Home
last modified time | relevance | path

Searched refs:unconfined (Results 1 – 25 of 132) sorted by relevance

123456

/external/selinux/secilc/docs/
Dcil_network_labeling_statements.md47 (context netlabel_1 (system.user object_r unconfined.object low_low)
96 (context context_1 (unconfined.user object_r unconfined.object low_low))
97 (context context_2 (unconfined.user object_r unconfined.object (systemlow level_2)))
99 (netifcon eth0 context_1 (unconfined.user object_r unconfined.object levelrange_1))
100 (netifcon eth1 context_1 (unconfined.user object_r unconfined.object ((s0) level_1)))
145 (context context_1 (unconfined.user object_r unconfined.object low_low))
146 (context context_2 (unconfined.user object_r unconfined.object (systemlow level_2)))
153 (nodecon netmask_1 (192.168.1.64) (unconfined.user object_r unconfined.object ((s0) (s0 (c0)))))
197 (portcon tcp 1111 (unconfined.user object_r unconfined.object ((s0) (s0 (c0)))))
198 (portcon tcp 2222 (unconfined.user object_r unconfined.object levelrange_2))
[all …]
Dcil_xen_statements.md46 (iomemcon (1043424 1043455) (unconfined.user object_r unconfined.object low_low))
86 (ioportcon 60608 (unconfined.user object_r unconfined.object low_low))
124 (pcidevicecon 51200 (unconfined.user object_r unconfined.object low_low))
162 (pirqcon 33 (unconfined.user object_r unconfined.object low_low))
200 (devicetreecon "/this is/a/path" (unconfined.user object_r unconfined.object low_low))
Dcil_user_statements.md34 This will declare an SELinux user as `unconfined.user`:
36 (block unconfined
74 This example will associate `unconfined.user` to `unconfined.role`:
76 (block unconfined
210 This example will associate `unconfined.user` with a named [`level`](cil_mls_labeling_statements.md…
215 (block unconfined
256 This example will associate `unconfined.user` with a named [`levelrange`](cil_mls_labeling_statemen…
269 (block unconfined
321 The user `test` cannot have greater privileges than `unconfined.user`:
325 (unconfined
[all …]
Dcil_role_statements.md34 This example declares two roles: `object_r` in the global namespace and `unconfined.role`:
38 (block unconfined
78 (block unconfined
262 This example will authorise the `unconfined.role` to assume the `msg_filter.role` role, and then tr…
269 (roleallow unconfined.role msg_filter.role)
270 (roletransition unconfined.role exec process msg_filter.role)
313 In this example the role `test` cannot have greater privileges than `unconfined.role`:
317 (unconfined
Dcil_type_statements.md106 This example will alias `unconfined.process` as `unconfined_t` in the global namespace:
109 (typealiasactual unconfined_t unconfined.process)
111 (block unconfined
317 ` scon=unconfined.object tcon=unconfined.object class=file`
321 ` unconfined.object:object_r:unconfined.change_label:s0`
325 (block unconfined
377 ` scon=unconfined.object tcon=unconfined.object class=file`
381 ` unconfined.object:object_r:unconfined.member_label:s0`
385 (block unconfined
Dcil_constraint_statements.md66 ;; (( t1 == unconfined.process ) and ( t2 == unconfined.object ) or ( r1 eq r2 ));
70 (eq t1 unconfined.process)
71 (eq t2 unconfined.object)
78 ;; (not( t1 == unconfined.process ) and ( t2 == unconfined.object ) or ( r1 eq r2 ));
83 (eq t1 unconfined.process)
84 (eq t2 unconfined.object)
156 ; validatetrans { file } ( t1 == unconfined.process );
158 (validatetrans file (eq t1 unconfined.process))
Dcil_class_and_permission_statements.md296 (allow unconfined.process test_1 zygote_1)
297 ;; allow unconfined.process test_1 : zygote { specifyids specifyrlimits specifycapabilities } ;
307 (allow unconfined.process test_2 zygote_2)
308 ;; allow unconfined.process test_2 : zygote { specifyids specifyrlimits specifycapabilities } ;
313 (allow unconfined.process test_3 zygote_3)
314 ;; allow unconfined.process test_3 : zygote { specifyinvokewith specifyseinfo } ;
323 (allow unconfined.process test_5 zygote_all_perms)
324 …;; allow unconfined.process test_5 : zygote { specifyids specifyrlimits specifycapabilities specif…
Dcil_call_macro_statements.md112 (block unconfined
124 (context netlabel_1 (system.user object_r unconfined.object low_low)
Dcil_reference_guide.md68 (block unconfined
75 (portcon udp 12345 (unconfined.user object_r unconfined.object ((s0) (s0(c0)))))
298 (allow unconfined.process self (file (read write)))
