/aosp12/system/sepolicy/ |
H A D | CleanSpec.mk | 67 $(call add-clean-step, rm -rf $(PRODUCT_OUT)/system/etc/selinux/plat_property_contexts) 70 $(call add-clean-step, rm -rf $(PRODUCT_OUT)/vendor/etc/selinux/mapping_sepolicy.cil) 73 $(call add-clean-step, rm -rf $(PRODUCT_OUT)/system/etc/selinux/mapping_sepolicy.cil) 78 $(call add-clean-step, rm -rf $(TARGET_OUT_VENDOR)/etc/selinux/nonplat_sepolicy.cil) 79 $(call add-clean-step, rm -rf $(TARGET_OUT_VENDOR)/etc/selinux/nonplat_file_contexts) 83 $(call add-clean-step, rm -rf $(TARGET_OUT_VENDOR)/etc/selinux/nonplat_seapp_contexts) 92 $(call add-clean-step, rm -rf $(TARGET_OUT_VENDOR)/etc/selinux/vendor_sepolicy.cil) 93 $(call add-clean-step, rm -rf $(TARGET_OUT_VENDOR)/etc/selinux/vendor_file_contexts) 97 $(call add-clean-step, rm -rf $(TARGET_OUT_VENDOR)/etc/selinux/vendor_seapp_contexts) 106 $(call add-clean-step, rm -rf $(TARGET_OUT_VENDOR)/etc/selinux/nonplat_sepolicy.cil) [all …]
|
H A D | seapp_contexts.mk | 8 LOCAL_MODULE_PATH := $(TARGET_OUT)/etc/selinux 31 LOCAL_MODULE_PATH := $(TARGET_OUT_SYSTEM_EXT)/etc/selinux 57 LOCAL_MODULE_PATH := $(TARGET_OUT_PRODUCT)/etc/selinux 83 LOCAL_MODULE_PATH := $(TARGET_OUT_VENDOR)/etc/selinux 109 LOCAL_MODULE_PATH := $(TARGET_OUT_ODM)/etc/selinux
|
H A D | mac_permissions.mk | 9 LOCAL_MODULE_PATH := $(TARGET_OUT)/etc/selinux 50 LOCAL_MODULE_PATH := $(TARGET_OUT_SYSTEM_EXT)/etc/selinux 84 LOCAL_MODULE_PATH := $(TARGET_OUT_PRODUCT)/etc/selinux 118 LOCAL_MODULE_PATH := $(TARGET_OUT_VENDOR)/etc/selinux 153 LOCAL_MODULE_PATH := $(TARGET_OUT_ODM)/etc/selinux
|
H A D | Android.mk | 817 LOCAL_MODULE_PATH := $(TARGET_OUT_VENDOR)/etc/selinux 882 LOCAL_MODULE_PATH := $(TARGET_OUT_ODM)/etc/selinux 949 LOCAL_MODULE_PATH := $(TARGET_OUT_ODM)/etc/selinux 951 LOCAL_MODULE_PATH := $(TARGET_OUT_VENDOR)/etc/selinux 958 $(TARGET_OUT)/etc/selinux/mapping/$(BOARD_SEPOLICY_VERS).cil \ 1021 $(TARGET_OUT)/etc/selinux/mapping/$(BOARD_SEPOLICY_VERS).cil \ 1232 LOCAL_MODULE_PATH := $(TARGET_OUT_VENDOR)/etc/selinux 1259 LOCAL_MODULE_PATH := $(TARGET_OUT_VENDOR)/etc/selinux 1295 all_fc_files := $(TARGET_OUT)/etc/selinux/plat_file_contexts 1296 all_fc_files += $(TARGET_OUT_VENDOR)/etc/selinux/vendor_file_contexts [all …]
|
H A D | Android.bp | 868 relative_install_path: "mapping", // install to /system/etc/selinux/mapping 877 relative_install_path: "mapping", // install to /system_ext/etc/selinux/mapping 887 relative_install_path: "mapping", // install to /product/etc/selinux/mapping 919 // See system/core/init/selinux.cpp for details. 932 relative_install_path: "selinux", 946 relative_install_path: "selinux", 961 relative_install_path: "selinux", 1000 relative_install_path: "selinux", 1012 relative_install_path: "selinux", 1024 relative_install_path: "selinux",
|
/aosp12/system/security/keystore2/src/ |
H A D | permission.rs | 30 use keystore2_selinux as selinux; 34 use selinux::Backend; 40 use selinux::getcon; 197 DELETE, selinux name: delete; 200 GRANT, selinux name: grant; 202 REBIND, selinux name: rebind; 204 UPDATE, selinux name: update; 205 USE, selinux name: use; 299 List = 8, selinux name: list; 560 selinux::check_access( in check_key_permission() [all …]
|
H A D | authorization.rs | 36 use keystore2_selinux as selinux; 96 None => match root_cause.downcast_ref::<selinux::Error>() { in map_or_log_err() 97 Some(selinux::Error::PermissionDenied) => ResponseCode::PERMISSION_DENIED.0, in map_or_log_err()
|
