/external/qemu/distrib/libselinux/src/ |
init.c | 39 /* We check to see if the preferred mount point for selinux file
|
/external/sepolicy/ |
Android.mk | 10 # When we're close to a release and SELinux new policy development 21 # SELinux policy version. 22 # Must be <= /selinux/policyvers reported by the Android kernel. 268 LOCAL_MODULE := selinux-network.sh
|
kernel.te | 31 # process from turning off SELinux once enabled.
|
init.te | 48 # setprop selinux.reload_policy 1 from init.rc post-fs-data. 51 # Reload policy upon setprop selinux.reload_policy 1.
|
/prebuilts/ndk/9/platforms/android-21/arch-arm/usr/include/linux/ |
xattr.h | 46 #define XATTR_SELINUX_SUFFIX "selinux"
|
/prebuilts/ndk/9/platforms/android-21/arch-arm64/usr/include/linux/ |
xattr.h | 46 #define XATTR_SELINUX_SUFFIX "selinux"
|
/prebuilts/ndk/9/platforms/android-21/arch-mips/usr/include/linux/ |
xattr.h | 46 #define XATTR_SELINUX_SUFFIX "selinux"
|
/prebuilts/ndk/9/platforms/android-21/arch-mips64/usr/include/linux/ |
xattr.h | 46 #define XATTR_SELINUX_SUFFIX "selinux"
|
/prebuilts/ndk/9/platforms/android-21/arch-x86/usr/include/linux/ |
xattr.h | 46 #define XATTR_SELINUX_SUFFIX "selinux"
|
/prebuilts/ndk/9/platforms/android-21/arch-x86_64/usr/include/linux/ |
xattr.h | 46 #define XATTR_SELINUX_SUFFIX "selinux"
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/ |
test_commands.py | 55 # . = has a SELinux security context
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/ |
test_commands.py | 55 # . = has a SELinux security context
|
/docs/source.android.com/src/ |
index.jd | 58 <h4>Encryption and SELinux revised</h4></a> 63 encryption and full enforcement of SELinux.</p>
|
/external/chromium_org/content/browser/zygote_host/ |
zygote_host_impl_linux.cc | 442 // However, Fedora (and other SELinux systems) don't like us touching other 446 // The offical way to get the SELinux mode is selinux_getenforcemode, but I 448 // problems with other, non-SELinux distros. 450 // So we just check for files in /selinux. This isn't foolproof, but it's not 453 static bool selinux; local 457 const base::FilePath kSelinuxPath("/selinux"); 461 selinux = access(kSelinuxPath.value().c_str(), X_OK) == 0 && 466 if (using_suid_sandbox_ && !selinux) {
|
/external/ipsec-tools/src/racoon/ |
policy.h | 156 #include <selinux/selinux.h>
|
/system/core/init/ |
ueventd.c | 24 #include <selinux/selinux.h>
|
/system/core/logd/ |
main.cpp | 46 // init is out of the way, pedantically all permissions and selinux 191 // LogAudit listens on NETLINK_AUDIT socket for selinux
|
/system/core/run-as/ |
run-as.c | 32 #include <selinux/android.h> 159 panic("Could not set SELinux security context: %s\n", strerror(errno));
|
/external/qemu/distrib/ext4_utils/src/ |
make_ext4fs.c | 63 #include <selinux/selinux.h> 64 #include <selinux/label.h> 65 #include <selinux/android.h> 303 error("failed to set SELinux context on %s\n", dentries[i].path);
|
/external/yaffs2/yaffs2/utils/ |
mkyaffs2image.c | 35 #define XATTR_NAME_SELINUX "security.selinux" 36 #include <selinux/selinux.h> 37 #include <selinux/label.h> 529 fprintf(stderr," file_contexts the file contexts configuration used to assign SELinux file context attributes\n");
|
/packages/apps/Settings/src/com/android/settings/ |
DeviceInfoSettings.java | 30 import android.os.SELinux; 70 private static final String PROPERTY_SELINUX_STATUS = "ro.build.selinux"; 105 if (!SELinux.isSELinuxEnabled()) { 108 } else if (!SELinux.isSELinuxEnforced()) { 113 // Remove selinux information if property is not present
|
/system/extras/ext4_utils/ |
make_ext4fs.c | 63 #include <selinux/selinux.h> 64 #include <selinux/label.h> 65 #include <selinux/android.h> 307 error("failed to set SELinux context on %s\n", dentries[i].path);
|
/frameworks/base/core/java/com/android/internal/os/ |
ZygoteConnection.java | 22 import android.os.SELinux; 104 peerSecurityContext = SELinux.getPeerContext(mSocket.getFileDescriptor()); 690 boolean allowed = SELinux.checkSELinuxAccess(peerSecurityContext, 754 boolean allowed = SELinux.checkSELinuxAccess(peerSecurityContext, 789 boolean allowed = SELinux.checkSELinuxAccess(peerSecurityContext, 801 * Applies zygote security policy for SELinux information. 820 "This UID may not specify SELinux info."); 823 boolean allowed = SELinux.checkSELinuxAccess(peerSecurityContext, 829 "Peer may not specify SELinux info"); [all...] |
/external/libselinux/include/selinux/ |
selinux.h | 11 /* Return 1 if we are running on a SELinux kernel, or 0 if not or -1 if we get an error. */ 13 /* Return 1 if we are running on a SELinux MLS kernel, or 0 otherwise. */ 230 /* Disable SELinux at runtime (must be done prior to initial policy load). */
|
/external/ltrace/ |
configure.ac | 128 AC_CHECK_HEADERS(selinux/selinux.h) 129 AC_CHECK_LIB(selinux, security_get_boolean_active)
|