Searched
full:selinux (Results
476 -
500 of
1108) sorted by null
<<11121314151617181920>>
/external/selinux/policycoreutils/sandbox/ |
test_sandbox.py | 99 import selinux namespace 100 if selinux.security_getenforce() == 1: 103 print("SELinux must be in enforcing mode for this test")
|
/external/selinux/policycoreutils/sepolicy/ |
test_sepolicy.py | 118 import selinux namespace 119 if selinux.security_getenforce() == 1: 122 print "SELinux must be in enforcing mode for this test"
|
/system/core/crash_reporter/ |
README.md | 19 ## SELinux policies 22 the proper SELinux permissions for accessing the domain of the crashing 26 they will have to set their SELinux policies in their .te file to allow
|
/system/sepolicy/ |
kernel.te | 11 # Get SELinux enforcing status. 30 # process from turning off SELinux once enabled. 36 # Init reboot before switching selinux domains under certain error
|
zygote.te | 11 # Switch SELinux context to app domains. 48 # Check validity of SELinux context before use. 50 # Check SELinux permissions.
|
/docs/source.android.com/src/security/ |
security_toc.cs | 108 <a href="<?cs var:toroot ?>security/selinux/index.html"> 109 <span class="en">SELinux</span> 113 <li><a href="<?cs var:toroot ?>security/selinux/concepts.html">Concepts</a></li> 114 <li><a href="<?cs var:toroot ?>security/selinux/implement.html">Implementation</a></li> 115 <li><a href="<?cs var:toroot ?>security/selinux/customize.html">Customization</a></li> 116 <li><a href="<?cs var:toroot ?>security/selinux/validate.html">Validation</a></li>
|
/external/ipsec-tools/src/racoon/ |
security.c | 40 #include <selinux/selinux.h> 41 #include <selinux/flask.h> 42 #include <selinux/av_permissions.h> 43 #include <selinux/avc.h> 44 #include <selinux/context.h>
|
/external/libselinux/src/ |
sestatus.c | 4 * APIs to reference SELinux kernel status page (/selinux/status) 20 * copied from the selinux/include/security.h 128 * It returns the current performing mode of SELinux. 200 * 0 means SELinux treats policy queries on undefined stuff being allowed, 249 * It tries to open and mmap kernel status page (/selinux/status).
|
android.c | 18 #include <selinux/selinux.h> 19 #include <selinux/context.h> 20 #include <selinux/android.h> 21 #include <selinux/label.h> 22 #include <selinux/avc.h> 982 selinux_log(SELINUX_ERROR, "SELinux: Could not open %s: %s\n", 987 selinux_log(SELINUX_ERROR, "SELinux: Could not stat %s: %s\n", 994 selinux_log(SELINUX_ERROR, "SELinux: Could not map %s: %s\n", 1044 selinux_log(SELINUX_ERROR, "SELinux: Could NOT parse package list\n") [all...] |
checkAccess.c | 7 #include <selinux/avc.h>
|
/external/selinux/libselinux/src/ |
sestatus.c | 4 * APIs to reference SELinux kernel status page (/selinux/status) 20 * copied from the selinux/include/security.h 128 * It returns the current performing mode of SELinux. 200 * 0 means SELinux treats policy queries on undefined stuff being allowed, 249 * It tries to open and mmap kernel status page (/selinux/status).
|
/cts/hostsidetests/security/ |
Android.mk | 58 selinux_neverallow_gen := cts/tools/selinux/SELinuxNeverallowTestGen.py 60 selinux_neverallow_gen_data := cts/tools/selinux/SELinuxNeverallowTestFrame.py
|
/docs/source.android.com/src/devices/tech/admin/ |
index.jd | 38 href="{@docRoot}security/selinux/index.html">SELinux</a>.</p>
|
/docs/source.android.com/src/security/enhancements/ |
enhancements70.jd | 34 <li><strong>SELinux</strong>. Updated SELinux configuration and increased
|
/external/autotest/server/site_tests/brillo_Invariants/ |
brillo_Invariants.py | 28 """Checks the selinux context of a path. 31 @param ctx: the selinux context to check for.
|
/external/mesa3d/src/mapi/mapi/ |
u_execmem.c | 55 #include <selinux/selinux.h>
|
/external/mesa3d/src/mesa/main/ |
execmem.c | 51 #include <selinux/selinux.h>
|
/external/selinux/libselinux/include/selinux/ |
get_context_list.h | 4 #include <selinux/selinux.h>
|
/external/selinux/libsemanage/src/ |
user_base_record.c | 3 /* Object: semanage_user_base_t (SELinux User/Class Policy Object) 4 * Object: semanage_user_key_t (SELinux User/Class Key)
|
/external/selinux/policycoreutils/mcstrans/src/ |
mcstrans.init | 6 # description: This starts the SELinux Context Translation System Daemon 38 # If selinux is not enabled, return success
|
/external/selinux/policycoreutils/run_init/ |
run_init.c | 47 #include <selinux/selinux.h> 48 #include <selinux/get_default_type.h> 49 #include <selinux/context.h> /* for context-mangling functions */ 244 * The SELinux user identity is no longer used, as Linux users are now 245 * mapped to SELinux users via seusers and the SELinux user identity space 361 ("Sorry, run_init may be used only on a SELinux kernel.\n"));
|
/frameworks/base/core/jni/ |
android_os_SELinux.cpp | 23 #include "selinux/selinux.h" 24 #include "selinux/android.h" 43 * Purpose: checks whether SELinux is enabled/disbaled 54 * Purpose: return the current SELinux enforce mode 299 * Purpose: restore default SELinux security context 353 LOG_PRI_VA(priority, "SELinux", fmt, ap); 365 return RegisterMethodsOrDie(env, "android/os/SELinux", method_table, NELEM(method_table));
|
/device/google/dragon/sepolicy/ |
mac_permissions.xml | 12 represents additional info that each app can use in setting a SELinux security
|
/device/google/marlin/sepolicy/ |
mac_permissions.xml | 12 represents additional info that each app can use in setting a SELinux security
|
/external/kernel-headers/original/uapi/linux/ |
xattr.h | 52 #define XATTR_SELINUX_SUFFIX "selinux"
|
Completed in 820 milliseconds
<<11121314151617181920>>