H A D | error.rs | 38 use keystore2_selinux as selinux; 222 None => match root_cause.downcast_ref::<selinux::Error>() { in get_error_code() 223 Some(selinux::Error::PermissionDenied) => ResponseCode::PERMISSION_DENIED.0, in get_error_code() 263 Err(anyhow!(selinux::Error::perm())).context("nested nexted selinux permission denied") in nested_nested_selinux_perm()
|
/aosp12/system/security/keystore2/selinux/src/ |
H A D | lib.rs | 26 pub use selinux::pid_t; 27 use selinux::SELABEL_CTX_ANDROID_KEYSTORE2_KEY; 28 use selinux::SELINUX_CB_LOG; 29 use selinux_bindgen as selinux; 54 let cb = selinux::selinux_callback { func_log: Some(selinux::selinux_log_callback) }; in redirect_selinux_logs_to_logcat() 122 unsafe { selinux::freecon(*p) }; in drop() 160 handle: *mut selinux::selabel_handle, 188 unsafe { selinux::selabel_close(self.handle) }; in drop() 236 match unsafe { selinux::getcon(&mut con) } { in getcon() 260 match unsafe { selinux::getpidcon(pid, &mut con) } { in getpidcon() [all …]
|
/aosp12/system/sepolicy/prebuilts/api/32.0/private/ |
H A D | file_contexts | 345 /system/etc/selinux/mapping/[0-9]+\.[0-9]+\.cil u:object_r:sepolicy_file:s0 346 /system/etc/selinux/plat_mac_permissions\.xml u:object_r:mac_perms_file:s0 347 /system/etc/selinux/plat_property_contexts u:object_r:property_contexts_file:s0 348 /system/etc/selinux/plat_service_contexts u:object_r:service_contexts_file:s0 349 /system/etc/selinux/plat_hwservice_contexts u:object_r:hwservice_contexts_file:s0 350 /system/etc/selinux/plat_keystore2_key_contexts u:object_r:keystore2_key_contexts_file:s0 351 /system/etc/selinux/plat_file_contexts u:object_r:file_contexts_file:s0 352 /system/etc/selinux/plat_seapp_contexts u:object_r:seapp_contexts_file:s0 353 /system/etc/selinux/plat_sepolicy\.cil u:object_r:sepolicy_file:s0 354 /system/etc/selinux/plat_and_mapping_sepolicy\.cil\.sha256 u:object_r:sepolicy_file:s0 [all …]
|
H A D | app.te | 26 # Apps can cause selinux denials by accessing CE storage 27 # and/or external storage. In either case, the selinux denial is 37 # Attempting to do so will be blocked by both selinux and unix
|
/aosp12/system/sepolicy/private/ |
H A D | file_contexts | 345 /system/etc/selinux/mapping/[0-9]+\.[0-9]+\.cil u:object_r:sepolicy_file:s0 346 /system/etc/selinux/plat_mac_permissions\.xml u:object_r:mac_perms_file:s0 347 /system/etc/selinux/plat_property_contexts u:object_r:property_contexts_file:s0 348 /system/etc/selinux/plat_service_contexts u:object_r:service_contexts_file:s0 349 /system/etc/selinux/plat_hwservice_contexts u:object_r:hwservice_contexts_file:s0 350 /system/etc/selinux/plat_keystore2_key_contexts u:object_r:keystore2_key_contexts_file:s0 351 /system/etc/selinux/plat_file_contexts u:object_r:file_contexts_file:s0 352 /system/etc/selinux/plat_seapp_contexts u:object_r:seapp_contexts_file:s0 353 /system/etc/selinux/plat_sepolicy\.cil u:object_r:sepolicy_file:s0 354 /system/etc/selinux/plat_and_mapping_sepolicy\.cil\.sha256 u:object_r:sepolicy_file:s0 [all …]
|
H A D | app.te | 26 # Apps can cause selinux denials by accessing CE storage 27 # and/or external storage. In either case, the selinux denial is 37 # Attempting to do so will be blocked by both selinux and unix
|
/aosp12/system/sepolicy/build/soong/ |
H A D | Android.bp | 24 name: "soong-selinux", 25 pkgPath: "android/soong/selinux", 39 "selinux.go",
|
/aosp12/packages/modules/Virtualization/microdroid/ |
