/external/toybox/toys/android/ |
load_policy.c | 0 /* load_policy.c - Load a policy file 5 USE_LOAD_POLICY(NEWTOY(load_policy, "<1>1", TOYFLAG_USR|TOYFLAG_SBIN)) 7 config LOAD_POLICY 8 bool "load_policy" 12 usage: load_policy FILE
|
/external/selinux/policycoreutils/load_policy/ |
load_policy.8 | 1 .TH LOAD_POLICY "8" "May 2003" "Security Enhanced Linux" NSA 3 load_policy \- load a new SELinux policy into the kernel 6 .B load_policy 11 load_policy loads the installed policy file into the kernel.
|
Makefile | 19 install -m 644 load_policy.8 $(MANDIR)/man8/ 28 /sbin/restorecon $(SBINDIR)/load_policy
|
load_policy.c | 71 /* SELinux in enforcing mode but load_policy failed */
|
/external/selinux/policycoreutils/ |
Makefile | 1 SUBDIRS = setfiles load_policy newrole run_init secon sestatus semodule setsebool scripts po man hll
|
/system/sepolicy/tools/sepolicy-analyze/ |
utils.h | 14 int load_policy(char *filename, policydb_t * policydb, struct policy_file *pf);
|
sepolicy-analyze.c | 53 if(load_policy(policy, &policydb, &pf))
|
utils.c | 25 int load_policy(char *filename, policydb_t * policydb, struct policy_file *pf) function
|
/system/sepolicy/tests/include/ |
sepol_wrap.h | 7 void *load_policy(const char *policy_path);
|
/external/ltp/testcases/kernel/security/integrity/ima/tests/ |
ima_policy.sh | 51 load_policy() function 77 load_policy $INVALID_POLICY & p1=$! 91 load_policy $VALID_POLICY & p1=$! # forked process 1 92 load_policy $VALID_POLICY & p2=$! # forked process 2 108 load_policy $INVALID_POLICY & p1=$!
|
/external/selinux/libsemanage/src/ |
conf-parse.y | 282 semanage_conf_external_prog_destroy(current_conf->load_policy); 283 current_conf->load_policy = NULL; 284 if (new_external_prog(¤t_conf->load_policy) == -1) { 359 if ((conf->load_policy = 360 calloc(1, sizeof(*(current_conf->load_policy)))) == NULL) { 364 if (access("/sbin/load_policy", X_OK) == 0) { 365 conf->load_policy->path = strdup("/sbin/load_policy"); 367 conf->load_policy->path = strdup("/usr/sbin/load_policy"); [all...] |
semanage_conf.h | 51 struct external_prog *load_policy; member in struct:semanage_conf
|
conf-scan.l | 57 "[load_policy]" return LOAD_POLICY_START;
|
/external/selinux/libselinux/ |
Android.bp | 67 "src/load_policy.c", 132 "src/load_policy.c", 155 "src/load_policy.c",
|
/external/selinux/python/sepolicy/sepolicy/templates/ |
spec.py | 47 /usr/sbin/load_policy 57 /usr/sbin/load_policy
|
/external/selinux/policycoreutils/po/ |
Makefile | 42 ../load_policy/load_policy.c \
|
/external/selinux/python/audit2allow/ |
sepolgen-ifgen-attr-helper.c | 145 static policydb_t *load_policy(const char *filename) function 206 p = load_policy(argv[1]);
|
/external/selinux/python/sepolgen/src/sepolgen/ |
classperms.py | 112 define(`all_security_perms',`{ compute_av compute_create compute_member check_context load_policy compute_relabel compute_user setenforce setbool setsecparam setcheckreqprot }')
|
/external/selinux/secilc/docs/ |
cil_reference_guide.md | 219 The `cps_1 classpermissionset` identifier includes all permissions except `load_policy` and `setenforce`: 221 (class security (compute_av compute_create compute_member check_context load_policy compute_relabel compute_user setenforce setbool setsecparam setcheckreqprot read_policy)) 225 (classpermissionset cps_1 (security (not (load_policy setenforce)))) 229 (class security (compute_av compute_create compute_member check_context load_policy
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/sepolgen/ |
classperms.py | 112 define(`all_security_perms',`{ compute_av compute_create compute_member check_context load_policy compute_relabel compute_user setenforce setbool setsecparam setcheckreqprot }')
|
/system/sepolicy/tests/ |
policy.py | 327 # void *load_policy(const char *policy_path); 328 lib.load_policy.restype = c_void_p 329 lib.load_policy.argtypes = [c_char_p] 421 self.__policydbP = self.__libsepolwrap.load_policy(cPolicyPath)
|
/external/selinux/libsepol/tests/policies/test-linker/ |
small-base.conf | 325 load_policy 450 allow g_b_type_1 g_b_type_2 : security { compute_av load_policy };
|
/system/sepolicy/tools/ |
sepolicy-check.c | 188 int load_policy(char *filename, policydb_t *policydb, struct policy_file *pf) { function 279 if (load_policy(policy, &policydb, &pf))
|
/external/toybox/ |
Android.mk | 69 toys/android/load_policy.c \ 300 load_policy \
|
/external/selinux/libsepol/tests/policies/test-deps/ |
base-metreq.conf | 325 load_policy
|