Home
last modified time | relevance | path

Searched refs:semodule (Results 1 – 11 of 11) sorted by relevance

/external/selinux/policycoreutils/semodule/
DMakefile11 SEMODULE_OBJS = semodule.o
13 all: semodule genhomedircon
15 semodule: $(SEMODULE_OBJS) target
19 ln -sf semodule genhomedircon
23 install -m 755 semodule $(SBINDIR)
24 (cd $(SBINDIR); ln -sf semodule genhomedircon)
26 install -m 644 semodule.8 $(MANDIR)/man8/
32 -rm -f semodule *.o genhomedircon
/external/selinux/policycoreutils/po/
DPOTFILES10 ../semodule/semodule.c
43 ../gui/templates/semodule.py
66 ../sepolicy/sepolicy/templates/semodule.py
DPOTFILES.in10 semodule/semodule.c
54 sepolicy/sepolicy/templates/semodule.py
DMakefile36 ../semodule/semodule.c \
80 ../sepolicy/sepolicy/templates/semodule.py \
/external/selinux/policycoreutils/
D.gitignore7 semodule/semodule
DChangeLog20 * Add a store root path in semodule, from Yuli Khodorkovskiy
27 * Deprecate base/upgrade/version in semodule. Calling these commands will
37 * Add -P semodule option to man page from Dan Walsh.
105 * Replace genhomedircon script with a link to semodule from Dan Walsh.
176 * semodule: Add -N qualifier to no reload kernel policy
260 * semodule: Document semodule -p in man page
339 * semodule: support for alternative root paths
425 * Change semodule upgrade behavior to install even if the module
461 * Re-enable disable_dontaudit rules upon semodule -B from Christopher
490 * semodule: use new interfaces in libsemanage for compressed files
[all …]
DMakefile1 …cy newrole run_init sandbox secon audit2allow sestatus semodule_package semodule semodule_link sem…
/external/selinux/libsemanage/
DChangeLog24 * Add semodule option to set store root path in semanage.conf and the
25 semodule command, from Yuli Khodorkovskiy
152 * Change semodule upgrade behavior to install even if the module
218 using semodule from Joshua Brindle.
/external/selinux/sepolgen/tests/test_data/
Dhttpd.log6973 …37.513:12841): avc: denied { execute } for pid=13625 comm="sh" name="semodule" dev=dm-0 ino=103…
6975 …76437.513:12842): avc: denied { read } for pid=13625 comm="sh" name="semodule" dev=dm-0 ino=103…
6977 …843): avc: denied { execute_no_trans } for pid=13626 comm="sh" name="semodule" dev=dm-0 ino=103…
6978 … euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="semodule" exe="/usr/sbin/semodule" sub…
6979 type=AVC_PATH msg=audit(1163776437.513:12843): path="/usr/sbin/semodule"
6980 type=AVC msg=audit(1163776437.553:12844): avc: denied { execute } for pid=13626 comm="semodule" …
6981 … euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="semodule" exe="/usr/sbin/semodule" sub…
6982 …37.605:12845): avc: denied { read write search } for pid=13626 comm="semodule" name="active" de…
6983 … euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="semodule" exe="/usr/sbin/semodule" sub…
6984 …37.625:12846): avc: denied { read write search } for pid=13626 comm="semodule" name="modules" d…
[all …]
/external/selinux/policycoreutils/sepolicy/sepolicy/
Dgui.py1109 …for semodule, button in [ ("unconfined", self.disable_unconfined_button), ("permissivedomains", se…
1110 if semodule in self.cust_dict["module"]:
1111 button.set_active(self.cust_dict["module"][semodule]["enabled"])
/external/selinux/libsepol/
DChangeLog85 * Preserve tunables when required by semodule program.