HomeSort by relevance Sort by last modified time
    Searched full:selinux (Results 151 - 175 of 333) sorted by null

1 2 3 4 5 67 8 91011>>

  /external/libselinux/src/
avc_sidtab.c 12 #include <selinux/avc.h>
  /external/libsepol/include/sepol/
policydb.h 133 * Check whether the compatibility mode for SELinux network
  /external/libsepol/src/
policydb_public.c 185 * Enable compatibility mode for SELinux network checks iff
  /external/qemu/distrib/ext4_utils/src/
contents.c 27 #define XATTR_SELINUX_SUFFIX "selinux"
293 * of the name. For example, XATTR_SELINUX_SUFFIX ("selinux") comes before
294 * XATTR_CAPS_SUFFIX ("capability") because "selinux" is shorter than "capability"
296 * which name comes first. For example, "selinux" would come before "yelinux".
  /external/qemu/distrib/libselinux/include/selinux/
avc.h 12 #include <selinux/selinux.h>
469 * selinux_status_open - Open and map SELinux kernel status page
475 * selinux_status_close - Unmap and close SELinux kernel status page
  /external/qemu/distrib/libselinux/src/
avc_internal.h 15 #include <selinux/avc.h>
avc_sidtab.c 12 #include <selinux/avc.h>
  /external/sepolicy/
installd.te 17 # Check validity of SELinux context before use.
access_vectors 445 mac_override # unused by SELinux
446 mac_admin # unused by SELinux
  /ndk/sources/host-tools/sed-4.2.1/m4/
gnulib-comp.m4 325 lib/se-selinux.in.h
417 m4/selinux-context-h.m4
418 m4/selinux-selinux-h.m4
  /system/core/init/
property_service.c 44 #include <selinux/selinux.h>
45 #include <selinux/label.h>
251 } else if (strcmp("selinux.reload_policy", name) == 0 &&
devices.c 34 #include <selinux/selinux.h>
35 #include <selinux/label.h>
36 #include <selinux/android.h>
37 #include <selinux/avc.h>
163 // Now fixup SELinux file labels
util.c 27 #include <selinux/label.h>
28 #include <selinux/android.h>
  /system/extras/ext4_utils/
contents.c 27 #define XATTR_SELINUX_SUFFIX "selinux"
305 * of the name. For example, XATTR_SELINUX_SUFFIX ("selinux") comes before
306 * XATTR_CAPS_SUFFIX ("capability") because "selinux" is shorter than "capability"
308 * which name comes first. For example, "selinux" would come before "yelinux".
  /external/qemu/android/
cmdline-options.h 163 OPT_PARAM(selinux, "<disabled|permissive>", "Set SELinux to either disabled or permissive mode")
  /system/core/rootdir/
init.rc 17 # Apply strict SELinux checking of PROT_EXEC on mmap/mprotect calls.
18 write /sys/fs/selinux/checkreqprot 0
225 # make the selinux kernel policy world-readable
226 chmod 0444 /sys/fs/selinux/policy
319 setprop selinux.reload_policy 1
321 # Set SELinux security contexts on upgrade or policy update.
  /ndk/sources/host-tools/sed-4.2.1/lib/
Makefile.in 26 # Reproduce by: gnulib-tool --import --dir=. --local-dir=gl --lib=libsed --source-base=lib --m4-base=m4 --doc-base=doc --tests-base=tests --aux-dir=build-aux --no-libtool --macro-prefix=gl acl alloca btowc c-ctype extensions getline getopt gettext localcharset mbrlen mbrtowc mbsinit memchr mkstemp obstack pathmax regex rename selinux-h stat-macros stdbool strerror strverscmp unlocked-io verify wcrtomb wctob
79 $(top_srcdir)/m4/selinux-context-h.m4 \
80 $(top_srcdir)/m4/selinux-selinux-h.m4 \
623 errno.h-t getopt.h getopt.h-t selinux/selinux.h \
624 selinux/selinux.h-t selinux/context.h selinux/context.h-t
    [all...]
  /frameworks/base/core/java/com/android/internal/content/
NativeLibraryHelper.java 35 import android.os.SELinux;
270 } else if (!SELinux.restorecon(path)) {
271 throw new IOException("Cannot set SELinux context for " + path.getPath());
  /cts/tests/tests/permission/src/android/permission/cts/
FileSystemPermissionTest.java 649 new File("/sys/fs/selinux/member"),
650 new File("/sys/fs/selinux/user"),
651 new File("/sys/fs/selinux/relabel"),
652 new File("/sys/fs/selinux/create"),
653 new File("/sys/fs/selinux/access"),
654 new File("/sys/fs/selinux/context")
    [all...]
  /bionic/linker/
linker_environ.cpp 47 // has file caps, or caused a SELinux/AppArmor domain transition.
  /build/tools/releasetools/
img_from_target_files 105 # If this image was originally labelled with SELinux contexts,
img_from_target_files.py 105 # If this image was originally labelled with SELinux contexts,
  /cts/tests/tests/security/src/android/security/cts/
HwRngTest.java 114 // This can occur because SELinux blocked stat access on the device nodes.
SELinuxPolicyRule.java 34 * A class for generating representations of SELinux avc rules parsed from an xml file.
  /external/iproute2/include/linux/
netlink.h 14 #define NETLINK_SELINUX 7 /* SELinux event notifications */

Completed in 660 milliseconds

1 2 3 4 5 67 8 91011>>