Searched refs:unconfined (Results 1 – 25 of 132) sorted by relevance
123456
47 (context netlabel_1 (system.user object_r unconfined.object low_low)96 (context context_1 (unconfined.user object_r unconfined.object low_low))97 (context context_2 (unconfined.user object_r unconfined.object (systemlow level_2)))99 (netifcon eth0 context_1 (unconfined.user object_r unconfined.object levelrange_1))100 (netifcon eth1 context_1 (unconfined.user object_r unconfined.object ((s0) level_1)))145 (context context_1 (unconfined.user object_r unconfined.object low_low))146 (context context_2 (unconfined.user object_r unconfined.object (systemlow level_2)))153 (nodecon netmask_1 (192.168.1.64) (unconfined.user object_r unconfined.object ((s0) (s0 (c0)))))197 (portcon tcp 1111 (unconfined.user object_r unconfined.object ((s0) (s0 (c0)))))198 (portcon tcp 2222 (unconfined.user object_r unconfined.object levelrange_2))[all …]
46 (iomemcon (1043424 1043455) (unconfined.user object_r unconfined.object low_low))86 (ioportcon 60608 (unconfined.user object_r unconfined.object low_low))124 (pcidevicecon 51200 (unconfined.user object_r unconfined.object low_low))162 (pirqcon 33 (unconfined.user object_r unconfined.object low_low))200 (devicetreecon "/this is/a/path" (unconfined.user object_r unconfined.object low_low))
34 This will declare an SELinux user as `unconfined.user`:36 (block unconfined74 This example will associate `unconfined.user` to `unconfined.role`:76 (block unconfined210 This example will associate `unconfined.user` with a named [`level`](cil_mls_labeling_statements.md…215 (block unconfined256 This example will associate `unconfined.user` with a named [`levelrange`](cil_mls_labeling_statemen…269 (block unconfined321 The user `test` cannot have greater privileges than `unconfined.user`:325 (unconfined[all …]
34 This example declares two roles: `object_r` in the global namespace and `unconfined.role`:38 (block unconfined78 (block unconfined262 This example will authorise the `unconfined.role` to assume the `msg_filter.role` role, and then tr…269 (roleallow unconfined.role msg_filter.role)270 (roletransition unconfined.role exec process msg_filter.role)313 In this example the role `test` cannot have greater privileges than `unconfined.role`:317 (unconfined
106 This example will alias `unconfined.process` as `unconfined_t` in the global namespace:109 (typealiasactual unconfined_t unconfined.process)111 (block unconfined317 ` scon=unconfined.object tcon=unconfined.object class=file`321 ` unconfined.object:object_r:unconfined.change_label:s0`325 (block unconfined377 ` scon=unconfined.object tcon=unconfined.object class=file`381 ` unconfined.object:object_r:unconfined.member_label:s0`385 (block unconfined
66 ;; (( t1 == unconfined.process ) and ( t2 == unconfined.object ) or ( r1 eq r2 ));70 (eq t1 unconfined.process)71 (eq t2 unconfined.object)78 ;; (not( t1 == unconfined.process ) and ( t2 == unconfined.object ) or ( r1 eq r2 ));83 (eq t1 unconfined.process)84 (eq t2 unconfined.object)156 ; validatetrans { file } ( t1 == unconfined.process );158 (validatetrans file (eq t1 unconfined.process))
296 (allow unconfined.process test_1 zygote_1)297 ;; allow unconfined.process test_1 : zygote { specifyids specifyrlimits specifycapabilities } ;307 (allow unconfined.process test_2 zygote_2)308 ;; allow unconfined.process test_2 : zygote { specifyids specifyrlimits specifycapabilities } ;313 (allow unconfined.process test_3 zygote_3)314 ;; allow unconfined.process test_3 : zygote { specifyinvokewith specifyseinfo } ;323 (allow unconfined.process test_5 zygote_all_perms)324 …;; allow unconfined.process test_5 : zygote { specifyids specifyrlimits specifycapabilities specif…
112 (block unconfined124 (context netlabel_1 (system.user object_r unconfined.object low_low)
