HomeSort by relevance Sort by last modified time
    Searched full:selinux (Results 201 - 225 of 1108) sorted by null

1 2 3 4 5 6 7 891011>>

  /external/autotest/client/tests/kvm/unattended/
Fedora-14.ks 10 selinux --enforcing
33 os.system('echo 0 > /selinux/enforce')
Fedora-15.ks 10 selinux --enforcing
33 os.system('echo 0 > /selinux/enforce')
Fedora-8.ks 11 selinux --enforcing
31 os.system('echo 0 > /selinux/enforce')
Fedora-9.ks 11 selinux --enforcing
32 os.system('echo 0 > /selinux/enforce')
RHEL-4-series.ks 11 selinux --enforcing
31 os.system('echo 0 > /selinux/enforce')
RHEL-5-series.ks 11 selinux --enforcing
33 os.system('echo 0 > /selinux/enforce')
RHEL-6-series.ks 11 selinux --enforcing
36 os.system('echo 0 > /selinux/enforce')
  /external/dbus/doc/
busconfig.dtd 14 selinux)*>
61 <!ELEMENT selinux (associate)*>
  /external/dbus/test/data/valid-config-files/
basic.conf 25 <selinux>
30 </selinux>
  /external/libselinux/src/
enabled.c 14 * will assume that if a selinux file system is mounted, then
15 * selinux is enabled. */
  /external/selinux/libselinux/man/man3/
selinux_status_open.3 1 .TH "selinux_status_open" "3" "22 January 2011" "kaigai@ak.jp.nec.com" "SELinux API documentation"
5 selinux_status_deny_unknown \- reference the SELinux kernel status
9 .B #include <selinux/avc.h>
24 Linux 2.6.37 or later provides a SELinux kernel status page; being mostly
26 .I /selinux/status
41 .I /selinux/status
65 returns 0 if SELinux is running in permissive mode, 1 if enforcing mode,
78 returns 0 if SELinux treats policy queries on undefined object classes or
init_selinuxmnt.3 1 .TH "init_selinuxmnt" "3" "21 Nov 2009" "" "SELinux API documentation"
31 .BR selinux (8),
context_new.3 1 .TH "context_new" "3" "20 December 2011" "dwalsh@redhat.com" "SELinux API documentation"
3 context_new, context_str, context_free, context_type_get, context_type_set, context_range_get, context_range_set,context_role_get, context_role_set, context_user_get, context_user_set \- Routines to manipulate SELinux security contexts
6 .B #include <selinux/context.h>
83 .BR selinux "(8)"
  /external/selinux/libselinux/utils/
compute_user.c 9 #include <selinux/selinux.h>
selinux_check_securetty_context.c 10 #include <selinux/selinux.h>
  /docs/source.android.com/src/security/selinux/
index.jd 33 Security-Enhanced Linux (SELinux) is used to further define the boundaries of
37 security model</a>, Android uses SELinux to enforce mandatory access control
39 (a.k.a. Linux capabilities). SELinux enhances Android security by confining
46 SELinux, Android can better protect and confine system services, control
50 <p>Android includes SELinux in enforcing mode and a
56 refine their software and SELinux policies before enforcing them.</p>
60 <p>SELinux operates on the ethos of default denial. Anything that is not
61 explicitly allowed is denied. SELinux can operate in one of two global modes:
63 enforcing mode, in which denials are both logged and enforced. SELinux also
69 incremental application of SELinux to an ever-increasing portion of the system
    [all...]
  /external/selinux/libsemanage/man/man3/
semanage_fcontext.3 4 semanage_fcontext \- SELinux File Context Management API
14 This object contains properties associated with a SELinux file context specification
92 return the SELinux context for this file context spec
97 set the SELinux context for this file context spec
  /external/selinux/libsemanage/src/
libsemanage.pc.in 7 Description: SELinux management library
  /external/selinux/libsepol/man/man8/
genpolbools.8 1 .TH "genpolbools" "8" "11 August 2004" "sds@epoch.ncsc.mil" "SELinux Command Line documentation"
  /external/selinux/policycoreutils/sepolicy/sepolicy/help/
system_relabel.txt 0 SELinux is a labeling system. Sometimes the labels on disk can get messed up. One way to fix this is to trigger a full relabel on the next boot.
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/linux/netfilter/
xt_SECMARK.h 13 #define SECMARK_MODE_SEL 0x01 /* SELinux */
  /system/sepolicy/tools/fc_sort/
README 3 * https://fedoraproject.org/wiki/SELinux/ManagingFileContext
  /system/sepolicy/tools/sepolicy-analyze/
Android.mk 8 LOCAL_C_INCLUDES := external/selinux/libsepol/include
  /bootable/recovery/minzip/
DirUtil.h 27 #include <selinux/selinux.h>
28 #include <selinux/label.h>
  /external/selinux/
README 1 Please submit all bug reports and patches to selinux@tycho.nsa.gov.
2 Subscribe via selinux-join@tycho.nsa.gov.
17 This may render your system unusable if the upstream SELinux userspace

Completed in 406 milliseconds

1 2 3 4 5 6 7 891011>>