/ndk/sources/host-tools/sed-4.2.1/m4/ |
selinux-selinux-h.m4 | 8 # Provide <selinux/selinux.h>, if necessary. 13 AC_CHECK_HEADERS([selinux/selinux.h], 15 [SELINUX_SELINUX_H=selinux/selinux.h]) 22 AC_MSG_WARN([libselinux was found but selinux/selinux.h is missing.]) 23 AC_MSG_WARN([AC_PACKAGE_NAME will be compiled without SELinux support.]) 33 AC_SEARCH_LIBS([setfilecon], [selinux], [all...] |
selinux-context-h.m4 | 8 # Provide <selinux/context.h>, if necessary. 12 AC_CHECK_HEADERS([selinux/context.h], 14 [SELINUX_CONTEXT_H=selinux/context.h])
|
/frameworks/base/core/tests/coretests/src/android/os/ |
SELinuxTest.java | 4 import android.os.SELinux; 11 if(SELinux.isSELinuxEnabled() == false) 14 String ctx = SELinux.getFileContext("/system/bin/toolbox"); 19 if(SELinux.isSELinuxEnabled() == false) 22 String mycon = SELinux.getContext(); 27 if(SELinux.isSELinuxEnabled() == false) 30 String mycon = SELinux.getPidContext(Process.myPid()); 35 if(SELinux.isSELinuxEnabled() == false) 38 String mycon = SELinux.getContext(); 40 ret = SELinux.checkSELinuxAccess(mycon, mycon, "process", "fork") [all...] |
/external/libselinux/src/ |
policy.h | 6 /* xattr name for SELinux attributes. */ 7 #define XATTR_NAME_SELINUX "security.selinux" 16 #define SELINUXMNT "/sys/fs/selinux" 17 #define OLDSELINUXMNT "/selinux"
|
avc_sidtab.h | 8 #include <selinux/selinux.h> 9 #include <selinux/avc.h>
|
context_internal.h | 1 #include <selinux/context.h>
|
enabled.c | 20 * will assume that if a selinux file system is mounted, then 21 * selinux is enabled. */ 24 /* Since a file system is mounted, we consider selinux 25 * enabled. If getcon fails, selinux is still enabled. 51 /* Since an selinux file system is available, we consider 52 * selinux enabled. If getcon fails, selinux is still
|
callbacks.h | 11 #include <selinux/selinux.h>
|
mapping.h | 9 #include <selinux/selinux.h>
|
/external/qemu/distrib/libselinux/src/ |
policy.h | 6 /* xattr name for SELinux attributes. */ 7 #define XATTR_NAME_SELINUX "security.selinux" 16 #define SELINUXMNT "/sys/fs/selinux" 17 #define OLDSELINUXMNT "/selinux"
|
avc_sidtab.h | 8 #include <selinux/selinux.h> 9 #include <selinux/avc.h>
|
context_internal.h | 1 #include <selinux/context.h>
|
enabled.c | 20 * will assume that if a selinux file system is mounted, then 21 * selinux is enabled. */ 24 /* Since a file system is mounted, we consider selinux 25 * enabled. If getcon fails, selinux is still enabled. 51 /* Since an selinux file system is available, we consider 52 * selinux enabled. If getcon fails, selinux is still
|
callbacks.h | 11 #include <selinux/selinux.h>
|
mapping.h | 9 #include <selinux/selinux.h>
|
/system/core/toolbox/ |
getenforce.c | 5 #include <selinux/selinux.h>
|
chcon.c | 5 #include <selinux/selinux.h>
|
runcon.c | 6 #include <selinux/selinux.h>
|
/frameworks/base/core/java/android/os/ |
SELinux.java | 27 * SELinux interaction. 30 public class SELinux { 31 private static final String TAG = "SELinux"; 33 /** Keep in sync with ./external/libselinux/include/selinux/android.h */ 41 * Determine whether SELinux is disabled or enabled. 42 * @return a boolean indicating whether SELinux is enabled. 47 * Determine whether SELinux is permissive or enforcing. 48 * @return a boolean indicating whether SELinux is enforcing. 53 * Set whether SELinux is permissive or enforcing. 54 * @param value representing whether to set SELinux to enforcin [all...] |
/bootable/recovery/updater/ |
updater.h | 23 #include <selinux/selinux.h> 24 #include <selinux/label.h>
|
/external/checkpolicy/ |
checkpolicy.8 | 3 checkpolicy \- SELinux policy compiler 14 is a program that checks and compiles a SELinux security policy configuration 37 Specify the target platform (selinux or xen). 49 SELinux documentation at http://www.nsa.gov/research/selinux, 50 especially "Configuring the SELinux Policy".
|
/device/asus/flo/sepolicy/ |
mediaserver.te | 7 # Permit mediaserver to create sockets with no specific SELinux class.
|
/device/lge/hammerhead/sepolicy/ |
mediaserver.te | 7 # Permit mediaserver to create sockets with no specific SELinux class.
|
/device/lge/mako/sepolicy/ |
mediaserver.te | 7 # Permit mediaserver to create sockets with no specific SELinux class.
|
/external/iptables/extensions/ |
libxt_SECMARK.man | 2 packet for use by security subsystems such as SELinux. It is
|