/frameworks/base/core/tests/coretests/src/android/os/ |
SELinuxTest.java | 4 import android.os.SELinux; 11 if(SELinux.isSELinuxEnabled() == false) 14 String ctx = SELinux.getFileContext("/system/bin/toolbox"); 19 if(SELinux.isSELinuxEnabled() == false) 22 String mycon = SELinux.getContext(); 27 if(SELinux.isSELinuxEnabled() == false) 30 String mycon = SELinux.getPidContext(Process.myPid()); 35 if(SELinux.isSELinuxEnabled() == false) 38 String mycon = SELinux.getContext(); 40 ret = SELinux.checkSELinuxAccess(mycon, mycon, "process", "fork") [all...] |
/cts/tools/selinux/ |
SELinuxNeverallowTestFrame.py | 38 * Neverallow Rules SELinux tests. 75 mDevice.executeAdbCommand("pull", "/sys/fs/selinux/policy", 102 assertTrue("The following errors were encountered when validating the SELinux"
|
/frameworks/base/core/java/android/os/ |
SELinux.java | 27 * SELinux interaction. 30 public class SELinux { 31 private static final String TAG = "SELinux"; 33 /** Keep in sync with ./external/libselinux/include/selinux/android.h */ 41 * Determine whether SELinux is disabled or enabled. 42 * @return a boolean indicating whether SELinux is enabled. 47 * Determine whether SELinux is permissive or enforcing. 48 * @return a boolean indicating whether SELinux is enforcing. 53 * Set whether SELinux is permissive or enforcing. 54 * @param value representing whether to set SELinux to enforcin [all...] |
/frameworks/base/core/java/com/android/internal/os/ |
ZygoteConnection.java | 22 import android.os.SELinux; 104 peerSecurityContext = SELinux.getPeerContext(mSocket.getFileDescriptor()); 690 boolean allowed = SELinux.checkSELinuxAccess(peerSecurityContext, 754 boolean allowed = SELinux.checkSELinuxAccess(peerSecurityContext, 789 boolean allowed = SELinux.checkSELinuxAccess(peerSecurityContext, 801 * Applies zygote security policy for SELinux information. 820 "This UID may not specify SELinux info."); 823 boolean allowed = SELinux.checkSELinuxAccess(peerSecurityContext, 829 "Peer may not specify SELinux info"); [all...] |
/packages/apps/Settings/src/com/android/settings/ |
DeviceInfoSettings.java | 30 import android.os.SELinux; 70 private static final String PROPERTY_SELINUX_STATUS = "ro.build.selinux"; 105 if (!SELinux.isSELinuxEnabled()) { 108 } else if (!SELinux.isSELinuxEnforced()) { 113 // Remove selinux information if property is not present
|
/frameworks/base/core/java/com/android/internal/content/ |
NativeLibraryHelper.java | 35 import android.os.SELinux; 270 } else if (!SELinux.restorecon(path)) { 271 throw new IOException("Cannot set SELinux context for " + path.getPath());
|
/external/sepolicy/ |
Android.mk | 10 # When we're close to a release and SELinux new policy development 21 # SELinux policy version. 22 # Must be <= /selinux/policyvers reported by the Android kernel. 268 LOCAL_MODULE := selinux-network.sh
|
/frameworks/base/core/java/com/android/internal/backup/ |
LocalTransport.java | 30 import android.os.SELinux; 110 if (!SELinux.restorecon(mCurrentSetDir)) { 111 Log.e(TAG, "SELinux restorecon failed for " + mCurrentSetDir);
|
/frameworks/base/cmds/am/src/com/android/commands/am/ |
Am.java | 50 import android.os.SELinux; [all...] |
/frameworks/base/services/core/java/com/android/server/pm/ |
PackageInstallerService.java | 64 import android.os.SELinux; 693 if (!SELinux.restorecon(stageDir)) { [all...] |
PackageManagerService.java | 156 import android.os.SELinux; [all...] |
/frameworks/base/services/core/java/com/android/server/wallpaper/ |
WallpaperManagerService.java | 56 import android.os.SELinux; [all...] |
/frameworks/base/services/backup/java/com/android/server/backup/ |
BackupManagerService.java | 71 import android.os.SELinux; [all...] |
/frameworks/base/services/core/java/com/android/server/am/ |
ActivityManagerService.java | 183 import android.os.SELinux; [all...] |