Home
last modified time | relevance | path

Searched refs:selinux (Results 1 – 25 of 80) sorted by relevance

1234

/system/sepolicy/
DCleanSpec.mk67 $(call add-clean-step, rm -rf $(PRODUCT_OUT)/system/etc/selinux/plat_property_contexts)
69 $(call add-clean-step, rm -rf $(PRODUCT_OUT)/vendor/etc/selinux/nonplat_property_contexts)
70 $(call add-clean-step, rm -rf $(PRODUCT_OUT)/vendor/etc/selinux/mapping_sepolicy.cil)
71 $(call add-clean-step, rm -rf $(PRODUCT_OUT)/system/etc/selinux/plat_sepolicy.cil.sha256)
72 $(call add-clean-step, rm -rf $(PRODUCT_OUT)/vendor/etc/selinux/precompiled_sepolicy.plat.sha256)
73 $(call add-clean-step, rm -rf $(PRODUCT_OUT)/system/etc/selinux/mapping_sepolicy.cil)
74 $(call add-clean-step, rm -rf $(PRODUCT_OUT)/vendor/etc/selinux/nonplat_service_contexts)
76 $(call add-clean-step, rm -rf $(PRODUCT_OUT)/obj/NOTICE_FILES/src/vendor/etc/selinux/nonplat_servic…
78 $(call add-clean-step, rm -rf $(TARGET_OUT_VENDOR)/etc/selinux/nonplat_sepolicy.cil)
79 $(call add-clean-step, rm -rf $(TARGET_OUT_VENDOR)/etc/selinux/nonplat_file_contexts)
[all …]
Dseapp_contexts.mk5 LOCAL_MODULE_PATH := $(TARGET_OUT)/etc/selinux
25 LOCAL_MODULE_PATH := $(TARGET_OUT_SYSTEM_EXT)/etc/selinux
48 LOCAL_MODULE_PATH := $(TARGET_OUT_PRODUCT)/etc/selinux
71 LOCAL_MODULE_PATH := $(TARGET_OUT_VENDOR)/etc/selinux
94 LOCAL_MODULE_PATH := $(TARGET_OUT_ODM)/etc/selinux
Dcontexts_tests.mk32 system_out := $(TARGET_OUT)/etc/selinux
33 system_ext_out := $(TARGET_OUT_SYSTEM_EXT)/etc/selinux
34 product_out := $(TARGET_OUT_PRODUCT)/etc/selinux
35 vendor_out := $(TARGET_OUT_VENDOR)/etc/selinux
36 odm_out := $(TARGET_OUT_ODM)/etc/selinux
Dmac_permissions.mk6 LOCAL_MODULE_PATH := $(TARGET_OUT)/etc/selinux
44 LOCAL_MODULE_PATH := $(TARGET_OUT_SYSTEM_EXT)/etc/selinux
75 LOCAL_MODULE_PATH := $(TARGET_OUT_PRODUCT)/etc/selinux
106 LOCAL_MODULE_PATH := $(TARGET_OUT_VENDOR)/etc/selinux
138 LOCAL_MODULE_PATH := $(TARGET_OUT_ODM)/etc/selinux
DAndroid.mk648 LOCAL_MODULE_PATH := $(TARGET_OUT)/etc/selinux
742 LOCAL_MODULE_PATH := $(TARGET_OUT_SYSTEM_EXT)/etc/selinux
797 LOCAL_MODULE_PATH := $(TARGET_OUT_PRODUCT)/etc/selinux
854 LOCAL_MODULE_PATH := $(TARGET_OUT_VENDOR)/etc/selinux
870 LOCAL_MODULE_PATH := $(TARGET_OUT)/etc/selinux/mapping
891 LOCAL_MODULE_PATH := $(TARGET_OUT_SYSTEM_EXT)/etc/selinux/mapping
917 LOCAL_MODULE_PATH := $(TARGET_OUT_PRODUCT)/etc/selinux/mapping
944 LOCAL_MODULE_PATH := $(TARGET_OUT_VENDOR)/etc/selinux
973 LOCAL_MODULE_PATH := $(TARGET_OUT_VENDOR)/etc/selinux
1029 LOCAL_MODULE_PATH := $(TARGET_OUT_ODM)/etc/selinux
[all …]
DAndroid.bp235 sub_dir: "selinux/mapping",
241 sub_dir: "selinux/mapping",
247 sub_dir: "selinux/mapping",
