HomeSort by relevance Sort by last modified time
    Searched full:selinux (Results 576 - 600 of 1108) sorted by null

<<21222324252627282930>>

  /external/selinux/policycoreutils/sepolicy/sepolicy/
__init__.py 7 import selinux namespace
244 def get_file_equiv_modified(fc_path=selinux.selinux_file_context_path()):
255 def get_file_equiv(fc_path=selinux.selinux_file_context_path()):
266 def get_local_file_paths(fc_path=selinux.selinux_file_context_path()):
292 def get_fcdict(fc_path=selinux.selinux_file_context_path()):
387 entrypoint = selinux.getfilecon(path)[1].split(":")[2]
431 path = root + selinux.selinux_binary_policy_path()
437 raise ValueError(_("No SELinux Policy installed"))
596 fd = open(selinux.selinux_usersconf_path(), "r")
801 if selinux.is_selinux_enabled() == 1
    [all...]
network.py 5 # setrans is a tool for analyzing process transistions in SELinux policy
  /packages/apps/TvSettings/Settings/src/com/android/tv/settings/about/
AboutFragment.java 27 import android.os.SELinux;
58 private static final String PROPERTY_SELINUX_STATUS = "ro.build.selinux";
136 if (!SELinux.isSELinuxEnabled()) {
138 } else if (!SELinux.isSELinuxEnforced()) {
142 // Remove selinux information if property is not present
  /external/selinux/policycoreutils/scripts/
fixfiles 4 # Script to restore labels on a SELinux box
86 if [ -e /etc/selinux/fixfiles_exclude_dirs ]
99 done < /etc/selinux/fixfiles_exclude_dirs
133 if [ -e /etc/selinux/config ]; then
134 . /etc/selinux/config
135 FC=/etc/selinux/${SELINUXTYPE}/contexts/files/file_contexts
137 FC=/etc/security/selinux/file_contexts
  /external/selinux/policycoreutils/semanage/
semanage 4 # AUTHOR: David Quigley <selinux@davequigley.com>
7 # semanage is a tool for managing SELinux configuration files
81 raise ValueError("%s must be an SELinux role:\nValid roles: %s" % (v, ", ".join(roles)))
247 parser.add_argument('-S', '--store', action=SetStore, help=_("Select an alternate SELinux Policy Store to manage"))
271 parser.add_argument('-t', '--type', help=_('SELinux Type for the object'))
275 parser.add_argument('-L', '--level', default='s0', help=_('Default SELinux Level for SELinux user, s0 Default. (MLS/MCS Systems only)'))
282 SELinux Range for SELinux login mapping
283 defaults to the SELinux user record range
    [all...]
  /external/selinux/libselinux/include/selinux/
selinux.h 11 /* Return 1 if we are running on a SELinux kernel, or 0 if not or -1 if we get an error. */
13 /* Return 1 if we are running on a SELinux MLS kernel, or 0 otherwise. */
288 * SELinux kernel enforcing status to match it, and loads the policy.
334 /* Disable SELinux at runtime (must be done prior to initial policy load). */
492 selinux_getenforcemode reads the /etc/selinux/config file and determines
499 selinux_boolean_sub reads the /etc/selinux/TYPE/booleans.subs_dist file
507 selinux_getpolicytype reads the /etc/selinux/config file and determines
514 selinux_policy_root reads the /etc/selinux/config file and returns
633 /* Get the SELinux username and level to use for a given Linux username.
640 /* Get the SELinux username and level to use for a given Linux username and service.
    [all...]
  /external/selinux/libsemanage/src/
conf-parse.y 26 #include <selinux/selinux.h>
152 if (strcasecmp($3, "selinux") == 0)
157 yyerror("target_platform can only be 'selinux' or 'xen'");
343 conf->store_root_path = strdup("/var/lib/selinux");
344 conf->compiler_directory_path = strdup("/usr/libexec/selinux/hll");
  /system/core/init/
util.cpp 27 #include <selinux/label.h>
28 #include <selinux/android.h>
404 // Try to avoid the mknod() call if we can. Since SELinux makes
406 int fd = open("/sys/fs/selinux/null", O_RDWR);
408 // OOPS, /sys/fs/selinux/null isn't available, likely because
409 // /sys/fs/selinux isn't mounted. Fall back to mknod.
  /external/selinux/libselinux/src/
seusers.c 9 #include <selinux/selinux.h>
10 #include <selinux/context.h>
checkAccess.c 7 #include <selinux/avc.h>
  /external/selinux/policycoreutils/mcstrans/src/
mcscolor.c 12 #include <selinux/selinux.h>
13 #include <selinux/context.h>
  /external/selinux/policycoreutils/setsebool/
setsebool.c 11 #include <selinux/selinux.h>
42 fputs("setsebool: SELinux is disabled.\n", stderr);
  /bionic/libc/kernel/uapi/linux/
xattr.h 51 #define XATTR_SELINUX_SUFFIX "selinux"
  /build/core/tasks/
build_custom_images.mk 37 # - CUSTOM_IMAGE_SELINUX, set to "true" if the image supports selinux.
  /cts/tests/tests/security/src/android/security/cts/
SELinuxTest.java 37 * Verify that the SELinux configuration is sane.
  /development/ndk/platforms/android-21/include/linux/
xattr.h 46 #define XATTR_SELINUX_SUFFIX "selinux"
  /device/generic/qemu/
qemu_base.mk 71 # SELinux packages
  /external/libselinux/src/
init.c 39 /* We check to see if the preferred mount point for selinux file
  /external/selinux/policycoreutils/mcstrans/share/examples/default/
setrans.conf 2 # Multi-Level Security translation table for SELinux
  /external/selinux/policycoreutils/mcstrans/share/examples/include/setrans.d/
include-example 2 # Multi-Level Security translation table for SELinux
  /external/selinux/policycoreutils/sepolicy/sepolicy/templates/
etc_rw.py 4 # policygentool is a tool for the initial generation of SELinux policy
rw.py 4 # policygentool is a tool for the initial generation of SELinux policy
test_module.py 4 # policygentool is a tool for the initial generation of SELinux policy
tmp.py 4 # policygentool is a tool for the initial generation of SELinux policy
user.py 4 # policygentool is a tool for the initial generation of SELinux policy

Completed in 629 milliseconds

<<21222324252627282930>>