OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:selinux
(Results
26 - 50
of
347
) sorted by null
1
2
3
4
5
6
7
8
9
10
11
>>
/external/iptables/include/linux/netfilter/
xt_SECMARK.h
13
#define SECMARK_MODE_SEL 0x01 /*
SELinux
*/
/external/kernel-headers/original/uapi/linux/netfilter/
xt_SECMARK.h
13
#define SECMARK_MODE_SEL 0x01 /*
SELinux
*/
/external/libselinux/src/
selinux_netlink.h
2
* Netlink event notifications for
SELinux
.
label_internal.h
13
#include <
selinux
/
selinux
.h>
14
#include <
selinux
/label.h>
/external/libsepol/src/
libsepol.pc.in
7
Description:
SELinux
policy library
/external/qemu/distrib/libselinux/src/
selinux_netlink.h
2
* Netlink event notifications for
SELinux
.
label_internal.h
13
#include <
selinux
/
selinux
.h>
14
#include <
selinux
/label.h>
/external/libselinux/
Android.mk
43
common_COPY_HEADERS_TO :=
selinux
44
common_COPY_HEADERS := include/
selinux
/
selinux
.h include/
selinux
/label.h include/
selinux
/context.h include/
selinux
/avc.h include/
selinux
/android.h
/packages/experimental/SELinux/CTS/src/
gen_SELinux_CTS.py
2
# genCheckAccessCTS.py - takes an input
SELinux
policy.conf file and generates
4
# which are created by expanding the
SELinux
rule notation into the individual
8
# This test does not work with all valid
SELinux
policy.conf files. It is meant
12
# and compiler of
SELinux
, see external/checkpolicy.
36
# expand rules into 4-tuples for
SELinux
.h checkAccess() check
/docs/source.android.com/src/devices/tech/security/selinux/
validate.jd
1
page.title=Validating
SELinux
27
<p>Android strongly encourages OEMs to test their
SELinux
implementations
28
thoroughly. As manufacturers implement
SELinux
, they should apply the new
31
<p>Once applied, make sure
SELinux
is running in the correct mode on the device by
34
<p>This will print the global
SELinux
mode: either Disabled, Enforcing, or
35
Permissive. Please note, this command shows only the global
SELinux
mode. To
36
determine the
SELinux
mode for each domain, you must examine the corresponding
42
SELinux
output to dmesg on these devices and refine settings prior to public
43
release in permissive mode and eventual switch to enforcing mode.
SELinux
log
49
components are in violation of
SELinux
policy. Manufacturers can then repai
[
all
...]
implement.jd
1
page.title=Implementing
SELinux
27
<p>
SELinux
is set up to default-deny, which means that every single access for
30
rules, types, classes, permissions, and more. A full consideration of
SELinux
33
great deal of information available regarding
SELinux
already. See <a
39
<p>Here is a brief summary of the steps needed to implement
SELinux
on your
43
<li>Add
SELinux
support in the kernel and configuration.
64
<p>
SELinux
for Android is accompanied by everything you need to enable
SELinux
71
<p>Those files when compiled comprise the
SELinux
kernel security policy and cover
76
<p>Here are the files you must create or edit in order to implement
SELinux
:</p
[
all
...]
customize.jd
1
page.title=Customizing
SELinux
29
to the Android operating system. Of course, these policies must still meet the <a href="{@docRoot}compatibility/index.html">Android Compatibility program</a> requirements and not remove the default
SELinux
settings.</p>
32
risk breaking the Android
SELinux
implementation and the applications it
35
modification to continue functioning on
SELinux
-enabled devices.</p>
37
<p>When embarking upon customizing
SELinux
, manufacturers should remember to:</p>
40
<li>Write
SELinux
policy for all new daemons
59
<p>
SELinux
uses a whitelist approach, meaning all access must be explicitly
60
allowed in policy in order to be granted. Since Android's default
SELinux
62
to modify
SELinux
settings in any way. If they do customize
SELinux
settings
[
all
...]
concepts.jd
1
page.title=
SELinux
concepts
27
<p>Review this page to become familar with the concepts at play within
SELinux
.</p>
31
<p>Security Enhanced Linux (
SELinux
), is a mandatory access control (MAC) system
39
<p>
SELinux
has been implemented as part of the Linux Security Module (LSM)
44
security object.
SELinux
provides an implementation for these hooks and
55
<p>Starting in Android 4.3,
SELinux
provides a mandatory access control (MAC)
60
SELinux
can be used to label these devices so the process assigned the root
65
<p>See <a href="implement.html#use_cases">Use Cases</a> for more examples of threats and ways to address them with
SELinux
.</p>
69
<p>Become familiar with the following terms to understand how
SELinux
can be
73
<li><em>Permissive</em> -
SELinux
security policy is not enforced, only logged
[
all
...]
/system/core/toolbox/
id.c
7
#include <
selinux
/
selinux
.h>
restorecon.c
5
#include <
selinux
/
selinux
.h>
6
#include <
selinux
/android.h>
setenforce.c
8
#include <
selinux
/
selinux
.h>
25
fprintf(stderr, "%s:
SELinux
is disabled\n", argv[0]);
/device/moto/shamu/sepolicy/
mediaserver.te
4
# Permit mediaserver to create sockets with no specific
SELinux
class.
/external/libsepol/man/man8/
genpolbools.8
1
.TH "genpolbools" "8" "11 August 2004" "sds@epoch.ncsc.mil" "
SELinux
Command Line documentation"
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.6/sysroot/usr/include/linux/netfilter/
xt_SECMARK.h
13
#define SECMARK_MODE_SEL 0x01 /*
SELinux
*/
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/linux/netfilter/
xt_SECMARK.h
13
#define SECMARK_MODE_SEL 0x01 /*
SELinux
*/
/bootable/recovery/minzip/
DirUtil.h
27
#include <
selinux
/
selinux
.h>
28
#include <
selinux
/label.h>
/external/checkpolicy/
checkmodule.8
3
checkmodule \-
SELinux
policy module compiler
13
is a program that checks and compiles a
SELinux
security policy module
56
SELinux
documentation at http://www.nsa.gov/research/
selinux
,
57
especially "Configuring the
SELinux
Policy".
/docs/source.android.com/src/devices/tech/security/
se-linux.jd
33
Security-Enhanced Linux (
SELinux
) is used to further define the boundaries of
36
<p>As part of the Android <a href="{@docRoot}devices/tech/security/index.html">security model</a>, Android uses
SELinux
to enforce mandatory access control (MAC) over all
38
capabilities).
SELinux
enhances Android security by confining privileged
42
all Android code and contributors are publicly available for review on <a href="https://android.googlesource.com/">android.googlesource.com</a>. With
SELinux
, Android can better protect and confine system services, control
46
<p>Android includes
SELinux
in enforcing mode and a corresponding security policy
49
may refine their software and
SELinux
policies before enforcing them.</p>
53
<p>
SELinux
operates on the ethos of default denial. Anything that is not
54
explicitly allowed is denied.
SELinux
can operate in one of two global modes:
56
enforcing mode, in which denials are both logged and enforced.
SELinux
also
62
incremental application of
SELinux
to an ever-increasing portion of the system
[
all
...]
enhancements44.jd
11
<li><strong>Android sandbox reinforced with
SELinux
.</strong>
12
Android now uses
SELinux
in enforcing mode.
SELinux
is a mandatory
/external/sepolicy/tools/
checkfc.c
5
#include <
selinux
/
selinux
.h>
6
#include <
selinux
/label.h>
Completed in 602 milliseconds
1
2
3
4
5
6
7
8
9
10
11
>>