68 (block unconfined75 (portcon udp 12345 (unconfined.user object_r unconfined.object ((s0) (s0(c0)))))298 (allow unconfined.process self (file (read write)))
510 (sidcontext kernel unconfined.context_1)559 (context context_2 (unconfined.user object_r unconfined.object (level_1 level_3)))564 (block unconfined583 ) ; End unconfined namespace
4 …re unconfined by SELinux. Other similar processes which do not have SELinux Policy written for th…6 Disabling the unconfined module will leave certain unconfined domains running on your system, speci…9 Note if you disable the unconfined module, you may see an increase in the denials, and if you have …
94 get() = useCount >= delta(unconfined = true) in <lambda>()100 private fun delta(unconfined: Boolean) = in <lambda>()101 if (unconfined) (1L shl 32) else 1L in <lambda>()103 fun incrementUseCount(unconfined: Boolean = false) { in <lambda>()104 useCount += delta(unconfined) in <lambda>()105 if (!unconfined) shared = true in <lambda>()108 fun decrementUseCount(unconfined: Boolean = false) { in <lambda>()109 useCount -= delta(unconfined) in <lambda>()
23 private val unconfined = Dispatchers.Unconfined in <lambda>() constant in benchmarks.ChannelSinkBenchmark29 run(unconfined) in <lambda>()
199 eventLoop.incrementUseCount(unconfined = true) in runUnconfinedEventLoop()213 eventLoop.decrementUseCount(unconfined = true) in runUnconfinedEventLoop()
3 This is an unconfined snap of the BPF Compiler Collection (BCC), a toolkit for
34 …* <a name='unconfined-vs-confined-dispatcher'></a>[Unconfined vs confined dispatcher](docs/corouti…
2867 msgid "Allow openvpn to run unconfined scripts"2996 msgid "Allow samba to run unconfined scripts"3050 "Allow unconfined executables to make their heap memory executable. Doing "3057 "Allow all unconfined executables to use libraries requiring text relocation "3063 "Allow unconfined executables to make their stack executable. This should "3217 "allow unconfined users to transition to the chrome sandbox domains when "3222 msgid "Allow a user to login as an unconfined domain"3227 "Allow unconfined users to transition to the Mozilla plugin domain when "4363 "An unconfined domain is a process label that allows the process to do what "4366 "unconfined if this module is enabled. Disabling it means all daemons will "[all …]
2866 msgid "Allow openvpn to run unconfined scripts"2995 msgid "Allow samba to run unconfined scripts"3049 "Allow unconfined executables to make their heap memory executable. Doing "3056 "Allow all unconfined executables to use libraries requiring text relocation "3062 "Allow unconfined executables to make their stack executable. This should "3216 "allow unconfined users to transition to the chrome sandbox domains when "3221 msgid "Allow a user to login as an unconfined domain"3226 "Allow unconfined users to transition to the Mozilla plugin domain when "4362 "An unconfined domain is a process label that allows the process to do what "4365 "unconfined if this module is enabled. Disabling it means all daemons will "[all …]
2868 msgid "Allow openvpn to run unconfined scripts"2997 msgid "Allow samba to run unconfined scripts"3051 "Allow unconfined executables to make their heap memory executable. Doing "3058 "Allow all unconfined executables to use libraries requiring text relocation "3064 "Allow unconfined executables to make their stack executable. This should "3218 "allow unconfined users to transition to the chrome sandbox domains when "3223 msgid "Allow a user to login as an unconfined domain"3228 "Allow unconfined users to transition to the Mozilla plugin domain when "4364 "An unconfined domain is a process label that allows the process to do what "4367 "unconfined if this module is enabled. Disabling it means all daemons will "[all …]