Searched refs:selinux (Results 1 – 25 of 80) sorted by relevance
1234
67 $(call add-clean-step, rm -rf $(PRODUCT_OUT)/system/etc/selinux/plat_property_contexts)69 $(call add-clean-step, rm -rf $(PRODUCT_OUT)/vendor/etc/selinux/nonplat_property_contexts)70 $(call add-clean-step, rm -rf $(PRODUCT_OUT)/vendor/etc/selinux/mapping_sepolicy.cil)71 $(call add-clean-step, rm -rf $(PRODUCT_OUT)/system/etc/selinux/plat_sepolicy.cil.sha256)72 $(call add-clean-step, rm -rf $(PRODUCT_OUT)/vendor/etc/selinux/precompiled_sepolicy.plat.sha256)73 $(call add-clean-step, rm -rf $(PRODUCT_OUT)/system/etc/selinux/mapping_sepolicy.cil)74 $(call add-clean-step, rm -rf $(PRODUCT_OUT)/vendor/etc/selinux/nonplat_service_contexts)76 $(call add-clean-step, rm -rf $(PRODUCT_OUT)/obj/NOTICE_FILES/src/vendor/etc/selinux/nonplat_servic…78 $(call add-clean-step, rm -rf $(TARGET_OUT_VENDOR)/etc/selinux/nonplat_sepolicy.cil)79 $(call add-clean-step, rm -rf $(TARGET_OUT_VENDOR)/etc/selinux/nonplat_file_contexts)[all …]
5 LOCAL_MODULE_PATH := $(TARGET_OUT)/etc/selinux25 LOCAL_MODULE_PATH := $(TARGET_OUT_SYSTEM_EXT)/etc/selinux48 LOCAL_MODULE_PATH := $(TARGET_OUT_PRODUCT)/etc/selinux71 LOCAL_MODULE_PATH := $(TARGET_OUT_VENDOR)/etc/selinux94 LOCAL_MODULE_PATH := $(TARGET_OUT_ODM)/etc/selinux
32 system_out := $(TARGET_OUT)/etc/selinux33 system_ext_out := $(TARGET_OUT_SYSTEM_EXT)/etc/selinux34 product_out := $(TARGET_OUT_PRODUCT)/etc/selinux35 vendor_out := $(TARGET_OUT_VENDOR)/etc/selinux36 odm_out := $(TARGET_OUT_ODM)/etc/selinux
6 LOCAL_MODULE_PATH := $(TARGET_OUT)/etc/selinux44 LOCAL_MODULE_PATH := $(TARGET_OUT_SYSTEM_EXT)/etc/selinux75 LOCAL_MODULE_PATH := $(TARGET_OUT_PRODUCT)/etc/selinux106 LOCAL_MODULE_PATH := $(TARGET_OUT_VENDOR)/etc/selinux138 LOCAL_MODULE_PATH := $(TARGET_OUT_ODM)/etc/selinux
648 LOCAL_MODULE_PATH := $(TARGET_OUT)/etc/selinux742 LOCAL_MODULE_PATH := $(TARGET_OUT_SYSTEM_EXT)/etc/selinux797 LOCAL_MODULE_PATH := $(TARGET_OUT_PRODUCT)/etc/selinux854 LOCAL_MODULE_PATH := $(TARGET_OUT_VENDOR)/etc/selinux870 LOCAL_MODULE_PATH := $(TARGET_OUT)/etc/selinux/mapping891 LOCAL_MODULE_PATH := $(TARGET_OUT_SYSTEM_EXT)/etc/selinux/mapping917 LOCAL_MODULE_PATH := $(TARGET_OUT_PRODUCT)/etc/selinux/mapping944 LOCAL_MODULE_PATH := $(TARGET_OUT_VENDOR)/etc/selinux973 LOCAL_MODULE_PATH := $(TARGET_OUT_VENDOR)/etc/selinux1029 LOCAL_MODULE_PATH := $(TARGET_OUT_ODM)/etc/selinux[all …]
235 sub_dir: "selinux/mapping",241 sub_dir: "selinux/mapping",247 sub_dir: "selinux/mapping",253 sub_dir: "selinux/mapping",259 sub_dir: "selinux/mapping",
16 name: "soong-selinux",17 pkgPath: "android/soong/selinux",28 "selinux.go",
15 package selinux package
8 # Apps can cause selinux denials by accessing CE storage9 # and/or external storage. In either case, the selinux denial is19 # Attempting to do so will be blocked by both selinux and unix
324 /system/etc/selinux/mapping/[0-9]+\.[0-9]+\.cil u:object_r:sepolicy_file:s0325 /system/etc/selinux/plat_mac_permissions\.xml u:object_r:mac_perms_file:s0326 /system/etc/selinux/plat_property_contexts u:object_r:property_contexts_file:s0327 /system/etc/selinux/plat_service_contexts u:object_r:service_contexts_file:s0328 /system/etc/selinux/plat_hwservice_contexts u:object_r:hwservice_contexts_file:s0329 /system/etc/selinux/plat_file_contexts u:object_r:file_contexts_file:s0330 /system/etc/selinux/plat_seapp_contexts u:object_r:seapp_contexts_file:s0331 /system/etc/selinux/plat_sepolicy\.cil u:object_r:sepolicy_file:s0332 /system/etc/selinux/plat_and_mapping_sepolicy\.cil\.sha256 u:object_r:sepolicy_file:s0381 /(vendor|system/vendor)/etc/selinux/nonplat_service_contexts u:object_r:nonplat_service_contexts_fi…[all …]
8 ### placed in this selinux domain.
