/external/libselinux/src/ |
label.c | 13 #include <selinux/selinux.h>
|
selinux_internal.h | 1 #include <selinux/selinux.h>
|
mapping.c | 10 #include <selinux/selinux.h> 11 #include <selinux/avc.h>
|
sestatus.c | 4 * APIs to reference SELinux kernel status page (/selinux/status) 20 * copied from the selinux/include/security.h 128 * It returns the current performing mode of SELinux. 200 * 0 means SELinux treats policy queries on undefined stuff being allowed, 249 * It tries to open and mmap kernel status page (/selinux/status).
|
android.c | 16 #include <selinux/selinux.h> 17 #include <selinux/context.h> 18 #include <selinux/android.h> 19 #include <selinux/label.h> 20 #include <selinux/avc.h> 844 selinux_log(SELINUX_ERROR, "SELinux: Could not open sepolicy: %s\n", 849 selinux_log(SELINUX_ERROR, "SELinux: Could not stat %s: %s\n", 856 selinux_log(SELINUX_ERROR, "SELinux: Could not map %s: %s\n", 864 selinux_log(SELINUX_ERROR, "SELinux: Could not load policy: %s\n" [all...] |
/external/libsepol/man/man8/ |
chkcon.8 | 24 .TH CHKCON 8 "Mar 12 2005" "SELinux" "SELinux Command Line documentation"
|
genpolusers.8 | 24 .TH GENPOLUSERS 8 "Mar 12 2005" "SELinux" "SELinux Command Line documentation"
|
/system/core/init/ |
init.c | 35 #include <selinux/selinux.h> 36 #include <selinux/label.h> 37 #include <selinux/android.h> 861 ERROR("SELinux: Could not load property_contexts: %s\n", 865 INFO("SELinux: Loaded property contexts from %s\n", seopts_prop[i - 1].value); 879 if (access("/sys/fs/selinux", F_OK) != 0) { 880 /* SELinux is not compiled into the kernel, or has been disabled 881 * via the kernel command line "selinux=0". 886 if ((property_get("ro.boot.selinux", tmp) != 0) && (strcmp(tmp, "disabled") == 0)) [all...] |
/cts/tests/tests/security/src/android/security/cts/ |
KernelSettingsTest.java | 34 * Ensure that SELinux is in enforcing mode. 38 assertEquals("1", getFile("/sys/fs/selinux/enforce")); 40 fail("SELinux is not compiled into this kernel, or is disabled.");
|
/external/ipsec-tools/src/racoon/ |
security.c | 40 #include <selinux/selinux.h> 41 #include <selinux/flask.h> 42 #include <selinux/av_permissions.h> 43 #include <selinux/avc.h> 44 #include <selinux/context.h>
|
/external/chromium_org/third_party/mesa/src/src/mapi/mapi/ |
u_execmem.c | 55 #include <selinux/selinux.h>
|
/external/chromium_org/third_party/mesa/src/src/mesa/main/ |
execmem.c | 51 #include <selinux/selinux.h>
|
/external/mesa3d/src/mapi/mapi/ |
u_execmem.c | 55 #include <selinux/selinux.h>
|
/external/mesa3d/src/mesa/main/ |
execmem.c | 51 #include <selinux/selinux.h>
|
/external/sepolicy/ |
property_contexts | 43 # selinux non-persistent properties 44 selinux. u:object_r:security_prop:s0
|
te_macros | 192 # Allow domain to check SELinux permissions via selinuxfs. 202 # Allow domain to check SELinux contexts via selinuxfs. 211 # Allow domain to check whether SELinux is enforcing. 219 # Allow domain to set SELinux to enforcing. 228 # Allow domain to set SELinux booleans.
|
/build/target/product/ |
embedded.mk | 70 # SELinux packages
|
/external/kernel-headers/original/linux/ |
xattr.h | 36 #define XATTR_SELINUX_SUFFIX "selinux"
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/linux/ |
xattr.h | 36 #define XATTR_SELINUX_SUFFIX "selinux"
|
/system/extras/ext4_utils/ |
make_ext4fs_main.c | 33 #include <selinux/selinux.h> 34 #include <selinux/label.h> 35 #include <selinux/android.h>
|
/external/chromium_org/content/browser/zygote_host/ |
zygote_host_impl_linux.cc | 358 // However, Fedora (and other SELinux systems) don't like us touching other 362 // The offical way to get the SELinux mode is selinux_getenforcemode, but I 364 // problems with other, non-SELinux distros. 366 // So we just check for files in /selinux. This isn't foolproof, but it's not 369 static bool selinux; local 373 const base::FilePath kSelinuxPath("/selinux"); 377 selinux = access(kSelinuxPath.value().c_str(), X_OK) == 0 && 382 if (using_suid_sandbox_ && !selinux) {
|
/external/libselinux/include/selinux/ |
label.h | 10 #include <selinux/selinux.h>
|
/external/iptables/extensions/ |
libxt_SECMARK.c | 22 " --selctx value Set the SELinux security context\n");
|
/bootable/recovery/minzip/ |
Zip.h | 21 #include <selinux/selinux.h> 22 #include <selinux/label.h>
|
/external/libsepol/src/ |
context_record.c | 11 /* Selinux user */ 14 /* Selinux role */ 17 /* Selinux type */
|