253 sub_dir: "selinux/mapping",
259 sub_dir: "selinux/mapping",
/system/sepolicy/build/soong/
DAndroid.bp16 name: "soong-selinux",
17 pkgPath: "android/soong/selinux",
28 "selinux.go",
Dselinux.go15 package selinux package
/system/sepolicy/prebuilts/api/30.0/private/
Dapp.te8 # Apps can cause selinux denials by accessing CE storage
9 # and/or external storage. In either case, the selinux denial is
19 # Attempting to do so will be blocked by both selinux and unix
Dfile_contexts324 /system/etc/selinux/mapping/[0-9]+\.[0-9]+\.cil u:object_r:sepolicy_file:s0
325 /system/etc/selinux/plat_mac_permissions\.xml u:object_r:mac_perms_file:s0
326 /system/etc/selinux/plat_property_contexts u:object_r:property_contexts_file:s0
327 /system/etc/selinux/plat_service_contexts u:object_r:service_contexts_file:s0
328 /system/etc/selinux/plat_hwservice_contexts u:object_r:hwservice_contexts_file:s0
329 /system/etc/selinux/plat_file_contexts u:object_r:file_contexts_file:s0
330 /system/etc/selinux/plat_seapp_contexts u:object_r:seapp_contexts_file:s0
331 /system/etc/selinux/plat_sepolicy\.cil u:object_r:sepolicy_file:s0
332 /system/etc/selinux/plat_and_mapping_sepolicy\.cil\.sha256 u:object_r:sepolicy_file:s0
381 /(vendor|system/vendor)/etc/selinux/nonplat_service_contexts u:object_r:nonplat_service_contexts_fi…
[all …]
Duntrusted_app.te8 ### placed in this selinux domain.
Duntrusted_app_29.te8 ### placed in this selinux domain.
/system/sepolicy/private/
Dapp.te19 # Apps can cause selinux denials by accessing CE storage
20 # and/or external storage. In either case, the selinux denial is
30 # Attempting to do so will be blocked by both selinux and unix
Dfile_contexts327 /system/etc/selinux/mapping/[0-9]+\.[0-9]+\.cil u:object_r:sepolicy_file:s0
328 /system/etc/selinux/plat_mac_permissions\.xml u:object_r:mac_perms_file:s0
329 /system/etc/selinux/plat_property_contexts u:object_r:property_contexts_file:s0
330 /system/etc/selinux/plat_service_contexts u:object_r:service_contexts_file:s0
331 /system/etc/selinux/plat_hwservice_contexts u:object_r:hwservice_contexts_file:s0
332 /system/etc/selinux/plat_file_contexts u:object_r:file_contexts_file:s0
333 /system/etc/selinux/plat_seapp_contexts u:object_r:seapp_contexts_file:s0
334 /system/etc/selinux/plat_sepolicy\.cil u:object_r:sepolicy_file:s0
335 /system/etc/selinux/plat_and_mapping_sepolicy\.cil\.sha256 u:object_r:sepolicy_file:s0
384 /(vendor|system/vendor)/etc/selinux/nonplat_service_contexts u:object_r:nonplat_service_contexts_fi…
[all …]
Duntrusted_app.te8 ### placed in this selinux domain.
Duntrusted_app_29.te8 ### placed in this selinux domain.
Duntrusted_app_27.te8 ### placed in this selinux domain.
