HomeSort by relevance Sort by last modified time
    Searched full:selinux (Results 126 - 150 of 347) sorted by null

1 2 3 4 56 7 8 91011>>

  /external/qemu/distrib/libselinux/src/
init.c 39 /* We check to see if the preferred mount point for selinux file
  /external/sepolicy/
Android.mk 10 # When we're close to a release and SELinux new policy development
21 # SELinux policy version.
22 # Must be <= /selinux/policyvers reported by the Android kernel.
268 LOCAL_MODULE := selinux-network.sh
kernel.te 31 # process from turning off SELinux once enabled.
init.te 48 # setprop selinux.reload_policy 1 from init.rc post-fs-data.
51 # Reload policy upon setprop selinux.reload_policy 1.
  /prebuilts/ndk/9/platforms/android-21/arch-arm/usr/include/linux/
xattr.h 46 #define XATTR_SELINUX_SUFFIX "selinux"
  /prebuilts/ndk/9/platforms/android-21/arch-arm64/usr/include/linux/
xattr.h 46 #define XATTR_SELINUX_SUFFIX "selinux"
  /prebuilts/ndk/9/platforms/android-21/arch-mips/usr/include/linux/
xattr.h 46 #define XATTR_SELINUX_SUFFIX "selinux"
  /prebuilts/ndk/9/platforms/android-21/arch-mips64/usr/include/linux/
xattr.h 46 #define XATTR_SELINUX_SUFFIX "selinux"
  /prebuilts/ndk/9/platforms/android-21/arch-x86/usr/include/linux/
xattr.h 46 #define XATTR_SELINUX_SUFFIX "selinux"
  /prebuilts/ndk/9/platforms/android-21/arch-x86_64/usr/include/linux/
xattr.h 46 #define XATTR_SELINUX_SUFFIX "selinux"
  /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/
test_commands.py 55 # . = has a SELinux security context
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/
test_commands.py 55 # . = has a SELinux security context
  /docs/source.android.com/src/
index.jd 58 <h4>Encryption and SELinux revised</h4></a>
63 encryption and full enforcement of SELinux.</p>
  /external/chromium_org/content/browser/zygote_host/
zygote_host_impl_linux.cc 442 // However, Fedora (and other SELinux systems) don't like us touching other
446 // The offical way to get the SELinux mode is selinux_getenforcemode, but I
448 // problems with other, non-SELinux distros.
450 // So we just check for files in /selinux. This isn't foolproof, but it's not
453 static bool selinux; local
457 const base::FilePath kSelinuxPath("/selinux");
461 selinux = access(kSelinuxPath.value().c_str(), X_OK) == 0 &&
466 if (using_suid_sandbox_ && !selinux) {
  /external/ipsec-tools/src/racoon/
policy.h 156 #include <selinux/selinux.h>
  /system/core/init/
ueventd.c 24 #include <selinux/selinux.h>
  /system/core/logd/
main.cpp 46 // init is out of the way, pedantically all permissions and selinux
191 // LogAudit listens on NETLINK_AUDIT socket for selinux
  /system/core/run-as/
run-as.c 32 #include <selinux/android.h>
159 panic("Could not set SELinux security context: %s\n", strerror(errno));
  /external/qemu/distrib/ext4_utils/src/
make_ext4fs.c 63 #include <selinux/selinux.h>
64 #include <selinux/label.h>
65 #include <selinux/android.h>
303 error("failed to set SELinux context on %s\n", dentries[i].path);
  /external/yaffs2/yaffs2/utils/
mkyaffs2image.c 35 #define XATTR_NAME_SELINUX "security.selinux"
36 #include <selinux/selinux.h>
37 #include <selinux/label.h>
529 fprintf(stderr," file_contexts the file contexts configuration used to assign SELinux file context attributes\n");
  /packages/apps/Settings/src/com/android/settings/
DeviceInfoSettings.java 30 import android.os.SELinux;
70 private static final String PROPERTY_SELINUX_STATUS = "ro.build.selinux";
105 if (!SELinux.isSELinuxEnabled()) {
108 } else if (!SELinux.isSELinuxEnforced()) {
113 // Remove selinux information if property is not present
  /system/extras/ext4_utils/
make_ext4fs.c 63 #include <selinux/selinux.h>
64 #include <selinux/label.h>
65 #include <selinux/android.h>
307 error("failed to set SELinux context on %s\n", dentries[i].path);
  /frameworks/base/core/java/com/android/internal/os/
ZygoteConnection.java 22 import android.os.SELinux;
104 peerSecurityContext = SELinux.getPeerContext(mSocket.getFileDescriptor());
690 boolean allowed = SELinux.checkSELinuxAccess(peerSecurityContext,
754 boolean allowed = SELinux.checkSELinuxAccess(peerSecurityContext,
789 boolean allowed = SELinux.checkSELinuxAccess(peerSecurityContext,
801 * Applies zygote security policy for SELinux information.
820 "This UID may not specify SELinux info.");
823 boolean allowed = SELinux.checkSELinuxAccess(peerSecurityContext,
829 "Peer may not specify SELinux info");
    [all...]
  /external/libselinux/include/selinux/
selinux.h 11 /* Return 1 if we are running on a SELinux kernel, or 0 if not or -1 if we get an error. */
13 /* Return 1 if we are running on a SELinux MLS kernel, or 0 otherwise. */
230 /* Disable SELinux at runtime (must be done prior to initial policy load). */
  /external/ltrace/
configure.ac 128 AC_CHECK_HEADERS(selinux/selinux.h)
129 AC_CHECK_LIB(selinux, security_get_boolean_active)

Completed in 809 milliseconds

1 2 3 4 56 7 8 91011>>