HomeSort by relevance Sort by last modified time
    Searched full:selinux (Results 76 - 100 of 347) sorted by null

1 2 34 5 6 7 8 91011>>

  /external/qemu/distrib/libselinux/src/
selinux_internal.h 1 #include <selinux/selinux.h>
android.c 18 #include <selinux/selinux.h>
19 #include <selinux/context.h>
20 #include <selinux/android.h>
21 #include <selinux/label.h>
22 #include <selinux/avc.h>
813 selinux_log(SELINUX_ERROR, "SELinux: Could not open %s: %s\n",
818 selinux_log(SELINUX_ERROR, "SELinux: Could not stat %s: %s\n",
825 selinux_log(SELINUX_ERROR, "SELinux: Could not map %s: %s\n",
834 selinux_log(SELINUX_INFO, "SELinux: Loaded file_contexts from %s\n"
    [all...]
mapping.c 10 #include <selinux/selinux.h>
11 #include <selinux/avc.h>
sestatus.c 4 * APIs to reference SELinux kernel status page (/selinux/status)
20 * copied from the selinux/include/security.h
128 * It returns the current performing mode of SELinux.
200 * 0 means SELinux treats policy queries on undefined stuff being allowed,
249 * It tries to open and mmap kernel status page (/selinux/status).
label.c 13 #include <selinux/selinux.h>
  /system/core/logd/
README.property 4 logd.auditd bool true Enable selinux audit daemon
5 logd.auditd.dmesg bool true selinux audit messages duplicated and
  /external/libselinux/src/
android.c 18 #include <selinux/selinux.h>
19 #include <selinux/context.h>
20 #include <selinux/android.h>
21 #include <selinux/label.h>
22 #include <selinux/avc.h>
820 selinux_log(SELINUX_ERROR, "SELinux: Could not open %s: %s\n",
825 selinux_log(SELINUX_ERROR, "SELinux: Could not stat %s: %s\n",
832 selinux_log(SELINUX_ERROR, "SELinux: Could not map %s: %s\n",
841 selinux_log(SELINUX_INFO, "SELinux: Loaded file_contexts from %s\n"
    [all...]
mapping.c 10 #include <selinux/selinux.h>
11 #include <selinux/avc.h>
sestatus.c 4 * APIs to reference SELinux kernel status page (/selinux/status)
20 * copied from the selinux/include/security.h
128 * It returns the current performing mode of SELinux.
200 * 0 means SELinux treats policy queries on undefined stuff being allowed,
249 * It tries to open and mmap kernel status page (/selinux/status).
label.c 13 #include <selinux/selinux.h>
  /frameworks/base/core/jni/
android_os_SELinux.cpp 23 #include "selinux/selinux.h"
24 #include "selinux/android.h"
43 * Purpose: checks whether SELinux is enabled/disbaled
54 * Purpose: return the current SELinux enforce mode
269 * Purpose: Gets a list of the SELinux boolean names.
271 * Returns: an array of strings containing the SELinux boolean names.
300 * Purpose: Gets the value for the given SELinux boolean name.
302 * String: The name of the SELinux boolean.
324 * Purpose: Sets the value for the given SELinux boolean name
    [all...]
  /cts/tests/tests/security/src/android/security/cts/
SELinuxDomainTest.java 38 * Verify that the processes running within an SELinux domain are sane.
49 * The domain or SELinux context to check.
53 String msg = "Expected no processes in SELinux domain \"" + domain + "\""
63 * The domain or SELinux context to check.
69 String msg = "Expected 1 process in SELinux domain \"" + domain + "\""
74 msg = "Expected executable \"" + executable + "\" in SELinux domain \"" + domain + "\""
85 * The domain or SELinux context to check.
97 String msg = "Expected 1 process in SELinux domain \"" + domain + "\""
101 msg = "Expected executable \"" + executable + "\" in SELinux domain \"" + domain + "\""
111 * The domain or SELinux context to check
    [all...]
KernelSettingsTest.java 38 * Ensure that SELinux is in enforcing mode.
42 assertEquals("1", getFile("/sys/fs/selinux/enforce"));
44 fail("SELinux is not compiled into this kernel, or is disabled.");
SELinuxTest.java 37 * Verify that the SELinux configuration is sane.
80 File[] files = new File("/sys/fs/selinux/booleans/").listFiles();
  /frameworks/base/services/core/java/com/android/server/updates/
SELinuxPolicyInstallReceiver.java 128 Slog.i(TAG, "Applying SELinux policy");
144 SystemProperties.set("selinux.reload_policy", "1");
153 Slog.e(TAG, "SELinux policy update malformed: ", e);
155 Slog.e(TAG, "Could not update selinux policy: ", e);
157 Slog.e(TAG, "Could not update selinux policy: ", e);
  /cts/tools/selinux/
SELinuxNeverallowTestFrame.py 38 * Neverallow Rules SELinux tests.
75 mDevice.executeAdbCommand("pull", "/sys/fs/selinux/policy",
102 assertTrue("The following errors were encountered when validating the SELinux"
  /docs/source.android.com/src/devices/tech/security/
enhancements50.jd 18 <li><strong>Android sandbox reinforced with SELinux</strong>. Android now
19 requires SELinux in enforcing mode for all domains. SELinux is a
  /external/ipsec-tools/src/racoon/
security.c 40 #include <selinux/selinux.h>
41 #include <selinux/flask.h>
42 #include <selinux/av_permissions.h>
43 #include <selinux/avc.h>
44 #include <selinux/context.h>
  /cts/tests/tests/security/jni/
android_security_cts_SELinuxTest.cpp 18 #include <selinux/selinux.h>
  /external/chromium_org/third_party/mesa/src/src/mapi/mapi/
u_execmem.c 55 #include <selinux/selinux.h>
  /external/chromium_org/third_party/mesa/src/src/mesa/main/
execmem.c 51 #include <selinux/selinux.h>
  /external/mesa3d/src/mapi/mapi/
u_execmem.c 55 #include <selinux/selinux.h>
  /external/mesa3d/src/mesa/main/
execmem.c 51 #include <selinux/selinux.h>
  /build/target/product/
embedded.mk 73 # SELinux packages
  /external/chromium_org/content/common/sandbox_linux/android/
sandbox_bpf_base_policy_android.cc 33 // access. It may be possible to restrict the filesystem with SELinux.

Completed in 795 milliseconds

1 2 34 5 6 7 8 91011>>