Searched refs:sepolicy (Results 1 – 25 of 47) sorted by relevance
12
/system/sepolicy/tools/ |
D | checkfc.c | 43 } sepolicy; member 93 int bit_pos = get_attr_bit(global_state.sepolicy.pdb, *attributes); in ebitmap_attribute_assertion_init() 159 int rc = sepol_context_from_string(global_state.sepolicy.handle, context, in validate() 166 rc = sepol_context_check(global_state.sepolicy.handle, in validate() 167 global_state.sepolicy.sdb, ctx); in validate() 176 res = !is_type_of_attribute_set(global_state.sepolicy.pdb, type_name, in validate() 213 if (global_state.sepolicy.file) { in cleanup() 214 fclose(global_state.sepolicy.file); in cleanup() 217 if (global_state.sepolicy.sdb) { in cleanup() 218 sepol_policydb_free(global_state.sepolicy.sdb); in cleanup() [all …]
|
D | README | 18 build to validate both files. Requires the sepolicy file as an 23 checkfc sepolicy file_contexts 24 checkfc -p sepolicy property_contexts 43 checkseapp -p sepolicy input_seapp_contexts0 [input_seapp_contexts1...] -o seapp_contexts 48 script is described further in the top-level sepolicy/README. 63 sepolicy-check 64 A tool for auditing a sepolicy file for any allow rule that grants 68 …sepolicy-check -s <domain> -t <type> -c <class> -p <permission> -P out/target/product/<board>/root… 70 sepolicy-analyze 71 A tool for performing various kinds of analysis on a sepolicy
|
D | Android.bp | 43 name: "sepolicy-check", 45 srcs: ["sepolicy-check.c"],
|
D | build_policies.sh | 78 OUT_DIR=$out_dir/out.$target mmma -j$mmma_jobs system/sepolicy &>> $my_out_file
|
/system/sepolicy/tools/sepolicy-analyze/ |
D | README | 1 sepolicy-analyze 3 sepolicy file. The current kinds of analysis that are currently 7 sepolicy-analyze out/target/product/<board>/root/sepolicy typecmp -e 28 sepolicy-analyze out/target/product/<board>/root/sepolicy typecmp -d 35 sepolicy-analyze out/target/product/<board>/root/sepolicy dups 49 sepolicy-analyze out/target/product/<board>/root/sepolicy permissive 57 sepolicy-analyze out/target/product/<board>/root/sepolicy booleans 64 sepolicy-analyze out/target/product/<board>/root/sepolicy attribute <name> 68 sepolicy-analyze out/target/product/<board>/root/sepolicy attribute -r <name> 72 sepolicy-analyze out/target/product/<board>/root/sepolicy attribute -l [all …]
|
D | Android.bp | 2 name: "sepolicy-analyze", 6 "sepolicy-analyze.c",
|
/system/sepolicy/ |
D | Android.mk | 290 sepolicy \ 483 $(HOST_OUT_EXECUTABLES)/checkpolicy $(HOST_OUT_EXECUTABLES)/sepolicy-analyze 487 $(hide) $(HOST_OUT_EXECUTABLES)/sepolicy-analyze $@.tmp neverallow -w -f $(PRIVATE_SEPOLICY_2) || \ 1244 LOCAL_MODULE := sepolicy 1279 $(LOCAL_BUILT_MODULE): $(HOST_OUT_EXECUTABLES)/secilc $(HOST_OUT_EXECUTABLES)/sepolicy-analyze $(al… 1283 $(hide) $(HOST_OUT_EXECUTABLES)/sepolicy-analyze $@.tmp permissive > $@.permissivedomains 1302 LOCAL_MODULE := sepolicy.recovery 1303 LOCAL_MODULE_STEM := sepolicy 1316 sepolicy.recovery.conf := $(intermediates)/sepolicy.recovery.conf 1317 $(sepolicy.recovery.conf): PRIVATE_MLS_SENS := $(MLS_SENS) [all …]
|
D | compat.mk | 42 $(LOCAL_BUILT_MODULE): $(HOST_OUT_EXECUTABLES)/secilc $(HOST_OUT_EXECUTABLES)/sepolicy-analyze $(al…
|
D | NOTICE | 1 This configuration (sepolicy) is public domain, i.e. not copyrighted.
|
D | README | 4 separate device/<vendor>/<board>/sepolicy subdirectory and linked 35 BOARD_VENDOR_SEPOLICY_DIRS += device/samsung/tuna/sepolicy
|
/system/sepolicy/prebuilts/api/28.0/public/ |
D | toolbox.te | 17 # device/<vendor>/<product>/sepolicy/file_contexts file.
|
D | postinstall.te | 3 # files needed by the specific device on your device's sepolicy directory.
|
/system/sepolicy/prebuilts/api/27.0/public/ |
D | toolbox.te | 17 # device/<vendor>/<product>/sepolicy/file_contexts file.
|
D | postinstall.te | 3 # files needed by the specific device on your device's sepolicy directory.
|
/system/sepolicy/prebuilts/api/26.0/public/ |
D | toolbox.te | 17 # device/<vendor>/<product>/sepolicy/file_contexts file.
|
D | postinstall.te | 3 # files needed by the specific device on your device's sepolicy directory.
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | toolbox.te | 17 # device/<vendor>/<product>/sepolicy/file_contexts file.
|
D | postinstall.te | 3 # files needed by the specific device on your device's sepolicy directory.
|
/system/sepolicy/public/ |
D | toolbox.te | 17 # device/<vendor>/<product>/sepolicy/file_contexts file.
|
D | postinstall.te | 3 # files needed by the specific device on your device's sepolicy directory.
|
/system/core/init/ |
D | Android.mk | 5 -include system/sepolicy/policy_version.mk
|
/system/sepolicy/prebuilts/api/30.0/public/ |
D | toolbox.te | 17 # device/<vendor>/<product>/sepolicy/file_contexts file.
|
D | postinstall.te | 3 # files needed by the specific device on your device's sepolicy directory.
|
/system/tools/aidl/tests/lazy_test/ |
D | README | 68 In system/sepolicy
|
/system/sepolicy/private/ |
D | isolated_app.te | 137 # List taken from system/sepolicy/public/global_macros - socket_class_set
|
12