/ndk/sources/host-tools/sed-4.2.1/m4/ |
selinux-selinux-h.m4 | 8 # Provide <selinux/selinux.h>, if necessary. 13 AC_CHECK_HEADERS([selinux/selinux.h], 15 [SELINUX_SELINUX_H=selinux/selinux.h]) 22 AC_MSG_WARN([libselinux was found but selinux/selinux.h is missing.]) 23 AC_MSG_WARN([AC_PACKAGE_NAME will be compiled without SELinux support.]) 33 AC_SEARCH_LIBS([setfilecon], [selinux], [all...] |
selinux-context-h.m4 | 8 # Provide <selinux/context.h>, if necessary. 12 AC_CHECK_HEADERS([selinux/context.h], 14 [SELINUX_CONTEXT_H=selinux/context.h])
|
/frameworks/base/core/tests/coretests/src/android/os/ |
SELinuxTest.java | 4 import android.os.SELinux; 11 if(SELinux.isSELinuxEnabled() == false) 14 String ctx = SELinux.getFileContext("/system/bin/toolbox"); 19 if(SELinux.isSELinuxEnabled() == false) 22 String mycon = SELinux.getContext(); 27 if(SELinux.isSELinuxEnabled() == false) 30 String mycon = SELinux.getPidContext(Process.myPid()); 35 if(SELinux.isSELinuxEnabled() == false) 38 String mycon = SELinux.getContext(); 40 ret = SELinux.checkSELinuxAccess(mycon, mycon, "process", "fork") [all...] |
/external/libselinux/src/ |
policy.h | 6 /* xattr name for SELinux attributes. */ 7 #define XATTR_NAME_SELINUX "security.selinux" 16 #define SELINUXMNT "/sys/fs/selinux" 17 #define OLDSELINUXMNT "/selinux"
|
avc_sidtab.h | 8 #include <selinux/selinux.h> 9 #include <selinux/avc.h>
|
context_internal.h | 1 #include <selinux/context.h>
|
enabled.c | 20 * will assume that if a selinux file system is mounted, then 21 * selinux is enabled. */ 24 /* Since a file system is mounted, we consider selinux 25 * enabled. If getcon fails, selinux is still enabled. 51 /* Since an selinux file system is available, we consider 52 * selinux enabled. If getcon fails, selinux is still
|
callbacks.h | 11 #include <selinux/selinux.h>
|
mapping.h | 9 #include <selinux/selinux.h>
|
selinux_netlink.h | 2 * Netlink event notifications for SELinux.
|
/frameworks/base/core/java/android/os/ |
SELinux.java | 27 * SELinux interaction. 30 public class SELinux { 32 private static final String TAG = "SELinux"; 35 * Determine whether SELinux is disabled or enabled. 36 * @return a boolean indicating whether SELinux is enabled. 41 * Determine whether SELinux is permissive or enforcing. 42 * @return a boolean indicating whether SELinux is enforcing. 47 * Set whether SELinux is permissive or enforcing. 48 * @param boolean representing whether to set SELinux to enforcing 98 * Gets a list of the SELinux boolean names [all...] |
/system/core/toolbox/ |
getenforce.c | 5 #include <selinux/selinux.h>
|
chcon.c | 5 #include <selinux/selinux.h>
|
runcon.c | 6 #include <selinux/selinux.h>
|
/external/libselinux/ |
Android.mk | 43 common_COPY_HEADERS_TO := selinux 44 common_COPY_HEADERS := include/selinux/selinux.h include/selinux/label.h include/selinux/context.h include/selinux/avc.h include/selinux/android.h
|
/bootable/recovery/updater/ |
updater.h | 23 #include <selinux/selinux.h> 24 #include <selinux/label.h>
|
/external/checkpolicy/ |
checkpolicy.8 | 3 checkpolicy \- SELinux policy compiler 14 is a program that checks and compiles a SELinux security policy configuration 37 Specify the target platform (selinux or xen). 49 SELinux documentation at http://www.nsa.gov/research/selinux, 50 especially "Configuring the SELinux Policy".
|
/external/iptables/extensions/ |
libxt_SECMARK.man | 2 packet for use by security subsystems such as SELinux. It is
|
/external/iptables/include/linux/netfilter/ |
xt_SECMARK.h | 13 #define SECMARK_MODE_SEL 0x01 /* SELinux */
|
/external/kernel-headers/original/linux/netfilter/ |
xt_SECMARK.h | 11 #define SECMARK_MODE_SEL 0x01 /* SELinux */
|
/external/libsepol/src/ |
libsepol.pc.in | 7 Description: SELinux policy library
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/netfilter/ |
xt_SECMARK.h | 11 #define SECMARK_MODE_SEL 0x01 /* SELinux */
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/linux/netfilter/ |
xt_SECMARK.h | 11 #define SECMARK_MODE_SEL 0x01 /* SELinux */
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/linux/netfilter/ |
xt_SECMARK.h | 11 #define SECMARK_MODE_SEL 0x01 /* SELinux */
|
/docs/source.android.com/src/devices/tech/security/ |
se-linux.jd | 21 Android begins supporting Security-Enhanced Linux (SELinux), a tool for applying 22 access control policies. SELinux enhances Android security, and contributions to 25 href="http://source.android.com/">source.android.com</a>. With SELinux, Android 30 <p>In this release, Android includes SELinux in permissive mode and a 36 software and SELinux policies before enforcing them.</p> 38 <h2 id="background">Background</h2> <p>Used properly, SELinux greatly limits the 39 potential damage of compromised machines and accounts. When you adopt SELinux, 44 <p>SELinux provides a mandatory access control (MAC) umbrella over traditional 48 that user can write to every raw block device. However, SELinux can be used to 54 address them with SELinux.</p [all...] |