/system/sepolicy/prebuilts/api/27.0/private/
Dfile_contexts265 /system/etc/selinux/mapping/[0-9]+\.[0-9]+\.cil u:object_r:sepolicy_file:s0
266 /system/etc/selinux/plat_mac_permissions\.xml u:object_r:mac_perms_file:s0
267 /system/etc/selinux/plat_property_contexts u:object_r:property_contexts_file:s0
268 /system/etc/selinux/plat_service_contexts u:object_r:service_contexts_file:s0
269 /system/etc/selinux/plat_hwservice_contexts u:object_r:hwservice_contexts_file:s0
270 /system/etc/selinux/plat_file_contexts u:object_r:file_contexts_file:s0
271 /system/etc/selinux/plat_seapp_contexts u:object_r:seapp_contexts_file:s0
272 /system/etc/selinux/plat_sepolicy.cil u:object_r:sepolicy_file:s0
273 /system/etc/selinux/plat_and_mapping_sepolicy\.cil\.sha256 u:object_r:sepolicy_file:s0
299 /vendor/etc/selinux/nonplat_mac_permissions.xml u:object_r:mac_perms_file:s0
[all …]
/system/sepolicy/prebuilts/api/29.0/private/
Dfile_contexts306 /system/etc/selinux/mapping/[0-9]+\.[0-9]+\.cil u:object_r:sepolicy_file:s0
307 /system/etc/selinux/plat_mac_permissions\.xml u:object_r:mac_perms_file:s0
308 /system/etc/selinux/plat_property_contexts u:object_r:property_contexts_file:s0
309 /system/etc/selinux/plat_service_contexts u:object_r:service_contexts_file:s0
310 /system/etc/selinux/plat_hwservice_contexts u:object_r:hwservice_contexts_file:s0
311 /system/etc/selinux/plat_file_contexts u:object_r:file_contexts_file:s0
312 /system/etc/selinux/plat_seapp_contexts u:object_r:seapp_contexts_file:s0
313 /system/etc/selinux/plat_sepolicy\.cil u:object_r:sepolicy_file:s0
314 /system/etc/selinux/plat_and_mapping_sepolicy\.cil\.sha256 u:object_r:sepolicy_file:s0
383 /odm/etc/selinux/precompiled_sepolicy u:object_r:sepolicy_file:s0
[all …]
/system/core/logd/
DREADME.property4 ro.logd.auditd bool true Enable selinux audit daemon
5 ro.logd.auditd.dmesg bool true selinux audit messages sent to dmesg.
6 ro.logd.auditd.main bool true selinux audit messages sent to main.
7 ro.logd.auditd.events bool true selinux audit messages sent to events.
/system/sepolicy/prebuilts/api/26.0/private/
Dfile_contexts259 /system/etc/selinux/mapping/[0-9]+\.[0-9]+\.cil u:object_r:sepolicy_file:s0
260 /system/etc/selinux/plat_mac_permissions\.xml u:object_r:mac_perms_file:s0
261 /system/etc/selinux/plat_property_contexts u:object_r:property_contexts_file:s0
262 /system/etc/selinux/plat_service_contexts u:object_r:service_contexts_file:s0
263 /system/etc/selinux/plat_hwservice_contexts u:object_r:hwservice_contexts_file:s0
264 /system/etc/selinux/plat_file_contexts u:object_r:file_contexts_file:s0
265 /system/etc/selinux/plat_seapp_contexts u:object_r:seapp_contexts_file:s0
266 /system/etc/selinux/plat_sepolicy.cil u:object_r:sepolicy_file:s0
267 /system/etc/selinux/plat_and_mapping_sepolicy\.cil\.sha256 u:object_r:sepolicy_file:s0
292 /vendor/etc/selinux/nonplat_mac_permissions.xml u:object_r:mac_perms_file:s0
[all …]
/system/sepolicy/prebuilts/api/28.0/private/
Dfile_contexts280 /system/etc/selinux/mapping/[0-9]+\.[0-9]+\.cil u:object_r:sepolicy_file:s0
281 /system/etc/selinux/plat_mac_permissions\.xml u:object_r:mac_perms_file:s0
282 /system/etc/selinux/plat_property_contexts u:object_r:property_contexts_file:s0
283 /system/etc/selinux/plat_service_contexts u:object_r:service_contexts_file:s0
284 /system/etc/selinux/plat_hwservice_contexts u:object_r:hwservice_contexts_file:s0
285 /system/etc/selinux/plat_file_contexts u:object_r:file_contexts_file:s0
286 /system/etc/selinux/plat_seapp_contexts u:object_r:seapp_contexts_file:s0
287 /system/etc/selinux/plat_sepolicy.cil u:object_r:sepolicy_file:s0
288 /system/etc/selinux/plat_and_mapping_sepolicy\.cil\.sha256 u:object_r:sepolicy_file:s0
339 /odm/etc/selinux/precompiled_sepolicy u:object_r:sepolicy_file:s0
[all …]
/system/tools/aidl/tests/java_app/
DREADME10 5) Put selinux in permissive mode.
/system/iorap/
Diorapd.rc28 # Create directory for iorapd (see iorapd_data_file in selinux file_contexts).
/system/core/init/
DAndroid.mk59 selinux.cpp \

1234