SELinux
labeling
interface and configuration file format for the X Window System contexts backend. This backend is also used to determine the default context for
labeling
remotely connected X clients
29
This backend is also used to determine the default context for
labeling
remotely connected X clients.
57
argument is ignored, however it should be set to either \fI*\fR (an asterisk or 'wildcard' that will select the default entry) or a specific entry such as "remote" in the X contexts file as shown in the \fBEXAMPLE\fR section. The default context for
labeling
remote X clients is then returned.
/external/selinux/libsemanage/man/man3/
semanage_user.3
79
return the
labeling
prefix for this user, used to control the contexts of user directories
84
set the
labeling
prefix for this user
/device/huawei/angler/sepolicy/
init-power-sh.te
14
# allow
labeling
of interactive /sys files created post-initial restorecon
/external/emma/
release.properties
3
# properties that control release major.minor
labeling
:
/external/selinux/libselinux/man/man8/
sefcontext_compile.8
19
The compiled file is used by libselinux file
labeling
functions.
/external/selinux/libsemanage/include/semanage/
user_record.h
41
/*
Labeling
prefix */
/external/selinux/libsepol/include/sepol/policydb/
services.h
111
* Compute a SID to use for
labeling
a new object in the
210
* Return a value indicating how to handle
labeling
for the
218
#define SECURITY_FS_USE_NONE 5 /* no
labeling
support */
226
* fixed
labeling
behavior like transition SIDs or task SIDs.
/external/selinux/libselinux/src/
label_internal.h
39
*
Labeling
internal structures
85
/*
labeling
operations */
/external/selinux/libsemanage/src/
user_extra_record.c
30
/*
Labeling
prefix */
102
/*
Labeling
prefix */
/external/selinux/policycoreutils/semanage/
semanage-fcontext.8
12
file system
labeling
on an SELinux system. This command maps file paths using regular expressions to SELinux labels.
50
Substitute target path with sourcepath when generating default label. This is used with fcontext. Requires source and target path arguments. The context
labeling
for the target subtree is made equivalent to that defined for the source.
Completed in 3314 milliseconds
1
2
3
4
5
6
7
8
9
10
11
>>