HomeSort by relevance Sort by last modified time
    Searched full:labeling (Results 1 - 25 of 278) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/selinux/policycoreutils/sepolicy/sepolicy/help/
system_relabel.txt 1 SELinux is a labeling system. Sometimes the labels on disk can get messed up. One way to fix this is to trigger a full relabel on the next boot.
start.txt 6 Alternatively you can select to manage SELinux on the system, lockdown the system via SELinux. You can also manage confined users and confined user mappings. Finally you could setup File System Labeling equivalence.
file_equiv.txt 1 SELinux can either setup labeling directory using the Application/files screen, or you can setup file equivalence.
  /device/lge/bullhead/sepolicy/
genfs_contexts 1 # proc labeling
  /external/libselinux/include/selinux/
label.h 2 * Labeling interface for userspace object managers and others.
60 * selabel_open - Create a labeling handle.
61 * @backend: one of the constants specifying a supported labeling backend.
65 * Open a labeling backend for use. The available backend identifiers are
76 * selabel_close - Close a labeling handle.
85 * selabel_lookup - Perform labeling lookup operation.
91 * Perform a labeling lookup operation. Return %0 on success, -%1 with
128 * selabel_stats - log labeling operation statistics.
  /external/selinux/libselinux/include/selinux/
label.h 2 * Labeling interface for userspace object managers and others.
62 * selabel_open - Create a labeling handle.
63 * @backend: one of the constants specifying a supported labeling backend.
67 * Open a labeling backend for use. The available backend identifiers are
78 * selabel_close - Close a labeling handle.
87 * selabel_lookup - Perform labeling lookup operation.
93 * Perform a labeling lookup operation. Return %0 on success, -%1 with
149 * selabel_stats - log labeling operation statistics.
  /external/selinux/libselinux/man/man3/
avc_compute_create.3 25 is used to compute a SID to use for labeling a new object in a particular class based on a SID pair. This call is identical to
30 is used to compute a SID to use for labeling a polyinstantiated object instance of a particular class based on a SID pair. This call is identical to
selabel_stats.3 6 selabel_stats \- obtain SELinux labeling statistics
selabel_open.3 6 selabel_open, selabel_close \- userspace SELinux labeling interface
24 is used to initialize a labeling handle to be used for lookup operations. The
security_compute_av.3 73 is used to compute a context to use for labeling a new object in a particular
95 is used to compute the context to use when labeling a polyinstantiated object
  /device/moto/shamu/sepolicy/
qmux.te 19 # TODO constrain further, by labeling /sys/devices/virtual/hsicctl/hsicctl0/modem_file
  /external/libselinux/src/
label_internal.h 32 * Labeling internal structures
52 /* labeling operations */
  /external/selinux/secilc/docs/
README.md 76 * [File Labeling Statements](cil_file_labeling_statements.md#file-labeling-statements)
81 * [Multi-Level Security Labeling Statements](cil_mls_labeling_statements.md#multi-level-security-labeling-statements)
98 * [Network Labeling Statements](cil_network_labeling_statements.md#network-labeling-statements)
cil_context_statement.md 8 - Anonymous - They are defined within the CIL labeling statement using user, role etc. identifiers.
15 Declare an SELinux security context identifier for labeling. The range (or current and clearance levels) MUST be defined whether the policy is MLS/MCS enabled or not.
51 <td align="left"><p>A single previously declared <code>levelrange</code> identifier. This entry may also be defined by anonymous or named <code>level</code>, <code>sensitivity</code>, <code>sensitivityalias</code>, <code>category</code>, <code>categoryalias</code> or <code>categoryset</code> as discussed in the <a href="#mls_labeling_statements">Multi-Level Security Labeling Statements</a> section and shown in the examples.</p></td>
  /external/selinux/libselinux/man/man5/
selabel_media.5 6 selabel_media \- userspace SELinux labeling interface and configuration file format for the media contexts backend
72 The context to be used for labeling the device.
selabel_x.5 6 selabel_x \- userspace SELinux labeling interface and configuration file format for the X Window System contexts backend. This backend is also used to determine the default context for labeling remotely connected X clients
29 This backend is also used to determine the default context for labeling remotely connected X clients.
57 argument is ignored, however it should be set to either \fI*\fR (an asterisk or 'wildcard' that will select the default entry) or a specific entry such as "remote" in the X contexts file as shown in the \fBEXAMPLE\fR section. The default context for labeling remote X clients is then returned.
  /external/selinux/libsemanage/man/man3/
semanage_user.3 79 return the labeling prefix for this user, used to control the contexts of user directories
84 set the labeling prefix for this user
  /device/huawei/angler/sepolicy/
init-power-sh.te 14 # allow labeling of interactive /sys files created post-initial restorecon
  /external/emma/
release.properties 3 # properties that control release major.minor labeling:
  /external/selinux/libselinux/man/man8/
sefcontext_compile.8 19 The compiled file is used by libselinux file labeling functions.
  /external/selinux/libsemanage/include/semanage/
user_record.h 41 /* Labeling prefix */
  /external/selinux/libsepol/include/sepol/policydb/
services.h 111 * Compute a SID to use for labeling a new object in the
210 * Return a value indicating how to handle labeling for the
218 #define SECURITY_FS_USE_NONE 5 /* no labeling support */
226 * fixed labeling behavior like transition SIDs or task SIDs.
  /external/selinux/libselinux/src/
label_internal.h 39 * Labeling internal structures
85 /* labeling operations */
  /external/selinux/libsemanage/src/
user_extra_record.c 30 /* Labeling prefix */
102 /* Labeling prefix */
  /external/selinux/policycoreutils/semanage/
semanage-fcontext.8 12 file system labeling on an SELinux system. This command maps file paths using regular expressions to SELinux labels.
50 Substitute target path with sourcepath when generating default label. This is used with fcontext. Requires source and target path arguments. The context labeling for the target subtree is made equivalent to that defined for the source.

Completed in 3314 milliseconds

1 2 3 4 5 6 7 8 91011>>