Dcil_mls_labeling_statements.md510 (sidcontext kernel unconfined.context_1)
559 (context context_2 (unconfined.user object_r unconfined.object (level_1 level_3)))
564 (block unconfined
583 ) ; End unconfined namespace
/external/selinux/python/sepolicy/sepolicy/help/
Dlockdown_unconfined.txt4 …re unconfined by SELinux. Other similar processes which do not have SELinux Policy written for th…
6 Disabling the unconfined module will leave certain unconfined domains running on your system, speci…
9 Note if you disable the unconfined module, you may see an increase in the denials, and if you have …
/external/kotlinx.coroutines/kotlinx-coroutines-core/common/src/
DEventLoop.common.kt94 get() = useCount >= delta(unconfined = true) in <lambda>()
100 private fun delta(unconfined: Boolean) = in <lambda>()
101 if (unconfined) (1L shl 32) else 1L in <lambda>()
103 fun incrementUseCount(unconfined: Boolean = false) { in <lambda>()
104 useCount += delta(unconfined) in <lambda>()
105 if (!unconfined) shared = true in <lambda>()
108 fun decrementUseCount(unconfined: Boolean = false) { in <lambda>()
109 useCount -= delta(unconfined) in <lambda>()
/external/kotlinx.coroutines/benchmarks/src/jmh/kotlin/benchmarks/
DChannelSinkBenchmark.kt23 private val unconfined = Dispatchers.Unconfined in <lambda>() constant in benchmarks.ChannelSinkBenchmark
29 run(unconfined) in <lambda>()
/external/kotlinx.coroutines/kotlinx-coroutines-core/common/src/internal/
DDispatchedTask.kt199 eventLoop.incrementUseCount(unconfined = true) in runUnconfinedEventLoop()
213 eventLoop.decrementUseCount(unconfined = true) in runUnconfinedEventLoop()
/external/bcc/snapcraft/
DREADME.md3 This is an unconfined snap of the BPF Compiler Collection (BCC), a toolkit for
/external/kotlinx.coroutines/
Dcoroutines-guide.md34 …* <a name='unconfined-vs-confined-dispatcher'></a>[Unconfined vs confined dispatcher](docs/corouti…
/external/selinux/policycoreutils/po/
Dmn.po2867 msgid "Allow openvpn to run unconfined scripts"
2996 msgid "Allow samba to run unconfined scripts"
3050 "Allow unconfined executables to make their heap memory executable. Doing "
3057 "Allow all unconfined executables to use libraries requiring text relocation "
3063 "Allow unconfined executables to make their stack executable. This should "
3217 "allow unconfined users to transition to the chrome sandbox domains when "
3222 msgid "Allow a user to login as an unconfined domain"
3227 "Allow unconfined users to transition to the Mozilla plugin domain when "
4363 "An unconfined domain is a process label that allows the process to do what "
4366 "unconfined if this module is enabled. Disabling it means all daemons will "
[all …]
Daf.po2867 msgid "Allow openvpn to run unconfined scripts"
2996 msgid "Allow samba to run unconfined scripts"
3050 "Allow unconfined executables to make their heap memory executable. Doing "
3057 "Allow all unconfined executables to use libraries requiring text relocation "
3063 "Allow unconfined executables to make their stack executable. This should "
3217 "allow unconfined users to transition to the chrome sandbox domains when "
3222 msgid "Allow a user to login as an unconfined domain"
3227 "Allow unconfined users to transition to the Mozilla plugin domain when "
4363 "An unconfined domain is a process label that allows the process to do what "
4366 "unconfined if this module is enabled. Disabling it means all daemons will "
[all …]
Dsi_LK.po2867 msgid "Allow openvpn to run unconfined scripts"
2996 msgid "Allow samba to run unconfined scripts"
3050 "Allow unconfined executables to make their heap memory executable. Doing "
3057 "Allow all unconfined executables to use libraries requiring text relocation "
3063 "Allow unconfined executables to make their stack executable. This should "
3217 "allow unconfined users to transition to the chrome sandbox domains when "
3222 msgid "Allow a user to login as an unconfined domain"
3227 "Allow unconfined users to transition to the Mozilla plugin domain when "
4363 "An unconfined domain is a process label that allows the process to do what "
4366 "unconfined if this module is enabled. Disabling it means all daemons will "
[all …]
Dka.po2867 msgid "Allow openvpn to run unconfined scripts"
2996 msgid "Allow samba to run unconfined scripts"
3050 "Allow unconfined executables to make their heap memory executable. Doing "
