HomeSort by relevance Sort by last modified time
    Searched full:selinux (Results 26 - 50 of 347) sorted by null

12 3 4 5 6 7 8 91011>>

  /external/iptables/include/linux/netfilter/
xt_SECMARK.h 13 #define SECMARK_MODE_SEL 0x01 /* SELinux */
  /external/kernel-headers/original/uapi/linux/netfilter/
xt_SECMARK.h 13 #define SECMARK_MODE_SEL 0x01 /* SELinux */
  /external/libselinux/src/
selinux_netlink.h 2 * Netlink event notifications for SELinux.
label_internal.h 13 #include <selinux/selinux.h>
14 #include <selinux/label.h>
  /external/libsepol/src/
libsepol.pc.in 7 Description: SELinux policy library
  /external/qemu/distrib/libselinux/src/
selinux_netlink.h 2 * Netlink event notifications for SELinux.
label_internal.h 13 #include <selinux/selinux.h>
14 #include <selinux/label.h>
  /external/libselinux/
Android.mk 43 common_COPY_HEADERS_TO := selinux
44 common_COPY_HEADERS := include/selinux/selinux.h include/selinux/label.h include/selinux/context.h include/selinux/avc.h include/selinux/android.h
  /packages/experimental/SELinux/CTS/src/
gen_SELinux_CTS.py 2 # genCheckAccessCTS.py - takes an input SELinux policy.conf file and generates
4 # which are created by expanding the SELinux rule notation into the individual
8 # This test does not work with all valid SELinux policy.conf files. It is meant
12 # and compiler of SELinux, see external/checkpolicy.
36 # expand rules into 4-tuples for SELinux.h checkAccess() check
  /docs/source.android.com/src/devices/tech/security/selinux/
validate.jd 1 page.title=Validating SELinux
27 <p>Android strongly encourages OEMs to test their SELinux implementations
28 thoroughly. As manufacturers implement SELinux, they should apply the new
31 <p>Once applied, make sure SELinux is running in the correct mode on the device by
34 <p>This will print the global SELinux mode: either Disabled, Enforcing, or
35 Permissive. Please note, this command shows only the global SELinux mode. To
36 determine the SELinux mode for each domain, you must examine the corresponding
42 SELinux output to dmesg on these devices and refine settings prior to public
43 release in permissive mode and eventual switch to enforcing mode. SELinux log
49 components are in violation of SELinux policy. Manufacturers can then repai
    [all...]
implement.jd 1 page.title=Implementing SELinux
27 <p>SELinux is set up to default-deny, which means that every single access for
30 rules, types, classes, permissions, and more. A full consideration of SELinux
33 great deal of information available regarding SELinux already. See <a
39 <p>Here is a brief summary of the steps needed to implement SELinux on your
43 <li>Add SELinux support in the kernel and configuration.
64 <p>SELinux for Android is accompanied by everything you need to enable SELinux
71 <p>Those files when compiled comprise the SELinux kernel security policy and cover
76 <p>Here are the files you must create or edit in order to implement SELinux:</p
    [all...]
customize.jd 1 page.title=Customizing SELinux
29 to the Android operating system. Of course, these policies must still meet the <a href="{@docRoot}compatibility/index.html">Android Compatibility program</a> requirements and not remove the default SELinux settings.</p>
32 risk breaking the Android SELinux implementation and the applications it
35 modification to continue functioning on SELinux-enabled devices.</p>
37 <p>When embarking upon customizing SELinux, manufacturers should remember to:</p>
40 <li>Write SELinux policy for all new daemons
59 <p>SELinux uses a whitelist approach, meaning all access must be explicitly
60 allowed in policy in order to be granted. Since Android's default SELinux
62 to modify SELinux settings in any way. If they do customize SELinux settings
    [all...]
concepts.jd 1 page.title=SELinux concepts
27 <p>Review this page to become familar with the concepts at play within SELinux.</p>
31 <p>Security Enhanced Linux (SELinux), is a mandatory access control (MAC) system
39 <p>SELinux has been implemented as part of the Linux Security Module (LSM)
44 security object. SELinux provides an implementation for these hooks and
55 <p>Starting in Android 4.3, SELinux provides a mandatory access control (MAC)
60 SELinux can be used to label these devices so the process assigned the root
65 <p>See <a href="implement.html#use_cases">Use Cases</a> for more examples of threats and ways to address them with SELinux.</p>
69 <p>Become familiar with the following terms to understand how SELinux can be
73 <li><em>Permissive</em> - SELinux security policy is not enforced, only logged
    [all...]
  /system/core/toolbox/
id.c 7 #include <selinux/selinux.h>
restorecon.c 5 #include <selinux/selinux.h>
6 #include <selinux/android.h>
setenforce.c 8 #include <selinux/selinux.h>
25 fprintf(stderr, "%s: SELinux is disabled\n", argv[0]);
  /device/moto/shamu/sepolicy/
mediaserver.te 4 # Permit mediaserver to create sockets with no specific SELinux class.
  /external/libsepol/man/man8/
genpolbools.8 1 .TH "genpolbools" "8" "11 August 2004" "sds@epoch.ncsc.mil" "SELinux Command Line documentation"
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.6/sysroot/usr/include/linux/netfilter/
xt_SECMARK.h 13 #define SECMARK_MODE_SEL 0x01 /* SELinux */
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/linux/netfilter/
xt_SECMARK.h 13 #define SECMARK_MODE_SEL 0x01 /* SELinux */
  /bootable/recovery/minzip/
DirUtil.h 27 #include <selinux/selinux.h>
28 #include <selinux/label.h>
  /external/checkpolicy/
checkmodule.8 3 checkmodule \- SELinux policy module compiler
13 is a program that checks and compiles a SELinux security policy module
56 SELinux documentation at http://www.nsa.gov/research/selinux,
57 especially "Configuring the SELinux Policy".
  /docs/source.android.com/src/devices/tech/security/
se-linux.jd 33 Security-Enhanced Linux (SELinux) is used to further define the boundaries of
36 <p>As part of the Android <a href="{@docRoot}devices/tech/security/index.html">security model</a>, Android uses SELinux to enforce mandatory access control (MAC) over all
38 capabilities). SELinux enhances Android security by confining privileged
42 all Android code and contributors are publicly available for review on <a href="https://android.googlesource.com/">android.googlesource.com</a>. With SELinux, Android can better protect and confine system services, control
46 <p>Android includes SELinux in enforcing mode and a corresponding security policy
49 may refine their software and SELinux policies before enforcing them.</p>
53 <p>SELinux operates on the ethos of default denial. Anything that is not
54 explicitly allowed is denied. SELinux can operate in one of two global modes:
56 enforcing mode, in which denials are both logged and enforced. SELinux also
62 incremental application of SELinux to an ever-increasing portion of the system
    [all...]
enhancements44.jd 11 <li><strong>Android sandbox reinforced with SELinux.</strong>
12 Android now uses SELinux in enforcing mode. SELinux is a mandatory
  /external/sepolicy/tools/
checkfc.c 5 #include <selinux/selinux.h>
6 #include <selinux/label.h>

Completed in 602 milliseconds

12 3 4 5 6 7 8 91011>>