/frameworks/base/core/tests/coretests/src/android/os/ |
SELinuxTest.java | 4 import android.os.SELinux; 11 if(SELinux.isSELinuxEnabled() == false) 14 String ctx = SELinux.getFileContext("/system/bin/toolbox"); 19 if(SELinux.isSELinuxEnabled() == false) 22 String mycon = SELinux.getContext(); 27 if(SELinux.isSELinuxEnabled() == false) 30 String mycon = SELinux.getPidContext(Process.myPid()); 35 if(SELinux.isSELinuxEnabled() == false) 38 String mycon = SELinux.getContext(); 40 ret = SELinux.checkSELinuxAccess(mycon, mycon, "process", "fork") [all...] |
/frameworks/base/core/java/android/os/ |
SELinux.java | 27 * SELinux interaction. 30 public class SELinux { 32 private static final String TAG = "SELinux"; 35 * Determine whether SELinux is disabled or enabled. 36 * @return a boolean indicating whether SELinux is enabled. 41 * Determine whether SELinux is permissive or enforcing. 42 * @return a boolean indicating whether SELinux is enforcing. 47 * Set whether SELinux is permissive or enforcing. 48 * @param boolean representing whether to set SELinux to enforcing 98 * Gets a list of the SELinux boolean names [all...] |
/frameworks/base/core/java/com/android/internal/os/ |
ZygoteConnection.java | 22 import android.os.SELinux; 102 peerSecurityContext = SELinux.getPeerContext(mSocket.getFileDescriptor()); 630 boolean allowed = SELinux.checkSELinuxAccess(peerSecurityContext, 694 boolean allowed = SELinux.checkSELinuxAccess(peerSecurityContext, 725 boolean allowed = SELinux.checkSELinuxAccess(peerSecurityContext, 794 boolean allowed = SELinux.checkSELinuxAccess(peerSecurityContext, 828 boolean allowed = SELinux.checkSELinuxAccess(peerSecurityContext, [all...] |
/packages/apps/Settings/src/com/android/settings/ |
DeviceInfoSettings.java | 24 import android.os.SELinux; 56 private static final String PROPERTY_SELINUX_STATUS = "ro.build.selinux"; 97 if (!SELinux.isSELinuxEnabled()) { 100 } else if (!SELinux.isSELinuxEnforced()) { 105 // Remove selinux information if property is not present
|
/frameworks/base/core/java/com/android/internal/backup/ |
LocalTransport.java | 30 import android.os.SELinux; 69 if (!SELinux.restorecon(mDataDir)) { 70 Log.e(TAG, "SELinux restorecon failed for " + mDataDir);
|
/frameworks/base/services/java/com/android/server/updates/ |
SELinuxPolicyInstallReceiver.java | 22 import android.os.SELinux; 109 Slog.i(TAG, "Applying SELinux policy"); 125 SystemProperties.set("selinux.reload_policy", "1"); 133 SystemProperties.set("persist.selinux.enforcing", mode); 148 Slog.e(TAG, "SELinux policy update malformed: ", e); 150 Slog.e(TAG, "Could not update selinux policy: ", e); 152 Slog.e(TAG, "Could not update selinux policy: ", e);
|
/external/sepolicy/ |
Android.mk | 5 # SELinux policy version. 6 # Must be <= /selinux/policyvers reported by the Android kernel. 154 LOCAL_MODULE := selinux-network.sh
|
/frameworks/base/services/java/com/android/server/ |
WallpaperManagerService.java | 53 import android.os.SELinux; 769 if (!SELinux.restorecon(file)) { [all...] |
BackupManagerService.java | 66 import android.os.SELinux; 750 if (!SELinux.restorecon(mBaseStateDir)) { 751 Slog.e(TAG, "SELinux restorecon failed on " + mBaseStateDir); [all...] |
/packages/providers/DownloadProvider/src/com/android/providers/downloads/ |
DownloadProvider.java | 42 import android.os.SELinux; 469 SELinux.restorecon(mDownloadsDataDir.getCanonicalPath()); [all...] |
/frameworks/base/services/java/com/android/server/pm/ |
PackageManagerService.java | 111 import android.os.SELinux; [all...] |
/frameworks/base/services/java/com/android/server/am/ |
ActivityManagerService.java | 151 import android.os.SELinux; [all...] |
/external/openssh/ |
configure | [all...] |