H A D | microdroid_file_contexts | 340 /system/etc/selinux/mapping/[0-9]+\.[0-9]+\.cil u:object_r:sepolicy_file:s0 341 /system/etc/selinux/plat_mac_permissions\.xml u:object_r:mac_perms_file:s0 342 /system/etc/selinux/plat_property_contexts u:object_r:property_contexts_file:s0 343 /system/etc/selinux/plat_service_contexts u:object_r:service_contexts_file:s0 344 /system/etc/selinux/plat_hwservice_contexts u:object_r:hwservice_contexts_file:s0 345 /system/etc/selinux/plat_keystore2_key_contexts u:object_r:keystore2_key_contexts_file:s0 346 /system/etc/selinux/plat_file_contexts u:object_r:file_contexts_file:s0 347 /system/etc/selinux/plat_seapp_contexts u:object_r:seapp_contexts_file:s0 348 /system/etc/selinux/plat_sepolicy\.cil u:object_r:sepolicy_file:s0 349 /system/etc/selinux/plat_and_mapping_sepolicy\.cil\.sha256 u:object_r:sepolicy_file:s0 [all …]
|
H A D | microdroid_vendor_file_contexts | 32 /etc/selinux/nonplat_service_contexts u:object_r:nonplat_service_contexts_file:s0 34 /etc/selinux/vendor_service_contexts u:object_r:vendor_service_contexts_file:s0
|
/aosp12/system/sepolicy/prebuilts/api/31.0/private/ |
H A D | file_contexts | 345 /system/etc/selinux/mapping/[0-9]+\.[0-9]+\.cil u:object_r:sepolicy_file:s0 346 /system/etc/selinux/plat_mac_permissions\.xml u:object_r:mac_perms_file:s0 347 /system/etc/selinux/plat_property_contexts u:object_r:property_contexts_file:s0 348 /system/etc/selinux/plat_service_contexts u:object_r:service_contexts_file:s0 349 /system/etc/selinux/plat_hwservice_contexts u:object_r:hwservice_contexts_file:s0 350 /system/etc/selinux/plat_keystore2_key_contexts u:object_r:keystore2_key_contexts_file:s0 351 /system/etc/selinux/plat_file_contexts u:object_r:file_contexts_file:s0 352 /system/etc/selinux/plat_seapp_contexts u:object_r:seapp_contexts_file:s0 353 /system/etc/selinux/plat_sepolicy\.cil u:object_r:sepolicy_file:s0 354 /system/etc/selinux/plat_and_mapping_sepolicy\.cil\.sha256 u:object_r:sepolicy_file:s0 [all …]
|
H A D | app.te | 25 # Apps can cause selinux denials by accessing CE storage 26 # and/or external storage. In either case, the selinux denial is 36 # Attempting to do so will be blocked by both selinux and unix
|
/aosp12/system/sepolicy/prebuilts/api/30.0/private/ |
H A D | file_contexts | 324 /system/etc/selinux/mapping/[0-9]+\.[0-9]+\.cil u:object_r:sepolicy_file:s0 325 /system/etc/selinux/plat_mac_permissions\.xml u:object_r:mac_perms_file:s0 326 /system/etc/selinux/plat_property_contexts u:object_r:property_contexts_file:s0 327 /system/etc/selinux/plat_service_contexts u:object_r:service_contexts_file:s0 328 /system/etc/selinux/plat_hwservice_contexts u:object_r:hwservice_contexts_file:s0 329 /system/etc/selinux/plat_file_contexts u:object_r:file_contexts_file:s0 330 /system/etc/selinux/plat_seapp_contexts u:object_r:seapp_contexts_file:s0 331 /system/etc/selinux/plat_sepolicy\.cil u:object_r:sepolicy_file:s0 332 /system/etc/selinux/plat_and_mapping_sepolicy\.cil\.sha256 u:object_r:sepolicy_file:s0 411 /odm/etc/selinux/precompiled_sepolicy u:object_r:sepolicy_file:s0 [all …]
|
H A D | app.te | 8 # Apps can cause selinux denials by accessing CE storage 9 # and/or external storage. In either case, the selinux denial is 19 # Attempting to do so will be blocked by both selinux and unix
|
/aosp12/system/sepolicy/prebuilts/api/27.0/private/ |
