HomeSort by relevance Sort by last modified time
    Searched full:selinux (Results 476 - 500 of 1108) sorted by null

<<11121314151617181920>>

  /external/selinux/policycoreutils/sandbox/
test_sandbox.py 99 import selinux namespace
100 if selinux.security_getenforce() == 1:
103 print("SELinux must be in enforcing mode for this test")
  /external/selinux/policycoreutils/sepolicy/
test_sepolicy.py 118 import selinux namespace
119 if selinux.security_getenforce() == 1:
122 print "SELinux must be in enforcing mode for this test"
  /system/core/crash_reporter/
README.md 19 ## SELinux policies
22 the proper SELinux permissions for accessing the domain of the crashing
26 they will have to set their SELinux policies in their .te file to allow
  /system/sepolicy/
kernel.te 11 # Get SELinux enforcing status.
30 # process from turning off SELinux once enabled.
36 # Init reboot before switching selinux domains under certain error
zygote.te 11 # Switch SELinux context to app domains.
48 # Check validity of SELinux context before use.
50 # Check SELinux permissions.
  /docs/source.android.com/src/security/
security_toc.cs 108 <a href="<?cs var:toroot ?>security/selinux/index.html">
109 <span class="en">SELinux</span>
113 <li><a href="<?cs var:toroot ?>security/selinux/concepts.html">Concepts</a></li>
114 <li><a href="<?cs var:toroot ?>security/selinux/implement.html">Implementation</a></li>
115 <li><a href="<?cs var:toroot ?>security/selinux/customize.html">Customization</a></li>
116 <li><a href="<?cs var:toroot ?>security/selinux/validate.html">Validation</a></li>
  /external/ipsec-tools/src/racoon/
security.c 40 #include <selinux/selinux.h>
41 #include <selinux/flask.h>
42 #include <selinux/av_permissions.h>
43 #include <selinux/avc.h>
44 #include <selinux/context.h>
  /external/libselinux/src/
sestatus.c 4 * APIs to reference SELinux kernel status page (/selinux/status)
20 * copied from the selinux/include/security.h
128 * It returns the current performing mode of SELinux.
200 * 0 means SELinux treats policy queries on undefined stuff being allowed,
249 * It tries to open and mmap kernel status page (/selinux/status).
android.c 18 #include <selinux/selinux.h>
19 #include <selinux/context.h>
20 #include <selinux/android.h>
21 #include <selinux/label.h>
22 #include <selinux/avc.h>
982 selinux_log(SELINUX_ERROR, "SELinux: Could not open %s: %s\n",
987 selinux_log(SELINUX_ERROR, "SELinux: Could not stat %s: %s\n",
994 selinux_log(SELINUX_ERROR, "SELinux: Could not map %s: %s\n",
1044 selinux_log(SELINUX_ERROR, "SELinux: Could NOT parse package list\n")
    [all...]
checkAccess.c 7 #include <selinux/avc.h>
  /external/selinux/libselinux/src/
sestatus.c 4 * APIs to reference SELinux kernel status page (/selinux/status)
20 * copied from the selinux/include/security.h
128 * It returns the current performing mode of SELinux.
200 * 0 means SELinux treats policy queries on undefined stuff being allowed,
249 * It tries to open and mmap kernel status page (/selinux/status).
  /cts/hostsidetests/security/
Android.mk 58 selinux_neverallow_gen := cts/tools/selinux/SELinuxNeverallowTestGen.py
60 selinux_neverallow_gen_data := cts/tools/selinux/SELinuxNeverallowTestFrame.py
  /docs/source.android.com/src/devices/tech/admin/
index.jd 38 href="{@docRoot}security/selinux/index.html">SELinux</a>.</p>
  /docs/source.android.com/src/security/enhancements/
enhancements70.jd 34 <li><strong>SELinux</strong>. Updated SELinux configuration and increased
  /external/autotest/server/site_tests/brillo_Invariants/
brillo_Invariants.py 28 """Checks the selinux context of a path.
31 @param ctx: the selinux context to check for.
  /external/mesa3d/src/mapi/mapi/
u_execmem.c 55 #include <selinux/selinux.h>
  /external/mesa3d/src/mesa/main/
execmem.c 51 #include <selinux/selinux.h>
  /external/selinux/libselinux/include/selinux/
get_context_list.h 4 #include <selinux/selinux.h>
  /external/selinux/libsemanage/src/
user_base_record.c 3 /* Object: semanage_user_base_t (SELinux User/Class Policy Object)
4 * Object: semanage_user_key_t (SELinux User/Class Key)
  /external/selinux/policycoreutils/mcstrans/src/
mcstrans.init 6 # description: This starts the SELinux Context Translation System Daemon
38 # If selinux is not enabled, return success
  /external/selinux/policycoreutils/run_init/
run_init.c 47 #include <selinux/selinux.h>
48 #include <selinux/get_default_type.h>
49 #include <selinux/context.h> /* for context-mangling functions */
244 * The SELinux user identity is no longer used, as Linux users are now
245 * mapped to SELinux users via seusers and the SELinux user identity space
361 ("Sorry, run_init may be used only on a SELinux kernel.\n"));
  /frameworks/base/core/jni/
android_os_SELinux.cpp 23 #include "selinux/selinux.h"
24 #include "selinux/android.h"
43 * Purpose: checks whether SELinux is enabled/disbaled
54 * Purpose: return the current SELinux enforce mode
299 * Purpose: restore default SELinux security context
353 LOG_PRI_VA(priority, "SELinux", fmt, ap);
365 return RegisterMethodsOrDie(env, "android/os/SELinux", method_table, NELEM(method_table));
  /device/google/dragon/sepolicy/
mac_permissions.xml 12 represents additional info that each app can use in setting a SELinux security
  /device/google/marlin/sepolicy/
mac_permissions.xml 12 represents additional info that each app can use in setting a SELinux security
  /external/kernel-headers/original/uapi/linux/
xattr.h 52 #define XATTR_SELINUX_SUFFIX "selinux"

Completed in 820 milliseconds

<<11121314151617181920>>