HomeSort by relevance Sort by last modified time
    Searched full:selinux (Results 1 - 25 of 347) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /ndk/sources/host-tools/sed-4.2.1/m4/
selinux-selinux-h.m4 8 # Provide <selinux/selinux.h>, if necessary.
13 AC_CHECK_HEADERS([selinux/selinux.h],
15 [SELINUX_SELINUX_H=selinux/selinux.h])
22 AC_MSG_WARN([libselinux was found but selinux/selinux.h is missing.])
23 AC_MSG_WARN([AC_PACKAGE_NAME will be compiled without SELinux support.])
33 AC_SEARCH_LIBS([setfilecon], [selinux],
    [all...]
selinux-context-h.m4 8 # Provide <selinux/context.h>, if necessary.
12 AC_CHECK_HEADERS([selinux/context.h],
14 [SELINUX_CONTEXT_H=selinux/context.h])
  /frameworks/base/core/tests/coretests/src/android/os/
SELinuxTest.java 4 import android.os.SELinux;
11 if(SELinux.isSELinuxEnabled() == false)
14 String ctx = SELinux.getFileContext("/system/bin/toolbox");
19 if(SELinux.isSELinuxEnabled() == false)
22 String mycon = SELinux.getContext();
27 if(SELinux.isSELinuxEnabled() == false)
30 String mycon = SELinux.getPidContext(Process.myPid());
35 if(SELinux.isSELinuxEnabled() == false)
38 String mycon = SELinux.getContext();
40 ret = SELinux.checkSELinuxAccess(mycon, mycon, "process", "fork")
    [all...]
  /external/libselinux/src/
policy.h 6 /* xattr name for SELinux attributes. */
7 #define XATTR_NAME_SELINUX "security.selinux"
16 #define SELINUXMNT "/sys/fs/selinux"
17 #define OLDSELINUXMNT "/selinux"
avc_sidtab.h 8 #include <selinux/selinux.h>
9 #include <selinux/avc.h>
context_internal.h 1 #include <selinux/context.h>
enabled.c 20 * will assume that if a selinux file system is mounted, then
21 * selinux is enabled. */
24 /* Since a file system is mounted, we consider selinux
25 * enabled. If getcon fails, selinux is still enabled.
51 /* Since an selinux file system is available, we consider
52 * selinux enabled. If getcon fails, selinux is still
callbacks.h 11 #include <selinux/selinux.h>
mapping.h 9 #include <selinux/selinux.h>
  /external/qemu/distrib/libselinux/src/
policy.h 6 /* xattr name for SELinux attributes. */
7 #define XATTR_NAME_SELINUX "security.selinux"
16 #define SELINUXMNT "/sys/fs/selinux"
17 #define OLDSELINUXMNT "/selinux"
avc_sidtab.h 8 #include <selinux/selinux.h>
9 #include <selinux/avc.h>
context_internal.h 1 #include <selinux/context.h>
enabled.c 20 * will assume that if a selinux file system is mounted, then
21 * selinux is enabled. */
24 /* Since a file system is mounted, we consider selinux
25 * enabled. If getcon fails, selinux is still enabled.
51 /* Since an selinux file system is available, we consider
52 * selinux enabled. If getcon fails, selinux is still
callbacks.h 11 #include <selinux/selinux.h>
mapping.h 9 #include <selinux/selinux.h>
  /system/core/toolbox/
getenforce.c 5 #include <selinux/selinux.h>
chcon.c 5 #include <selinux/selinux.h>
runcon.c 6 #include <selinux/selinux.h>
  /frameworks/base/core/java/android/os/
SELinux.java 27 * SELinux interaction.
30 public class SELinux {
31 private static final String TAG = "SELinux";
33 /** Keep in sync with ./external/libselinux/include/selinux/android.h */
41 * Determine whether SELinux is disabled or enabled.
42 * @return a boolean indicating whether SELinux is enabled.
47 * Determine whether SELinux is permissive or enforcing.
48 * @return a boolean indicating whether SELinux is enforcing.
53 * Set whether SELinux is permissive or enforcing.
54 * @param value representing whether to set SELinux to enforcin
    [all...]
  /bootable/recovery/updater/
updater.h 23 #include <selinux/selinux.h>
24 #include <selinux/label.h>
  /external/checkpolicy/
checkpolicy.8 3 checkpolicy \- SELinux policy compiler
14 is a program that checks and compiles a SELinux security policy configuration
37 Specify the target platform (selinux or xen).
49 SELinux documentation at http://www.nsa.gov/research/selinux,
50 especially "Configuring the SELinux Policy".
  /device/asus/flo/sepolicy/
mediaserver.te 7 # Permit mediaserver to create sockets with no specific SELinux class.
  /device/lge/hammerhead/sepolicy/
mediaserver.te 7 # Permit mediaserver to create sockets with no specific SELinux class.
  /device/lge/mako/sepolicy/
mediaserver.te 7 # Permit mediaserver to create sockets with no specific SELinux class.
  /external/iptables/extensions/
libxt_SECMARK.man 2 packet for use by security subsystems such as SELinux. It is

Completed in 687 milliseconds

1 2 3 4 5 6 7 8 91011>>