HomeSort by relevance Sort by last modified time
    Searched full:selinux (Results 151 - 175 of 347) sorted by null

1 2 3 4 5 67 8 91011>>

  /external/qemu/distrib/libselinux/include/selinux/
selinux.h 11 /* Return 1 if we are running on a SELinux kernel, or 0 if not or -1 if we get an error. */
13 /* Return 1 if we are running on a SELinux MLS kernel, or 0 otherwise. */
230 /* Disable SELinux at runtime (must be done prior to initial policy load). */
avc.h 12 #include <selinux/selinux.h>
469 * selinux_status_open - Open and map SELinux kernel status page
475 * selinux_status_close - Unmap and close SELinux kernel status page
  /system/core/init/
readme.txt 77 Context is the SELinux security context for the socket.
223 Set the SELinux system-wide enforcing status.
236 Set SELinux boolean <name> to <value>.
property_service.c 44 #include <selinux/selinux.h>
45 #include <selinux/label.h>
251 } else if (strcmp("selinux.reload_policy", name) == 0 &&
devices.c 34 #include <selinux/selinux.h>
35 #include <selinux/label.h>
36 #include <selinux/android.h>
37 #include <selinux/avc.h>
163 // Now fixup SELinux file labels
util.c 27 #include <selinux/label.h>
28 #include <selinux/android.h>
  /cts/tests/tests/security/src/android/security/cts/
ServicePermissionsTest.java 112 // SELinux likely prevented the dump - assume safe
  /docs/source.android.com/src/devices/
devices_toc.cs 311 <li><a href="<?cs var:toroot ?>devices/tech/security/selinux/concepts.html">Concepts</a></li>
312 <li><a href="<?cs var:toroot ?>devices/tech/security/selinux/implement.html">Implementation</a></li>
313 <li><a href="<?cs var:toroot ?>devices/tech/security/selinux/customize.html">Customization</a></li>
314 <li><a href="<?cs var:toroot ?>devices/tech/security/selinux/validate.html">Validation</a></li>
  /external/libselinux/include/selinux/
avc.h 12 #include <selinux/selinux.h>
469 * selinux_status_open - Open and map SELinux kernel status page
475 * selinux_status_close - Unmap and close SELinux kernel status page
  /external/libselinux/src/
avc_internal.h 15 #include <selinux/avc.h>
avc_sidtab.c 12 #include <selinux/avc.h>
  /external/libsepol/include/sepol/
policydb.h 133 * Check whether the compatibility mode for SELinux network
  /external/libsepol/src/
policydb_public.c 185 * Enable compatibility mode for SELinux network checks iff
  /external/qemu/distrib/ext4_utils/src/
contents.c 27 #define XATTR_SELINUX_SUFFIX "selinux"
293 * of the name. For example, XATTR_SELINUX_SUFFIX ("selinux") comes before
294 * XATTR_CAPS_SUFFIX ("capability") because "selinux" is shorter than "capability"
296 * which name comes first. For example, "selinux" would come before "yelinux".
  /external/qemu/distrib/libselinux/src/
avc_internal.h 15 #include <selinux/avc.h>
avc_sidtab.c 12 #include <selinux/avc.h>
  /external/sepolicy/
installd.te 17 # Check validity of SELinux context before use.
access_vectors 445 mac_override # unused by SELinux
446 mac_admin # unused by SELinux
  /ndk/sources/host-tools/sed-4.2.1/m4/
gnulib-comp.m4 325 lib/se-selinux.in.h
417 m4/selinux-context-h.m4
418 m4/selinux-selinux-h.m4
  /system/extras/ext4_utils/
contents.c 27 #define XATTR_SELINUX_SUFFIX "selinux"
305 * of the name. For example, XATTR_SELINUX_SUFFIX ("selinux") comes before
306 * XATTR_CAPS_SUFFIX ("capability") because "selinux" is shorter than "capability"
308 * which name comes first. For example, "selinux" would come before "yelinux".
  /external/qemu/android/
cmdline-options.h 163 OPT_PARAM(selinux, "<disabled|permissive>", "Set SELinux to either disabled or permissive mode")
  /system/core/rootdir/
init.rc 17 # Apply strict SELinux checking of PROT_EXEC on mmap/mprotect calls.
18 write /sys/fs/selinux/checkreqprot 0
218 # make the selinux kernel policy world-readable
219 chmod 0444 /sys/fs/selinux/policy
314 setprop selinux.reload_policy 1
316 # Set SELinux security contexts on upgrade or policy update.
  /ndk/sources/host-tools/sed-4.2.1/lib/
Makefile.in 26 # Reproduce by: gnulib-tool --import --dir=. --local-dir=gl --lib=libsed --source-base=lib --m4-base=m4 --doc-base=doc --tests-base=tests --aux-dir=build-aux --no-libtool --macro-prefix=gl acl alloca btowc c-ctype extensions getline getopt gettext localcharset mbrlen mbrtowc mbsinit memchr mkstemp obstack pathmax regex rename selinux-h stat-macros stdbool strerror strverscmp unlocked-io verify wcrtomb wctob
79 $(top_srcdir)/m4/selinux-context-h.m4 \
80 $(top_srcdir)/m4/selinux-selinux-h.m4 \
623 errno.h-t getopt.h getopt.h-t selinux/selinux.h \
624 selinux/selinux.h-t selinux/context.h selinux/context.h-t
    [all...]
  /frameworks/base/core/java/com/android/internal/content/
NativeLibraryHelper.java 35 import android.os.SELinux;
270 } else if (!SELinux.restorecon(path)) {
271 throw new IOException("Cannot set SELinux context for " + path.getPath());
  /cts/tests/tests/permission/src/android/permission/cts/
FileSystemPermissionTest.java 657 new File("/sys/fs/selinux/member"),
658 new File("/sys/fs/selinux/user"),
659 new File("/sys/fs/selinux/relabel"),
660 new File("/sys/fs/selinux/create"),
661 new File("/sys/fs/selinux/access"),
662 new File("/sys/fs/selinux/context")
    [all...]

Completed in 807 milliseconds

1 2 3 4 5 67 8 91011>>