Searched refs:seinfo (Results 1 – 10 of 10) sorted by relevance
6 # seinfo (string)32 # (7) Specified seinfo= string before unspecified seinfo= string.67 # anything with a non-known uid with a specified name should have a specified seinfo68 neverallow user=_app name=.* seinfo=""69 neverallow user=_app name=.* seinfo=default89 user=system seinfo=platform domain=system_app type=system_app_data_file90 user=bluetooth seinfo=platform domain=bluetooth type=bluetooth_data_file91 user=nfc seinfo=platform domain=nfc type=nfc_data_file92 user=radio seinfo=platform domain=radio type=radio_data_file94 user=shell seinfo=platform domain=shell type=shell_data_file[all …]
6 ### optionally package name to seinfo value) and seapp_contexts (maps UID7 ### and optionally seinfo value to domain for process and type for data10 ### and AID_ISOLATED_START (99000) if the app has no specific seinfo15 ### mac_permissions.xml and assign it one of the pre-existing seinfo values16 ### or define and use a new seinfo value in both mac_permissions.xml and
57 as well as mapping a public base16 signing key with an arbitrary seinfo59 top of that file. The seinfo string, previously mentioned, is the same string
195 pkg_info->seinfo = strdup(cur); in packagelist_parse()196 if (!pkg_info->seinfo) { in packagelist_parse()262 free(info->seinfo); in packagelist_free()
33 char seinfo[PATH_MAX]; member
440 info->seinfo[0] = '\0'; in get_package_info()538 string_copy(info->seinfo, sizeof info->seinfo, p, q - p); in get_package_info()
194 if (selinux_android_setcontext(uid, 0, info.seinfo, pkgname) < 0) { in main()
53 char *seinfo; member
50 -s SEINFO, --seinfo SEINFO seinfo tag for each generated stanza
81 inner_tag = '<seinfo value="%s"/>' % args.seinfo