3057 "Allow all unconfined executables to use libraries requiring text relocation "
3063 "Allow unconfined executables to make their stack executable. This should "
3217 "allow unconfined users to transition to the chrome sandbox domains when "
3222 msgid "Allow a user to login as an unconfined domain"
3227 "Allow unconfined users to transition to the Mozilla plugin domain when "
4363 "An unconfined domain is a process label that allows the process to do what "
4366 "unconfined if this module is enabled. Disabling it means all daemons will "
[all …]
Dky.po2867 msgid "Allow openvpn to run unconfined scripts"
2996 msgid "Allow samba to run unconfined scripts"
3050 "Allow unconfined executables to make their heap memory executable. Doing "
3057 "Allow all unconfined executables to use libraries requiring text relocation "
3063 "Allow unconfined executables to make their stack executable. This should "
3217 "allow unconfined users to transition to the chrome sandbox domains when "
3222 msgid "Allow a user to login as an unconfined domain"
3227 "Allow unconfined users to transition to the Mozilla plugin domain when "
4363 "An unconfined domain is a process label that allows the process to do what "
4366 "unconfined if this module is enabled. Disabling it means all daemons will "
[all …]
Dwo.po2867 msgid "Allow openvpn to run unconfined scripts"
2996 msgid "Allow samba to run unconfined scripts"
3050 "Allow unconfined executables to make their heap memory executable. Doing "
3057 "Allow all unconfined executables to use libraries requiring text relocation "
3063 "Allow unconfined executables to make their stack executable. This should "
3217 "allow unconfined users to transition to the chrome sandbox domains when "
3222 msgid "Allow a user to login as an unconfined domain"
3227 "Allow unconfined users to transition to the Mozilla plugin domain when "
4363 "An unconfined domain is a process label that allows the process to do what "
4366 "unconfined if this module is enabled. Disabling it means all daemons will "
[all …]
Dnds.po2866 msgid "Allow openvpn to run unconfined scripts"
2995 msgid "Allow samba to run unconfined scripts"
3049 "Allow unconfined executables to make their heap memory executable. Doing "
3056 "Allow all unconfined executables to use libraries requiring text relocation "
3062 "Allow unconfined executables to make their stack executable. This should "
3216 "allow unconfined users to transition to the chrome sandbox domains when "
3221 msgid "Allow a user to login as an unconfined domain"
3226 "Allow unconfined users to transition to the Mozilla plugin domain when "
4362 "An unconfined domain is a process label that allows the process to do what "
4365 "unconfined if this module is enabled. Disabling it means all daemons will "
[all …]
Dtg.po2867 msgid "Allow openvpn to run unconfined scripts"
2996 msgid "Allow samba to run unconfined scripts"
3050 "Allow unconfined executables to make their heap memory executable. Doing "
3057 "Allow all unconfined executables to use libraries requiring text relocation "
3063 "Allow unconfined executables to make their stack executable. This should "
3217 "allow unconfined users to transition to the chrome sandbox domains when "
3222 msgid "Allow a user to login as an unconfined domain"
3227 "Allow unconfined users to transition to the Mozilla plugin domain when "
4363 "An unconfined domain is a process label that allows the process to do what "
4366 "unconfined if this module is enabled. Disabling it means all daemons will "
[all …]
Dlv_LV.po2868 msgid "Allow openvpn to run unconfined scripts"
2997 msgid "Allow samba to run unconfined scripts"
3051 "Allow unconfined executables to make their heap memory executable. Doing "
3058 "Allow all unconfined executables to use libraries requiring text relocation "
3064 "Allow unconfined executables to make their stack executable. This should "
3218 "allow unconfined users to transition to the chrome sandbox domains when "
3223 msgid "Allow a user to login as an unconfined domain"
3228 "Allow unconfined users to transition to the Mozilla plugin domain when "
4364 "An unconfined domain is a process label that allows the process to do what "
4367 "unconfined if this module is enabled. Disabling it means all daemons will "
[all …]

123456