H A D | file_contexts | 266 /system/etc/selinux/plat_mac_permissions\.xml u:object_r:mac_perms_file:s0 267 /system/etc/selinux/plat_property_contexts u:object_r:property_contexts_file:s0 268 /system/etc/selinux/plat_service_contexts u:object_r:service_contexts_file:s0 270 /system/etc/selinux/plat_file_contexts u:object_r:file_contexts_file:s0 271 /system/etc/selinux/plat_seapp_contexts u:object_r:seapp_contexts_file:s0 272 /system/etc/selinux/plat_sepolicy.cil u:object_r:sepolicy_file:s0 299 /vendor/etc/selinux/nonplat_mac_permissions.xml u:object_r:mac_perms_file:s0 303 /vendor/etc/selinux/nonplat_file_contexts u:object_r:file_contexts_file:s0 304 /vendor/etc/selinux/nonplat_seapp_contexts u:object_r:seapp_contexts_file:s0 305 /vendor/etc/selinux/nonplat_sepolicy.cil u:object_r:sepolicy_file:s0 [all …]
|
/aosp12/system/sepolicy/prebuilts/api/29.0/private/ |
H A D | file_contexts | 306 /system/etc/selinux/mapping/[0-9]+\.[0-9]+\.cil u:object_r:sepolicy_file:s0 307 /system/etc/selinux/plat_mac_permissions\.xml u:object_r:mac_perms_file:s0 308 /system/etc/selinux/plat_property_contexts u:object_r:property_contexts_file:s0 309 /system/etc/selinux/plat_service_contexts u:object_r:service_contexts_file:s0 310 /system/etc/selinux/plat_hwservice_contexts u:object_r:hwservice_contexts_file:s0 311 /system/etc/selinux/plat_file_contexts u:object_r:file_contexts_file:s0 312 /system/etc/selinux/plat_seapp_contexts u:object_r:seapp_contexts_file:s0 313 /system/etc/selinux/plat_sepolicy\.cil u:object_r:sepolicy_file:s0 314 /system/etc/selinux/plat_and_mapping_sepolicy\.cil\.sha256 u:object_r:sepolicy_file:s0 383 /odm/etc/selinux/precompiled_sepolicy u:object_r:sepolicy_file:s0 [all …]
|
/aosp12/system/sepolicy/prebuilts/api/26.0/private/ |
H A D | file_contexts | 260 /system/etc/selinux/plat_mac_permissions\.xml u:object_r:mac_perms_file:s0 261 /system/etc/selinux/plat_property_contexts u:object_r:property_contexts_file:s0 262 /system/etc/selinux/plat_service_contexts u:object_r:service_contexts_file:s0 264 /system/etc/selinux/plat_file_contexts u:object_r:file_contexts_file:s0 265 /system/etc/selinux/plat_seapp_contexts u:object_r:seapp_contexts_file:s0 266 /system/etc/selinux/plat_sepolicy.cil u:object_r:sepolicy_file:s0 292 /vendor/etc/selinux/nonplat_mac_permissions.xml u:object_r:mac_perms_file:s0 296 /vendor/etc/selinux/nonplat_file_contexts u:object_r:file_contexts_file:s0 297 /vendor/etc/selinux/nonplat_seapp_contexts u:object_r:seapp_contexts_file:s0 298 /vendor/etc/selinux/nonplat_sepolicy.cil u:object_r:sepolicy_file:s0 [all …]
|
/aosp12/system/sepolicy/prebuilts/api/28.0/private/ |
H A D | file_contexts | 280 /system/etc/selinux/mapping/[0-9]+\.[0-9]+\.cil u:object_r:sepolicy_file:s0 281 /system/etc/selinux/plat_mac_permissions\.xml u:object_r:mac_perms_file:s0 282 /system/etc/selinux/plat_property_contexts u:object_r:property_contexts_file:s0 283 /system/etc/selinux/plat_service_contexts u:object_r:service_contexts_file:s0 284 /system/etc/selinux/plat_hwservice_contexts u:object_r:hwservice_contexts_file:s0 285 /system/etc/selinux/plat_file_contexts u:object_r:file_contexts_file:s0 286 /system/etc/selinux/plat_seapp_contexts u:object_r:seapp_contexts_file:s0 287 /system/etc/selinux/plat_sepolicy.cil u:object_r:sepolicy_file:s0 288 /system/etc/selinux/plat_and_mapping_sepolicy\.cil\.sha256 u:object_r:sepolicy_file:s0 339 /odm/etc/selinux/precompiled_sepolicy u:object_r:sepolicy_file:s0 [all …]
|
/aosp12/system/logging/logd/ |
H A D | README.property | 4 ro.logd.auditd bool true Enable selinux audit daemon 5 ro.logd.auditd.dmesg bool true selinux audit messages sent to dmesg. 6 ro.logd.auditd.main bool true selinux audit messages sent to main. 7 ro.logd.auditd.events bool true selinux audit messages sent to events.
|