HomeSort by relevance Sort by last modified time
    Searched full:load_policy (Results 1 - 25 of 164) sorted by null

1 2 3 4 5 6 7

  /external/toybox/toys/android/
load_policy.c 0 /* load_policy.c - Load a policy file
5 USE_LOAD_POLICY(NEWTOY(load_policy, "<1>1", TOYFLAG_USR|TOYFLAG_SBIN))
7 config LOAD_POLICY
8 bool "load_policy"
12 usage: load_policy FILE
  /external/selinux/policycoreutils/load_policy/
load_policy.8 1 .TH LOAD_POLICY "8" "May 2003" "Security Enhanced Linux" NSA
3 load_policy \- load a new SELinux policy into the kernel
6 .B load_policy
11 load_policy loads the installed policy file into the kernel.
Makefile 19 install -m 644 load_policy.8 $(MANDIR)/man8/
28 /sbin/restorecon $(SBINDIR)/load_policy
load_policy.c 71 /* SELinux in enforcing mode but load_policy failed */
  /external/selinux/policycoreutils/
Makefile 1 SUBDIRS = setfiles load_policy newrole run_init secon sestatus semodule setsebool scripts po man hll
  /system/sepolicy/tools/sepolicy-analyze/
utils.h 14 int load_policy(char *filename, policydb_t * policydb, struct policy_file *pf);
sepolicy-analyze.c 53 if(load_policy(policy, &policydb, &pf))
utils.c 25 int load_policy(char *filename, policydb_t * policydb, struct policy_file *pf) function
  /system/sepolicy/tests/include/
sepol_wrap.h 7 void *load_policy(const char *policy_path);
  /external/ltp/testcases/kernel/security/integrity/ima/tests/
ima_policy.sh 51 load_policy() function
77 load_policy $INVALID_POLICY & p1=$!
91 load_policy $VALID_POLICY & p1=$! # forked process 1
92 load_policy $VALID_POLICY & p2=$! # forked process 2
108 load_policy $INVALID_POLICY & p1=$!
  /external/selinux/libsemanage/src/
conf-parse.y 282 semanage_conf_external_prog_destroy(current_conf->load_policy);
283 current_conf->load_policy = NULL;
284 if (new_external_prog(&current_conf->load_policy) == -1) {
359 if ((conf->load_policy =
360 calloc(1, sizeof(*(current_conf->load_policy)))) == NULL) {
364 if (access("/sbin/load_policy", X_OK) == 0) {
365 conf->load_policy->path = strdup("/sbin/load_policy");
367 conf->load_policy->path = strdup("/usr/sbin/load_policy");
    [all...]
semanage_conf.h 51 struct external_prog *load_policy; member in struct:semanage_conf
conf-scan.l 57 "[load_policy]" return LOAD_POLICY_START;
  /external/selinux/libselinux/
Android.bp 67 "src/load_policy.c",
132 "src/load_policy.c",
155 "src/load_policy.c",
  /external/selinux/python/sepolicy/sepolicy/templates/
spec.py 47 /usr/sbin/load_policy
57 /usr/sbin/load_policy
  /external/selinux/policycoreutils/po/
Makefile 42 ../load_policy/load_policy.c \
  /external/selinux/python/audit2allow/
sepolgen-ifgen-attr-helper.c 145 static policydb_t *load_policy(const char *filename) function
206 p = load_policy(argv[1]);
  /external/selinux/python/sepolgen/src/sepolgen/
classperms.py 112 define(`all_security_perms',`{ compute_av compute_create compute_member check_context load_policy compute_relabel compute_user setenforce setbool setsecparam setcheckreqprot }')
  /external/selinux/secilc/docs/
cil_reference_guide.md 219 The `cps_1 classpermissionset` identifier includes all permissions except `load_policy` and `setenforce`:
221 (class security (compute_av compute_create compute_member check_context load_policy compute_relabel compute_user setenforce setbool setsecparam setcheckreqprot read_policy))
225 (classpermissionset cps_1 (security (not (load_policy setenforce))))
229 (class security (compute_av compute_create compute_member check_context load_policy
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/sepolgen/
classperms.py 112 define(`all_security_perms',`{ compute_av compute_create compute_member check_context load_policy compute_relabel compute_user setenforce setbool setsecparam setcheckreqprot }')
  /system/sepolicy/tests/
policy.py 327 # void *load_policy(const char *policy_path);
328 lib.load_policy.restype = c_void_p
329 lib.load_policy.argtypes = [c_char_p]
421 self.__policydbP = self.__libsepolwrap.load_policy(cPolicyPath)
  /external/selinux/libsepol/tests/policies/test-linker/
small-base.conf 325 load_policy
450 allow g_b_type_1 g_b_type_2 : security { compute_av load_policy };
  /system/sepolicy/tools/
sepolicy-check.c 188 int load_policy(char *filename, policydb_t *policydb, struct policy_file *pf) { function
279 if (load_policy(policy, &policydb, &pf))
  /external/toybox/
Android.mk 69 toys/android/load_policy.c \
300 load_policy \
  /external/selinux/libsepol/tests/policies/test-deps/
base-metreq.conf 325 load_policy

Completed in 1404 milliseconds

1 2 3 4 5 6 7