19 # Apps can cause selinux denials by accessing CE storage20 # and/or external storage. In either case, the selinux denial is30 # Attempting to do so will be blocked by both selinux and unix
327 /system/etc/selinux/mapping/[0-9]+\.[0-9]+\.cil u:object_r:sepolicy_file:s0328 /system/etc/selinux/plat_mac_permissions\.xml u:object_r:mac_perms_file:s0329 /system/etc/selinux/plat_property_contexts u:object_r:property_contexts_file:s0330 /system/etc/selinux/plat_service_contexts u:object_r:service_contexts_file:s0331 /system/etc/selinux/plat_hwservice_contexts u:object_r:hwservice_contexts_file:s0332 /system/etc/selinux/plat_file_contexts u:object_r:file_contexts_file:s0333 /system/etc/selinux/plat_seapp_contexts u:object_r:seapp_contexts_file:s0334 /system/etc/selinux/plat_sepolicy\.cil u:object_r:sepolicy_file:s0335 /system/etc/selinux/plat_and_mapping_sepolicy\.cil\.sha256 u:object_r:sepolicy_file:s0384 /(vendor|system/vendor)/etc/selinux/nonplat_service_contexts u:object_r:nonplat_service_contexts_fi…[all …]
265 /system/etc/selinux/mapping/[0-9]+\.[0-9]+\.cil u:object_r:sepolicy_file:s0266 /system/etc/selinux/plat_mac_permissions\.xml u:object_r:mac_perms_file:s0267 /system/etc/selinux/plat_property_contexts u:object_r:property_contexts_file:s0268 /system/etc/selinux/plat_service_contexts u:object_r:service_contexts_file:s0269 /system/etc/selinux/plat_hwservice_contexts u:object_r:hwservice_contexts_file:s0270 /system/etc/selinux/plat_file_contexts u:object_r:file_contexts_file:s0271 /system/etc/selinux/plat_seapp_contexts u:object_r:seapp_contexts_file:s0272 /system/etc/selinux/plat_sepolicy.cil u:object_r:sepolicy_file:s0273 /system/etc/selinux/plat_and_mapping_sepolicy\.cil\.sha256 u:object_r:sepolicy_file:s0299 /vendor/etc/selinux/nonplat_mac_permissions.xml u:object_r:mac_perms_file:s0[all …]
306 /system/etc/selinux/mapping/[0-9]+\.[0-9]+\.cil u:object_r:sepolicy_file:s0307 /system/etc/selinux/plat_mac_permissions\.xml u:object_r:mac_perms_file:s0308 /system/etc/selinux/plat_property_contexts u:object_r:property_contexts_file:s0309 /system/etc/selinux/plat_service_contexts u:object_r:service_contexts_file:s0310 /system/etc/selinux/plat_hwservice_contexts u:object_r:hwservice_contexts_file:s0311 /system/etc/selinux/plat_file_contexts u:object_r:file_contexts_file:s0312 /system/etc/selinux/plat_seapp_contexts u:object_r:seapp_contexts_file:s0313 /system/etc/selinux/plat_sepolicy\.cil u:object_r:sepolicy_file:s0314 /system/etc/selinux/plat_and_mapping_sepolicy\.cil\.sha256 u:object_r:sepolicy_file:s0383 /odm/etc/selinux/precompiled_sepolicy u:object_r:sepolicy_file:s0[all …]
4 ro.logd.auditd bool true Enable selinux audit daemon5 ro.logd.auditd.dmesg bool true selinux audit messages sent to dmesg.6 ro.logd.auditd.main bool true selinux audit messages sent to main.7 ro.logd.auditd.events bool true selinux audit messages sent to events.
259 /system/etc/selinux/mapping/[0-9]+\.[0-9]+\.cil u:object_r:sepolicy_file:s0260 /system/etc/selinux/plat_mac_permissions\.xml u:object_r:mac_perms_file:s0261 /system/etc/selinux/plat_property_contexts u:object_r:property_contexts_file:s0262 /system/etc/selinux/plat_service_contexts u:object_r:service_contexts_file:s0263 /system/etc/selinux/plat_hwservice_contexts u:object_r:hwservice_contexts_file:s0264 /system/etc/selinux/plat_file_contexts u:object_r:file_contexts_file:s0265 /system/etc/selinux/plat_seapp_contexts u:object_r:seapp_contexts_file:s0266 /system/etc/selinux/plat_sepolicy.cil u:object_r:sepolicy_file:s0267 /system/etc/selinux/plat_and_mapping_sepolicy\.cil\.sha256 u:object_r:sepolicy_file:s0292 /vendor/etc/selinux/nonplat_mac_permissions.xml u:object_r:mac_perms_file:s0[all …]
280 /system/etc/selinux/mapping/[0-9]+\.[0-9]+\.cil u:object_r:sepolicy_file:s0281 /system/etc/selinux/plat_mac_permissions\.xml u:object_r:mac_perms_file:s0282 /system/etc/selinux/plat_property_contexts u:object_r:property_contexts_file:s0283 /system/etc/selinux/plat_service_contexts u:object_r:service_contexts_file:s0284 /system/etc/selinux/plat_hwservice_contexts u:object_r:hwservice_contexts_file:s0285 /system/etc/selinux/plat_file_contexts u:object_r:file_contexts_file:s0286 /system/etc/selinux/plat_seapp_contexts u:object_r:seapp_contexts_file:s0287 /system/etc/selinux/plat_sepolicy.cil u:object_r:sepolicy_file:s0288 /system/etc/selinux/plat_and_mapping_sepolicy\.cil\.sha256 u:object_r:sepolicy_file:s0339 /odm/etc/selinux/precompiled_sepolicy u:object_r:sepolicy_file:s0[all …]
10 5) Put selinux in permissive mode.
28 # Create directory for iorapd (see iorapd_data_file in selinux file_contexts).
59 selinux.cpp \