/external/qemu/distrib/libselinux/src/ |
selinux_internal.h | 1 #include <selinux/selinux.h>
|
android.c | 18 #include <selinux/selinux.h> 19 #include <selinux/context.h> 20 #include <selinux/android.h> 21 #include <selinux/label.h> 22 #include <selinux/avc.h> 813 selinux_log(SELINUX_ERROR, "SELinux: Could not open %s: %s\n", 818 selinux_log(SELINUX_ERROR, "SELinux: Could not stat %s: %s\n", 825 selinux_log(SELINUX_ERROR, "SELinux: Could not map %s: %s\n", 834 selinux_log(SELINUX_INFO, "SELinux: Loaded file_contexts from %s\n" [all...] |
mapping.c | 10 #include <selinux/selinux.h> 11 #include <selinux/avc.h>
|
sestatus.c | 4 * APIs to reference SELinux kernel status page (/selinux/status) 20 * copied from the selinux/include/security.h 128 * It returns the current performing mode of SELinux. 200 * 0 means SELinux treats policy queries on undefined stuff being allowed, 249 * It tries to open and mmap kernel status page (/selinux/status).
|
label.c | 13 #include <selinux/selinux.h>
|
/system/core/logd/ |
README.property | 4 logd.auditd bool true Enable selinux audit daemon 5 logd.auditd.dmesg bool true selinux audit messages duplicated and
|
/external/libselinux/src/ |
android.c | 18 #include <selinux/selinux.h> 19 #include <selinux/context.h> 20 #include <selinux/android.h> 21 #include <selinux/label.h> 22 #include <selinux/avc.h> 820 selinux_log(SELINUX_ERROR, "SELinux: Could not open %s: %s\n", 825 selinux_log(SELINUX_ERROR, "SELinux: Could not stat %s: %s\n", 832 selinux_log(SELINUX_ERROR, "SELinux: Could not map %s: %s\n", 841 selinux_log(SELINUX_INFO, "SELinux: Loaded file_contexts from %s\n" [all...] |
mapping.c | 10 #include <selinux/selinux.h> 11 #include <selinux/avc.h>
|
sestatus.c | 4 * APIs to reference SELinux kernel status page (/selinux/status) 20 * copied from the selinux/include/security.h 128 * It returns the current performing mode of SELinux. 200 * 0 means SELinux treats policy queries on undefined stuff being allowed, 249 * It tries to open and mmap kernel status page (/selinux/status).
|
label.c | 13 #include <selinux/selinux.h>
|
/frameworks/base/core/jni/ |
android_os_SELinux.cpp | 23 #include "selinux/selinux.h" 24 #include "selinux/android.h" 43 * Purpose: checks whether SELinux is enabled/disbaled 54 * Purpose: return the current SELinux enforce mode 269 * Purpose: Gets a list of the SELinux boolean names. 271 * Returns: an array of strings containing the SELinux boolean names. 300 * Purpose: Gets the value for the given SELinux boolean name. 302 * String: The name of the SELinux boolean. 324 * Purpose: Sets the value for the given SELinux boolean name [all...] |
/cts/tests/tests/security/src/android/security/cts/ |
SELinuxDomainTest.java | 38 * Verify that the processes running within an SELinux domain are sane. 49 * The domain or SELinux context to check. 53 String msg = "Expected no processes in SELinux domain \"" + domain + "\"" 63 * The domain or SELinux context to check. 69 String msg = "Expected 1 process in SELinux domain \"" + domain + "\"" 74 msg = "Expected executable \"" + executable + "\" in SELinux domain \"" + domain + "\"" 85 * The domain or SELinux context to check. 97 String msg = "Expected 1 process in SELinux domain \"" + domain + "\"" 101 msg = "Expected executable \"" + executable + "\" in SELinux domain \"" + domain + "\"" 111 * The domain or SELinux context to check [all...] |
KernelSettingsTest.java | 38 * Ensure that SELinux is in enforcing mode. 42 assertEquals("1", getFile("/sys/fs/selinux/enforce")); 44 fail("SELinux is not compiled into this kernel, or is disabled.");
|
SELinuxTest.java | 37 * Verify that the SELinux configuration is sane. 80 File[] files = new File("/sys/fs/selinux/booleans/").listFiles();
|
/frameworks/base/services/core/java/com/android/server/updates/ |
SELinuxPolicyInstallReceiver.java | 128 Slog.i(TAG, "Applying SELinux policy"); 144 SystemProperties.set("selinux.reload_policy", "1"); 153 Slog.e(TAG, "SELinux policy update malformed: ", e); 155 Slog.e(TAG, "Could not update selinux policy: ", e); 157 Slog.e(TAG, "Could not update selinux policy: ", e);
|
/cts/tools/selinux/ |
SELinuxNeverallowTestFrame.py | 38 * Neverallow Rules SELinux tests. 75 mDevice.executeAdbCommand("pull", "/sys/fs/selinux/policy", 102 assertTrue("The following errors were encountered when validating the SELinux"
|
/docs/source.android.com/src/devices/tech/security/ |
enhancements50.jd | 18 <li><strong>Android sandbox reinforced with SELinux</strong>. Android now 19 requires SELinux in enforcing mode for all domains. SELinux is a
|
/external/ipsec-tools/src/racoon/ |
security.c | 40 #include <selinux/selinux.h> 41 #include <selinux/flask.h> 42 #include <selinux/av_permissions.h> 43 #include <selinux/avc.h> 44 #include <selinux/context.h>
|
/cts/tests/tests/security/jni/ |
android_security_cts_SELinuxTest.cpp | 18 #include <selinux/selinux.h>
|
/external/chromium_org/third_party/mesa/src/src/mapi/mapi/ |
u_execmem.c | 55 #include <selinux/selinux.h>
|
/external/chromium_org/third_party/mesa/src/src/mesa/main/ |
execmem.c | 51 #include <selinux/selinux.h>
|
/external/mesa3d/src/mapi/mapi/ |
u_execmem.c | 55 #include <selinux/selinux.h>
|
/external/mesa3d/src/mesa/main/ |
execmem.c | 51 #include <selinux/selinux.h>
|
/build/target/product/ |
embedded.mk | 73 # SELinux packages
|
/external/chromium_org/content/common/sandbox_linux/android/ |
sandbox_bpf_base_policy_android.cc | 33 // access. It may be possible to restrict the filesystem with SELinux.
|