HomeSort by relevance Sort by last modified time
    Searched full:selinux (Results 426 - 450 of 1108) sorted by null

<<11121314151617181920>>

  /external/selinux/libsemanage/include/semanage/
seuser_record.h 37 /* Selinux Name */
  /external/selinux/libsemanage/man/man3/
semanage_count.3 4 semanage_count \- SELinux Management API
semanage_bool.3 4 semanage_bool \- SELinux Policy Booleans Management API
16 This object contains properties associated with a SELinux policy boolean
  /external/selinux/libsepol/man/man3/
sepol_check_context.3 20 policy on a SELinux system, use
  /external/selinux/policycoreutils/load_policy/
load_policy.8 3 load_policy \- load a new SELinux policy into the kernel
  /external/selinux/policycoreutils/sepolicy/sepolicy/help/
lockdown_permissive.txt 6 When the distribution policy writers write a new confined domain, they initially ship the policy for that domain in permissive mode. Permissive mode means that a process running in the domain will not be confined by SELinux. The kernel will log the AVC messages, access denials, that would have happened had the process been run in enforcing mode.
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/linux/
selinux_netlink.h 2 * Netlink event notifications for SELinux.
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/linux/
selinux_netlink.h 2 * Netlink event notifications for SELinux.
  /system/sepolicy/
keystore.te 17 # Check SELinux permissions.
  /system/tools/aidl/tests/java_app/
README 10 5) Put selinux in permissive mode.
  /cts/tests/tests/security/jni/
android_security_cts_SELinuxTest.cpp 18 #include <selinux/selinux.h>
  /docs/source.android.com/src/security/enhancements/
enhancements60.jd 31 enforced by SELinux. This offers better
33 further tightening of SELinux domains, and extremely limited /proc access.</li>
  /external/dbus/bus/
selinux.h 0 /* selinux.h SELinux security check headers for D-BUS
  /external/libselinux/src/
callbacks.c 10 #include <selinux/selinux.h>
selinux_internal.h 1 #include <selinux/selinux.h>
  /external/selinux/libselinux/src/
callbacks.c 10 #include <selinux/selinux.h>
  /external/selinux/libsemanage/src/
boolean_record.c 23 #include <selinux/selinux.h>
  /external/selinux/libsepol/man/man8/
chkcon.8 24 .TH CHKCON 8 "Mar 12 2005" "SELinux" "SELinux Command Line documentation"
genpolusers.8 24 .TH GENPOLUSERS 8 "Mar 12 2005" "SELinux" "SELinux Command Line documentation"
  /external/selinux/policycoreutils/semodule_package/
semodule_package.8 3 semodule_package \- Create a SELinux policy module package.
10 semodule_package is the tool used to create a SELinux policy module
  /external/selinux/secilc/
README 0 SELinux Common Intermediate Language (CIL) Compiler
5 The SELinux CIL Compiler is a compiler that converts the CIL language as
  /system/core/init/
log.cpp 23 #include <selinux/selinux.h>
  /cts/hostsidetests/security/src/android/security/cts/
SELinuxHostTest.java 51 * Host-side SELinux tests.
54 * run as the shell user to evaluate aspects of the state of SELinux on the test
120 mDevice.pullFile("/sys/fs/selinux/policy", devicePolicyFile);
124 * Tests that the kernel is enforcing selinux policy globally.
131 mDevice.executeShellCommand("cat /sys/fs/selinux/enforce", out);
132 assertEquals("SELinux policy is not being enforced!", "1", out.getOutput());
158 assertTrue("The following SELinux domains were found to be in permissive mode:\n"
498 * The domain or SELinux context to check.
502 String msg = "Expected no processes in SELinux domain \"" + domain + "\""
512 * The domain or SELinux context to check
    [all...]
  /external/selinux/libselinux/man/man3/
avc_add_callback.3 4 .TH "avc_add_callback" "3" "9 June 2004" "" "SELinux API documentation"
6 avc_add_callback \- additional event notification for SELinux userspace object managers
9 .B #include <selinux/selinux.h>
11 .B #include <selinux/avc.h>
178 Support for dynamic revocation and retained permissions is mostly unimplemented in the SELinux kernel module. The only security event that currently gets excercised is
192 .BR selinux (8)
avc_init.3 4 .TH "avc_init" "3" "27 May 2004" "" "SELinux API documentation"
6 avc_init \- legacy userspace SELinux AVC setup
9 .B #include <selinux/selinux.h>
11 .B #include <selinux/avc.h>
157 Beginning with version 2.6.4, the Linux kernel supports SELinux status change notification via netlink. Two message types are currently implemented, indicating changes to the enforcing mode and to the loaded policy in the kernel, respectively. The userspace AVC listens for these messages and takes the appropriate action, modifying the behavior of
196 .BR selinux (8)

Completed in 182 milliseconds

<<11121314151617181920>>