Searched
full:selinux (Results
576 -
600 of
1108) sorted by null
<<21222324252627282930>>
/external/selinux/policycoreutils/sepolicy/sepolicy/ |
__init__.py | 7 import selinux namespace 244 def get_file_equiv_modified(fc_path=selinux.selinux_file_context_path()): 255 def get_file_equiv(fc_path=selinux.selinux_file_context_path()): 266 def get_local_file_paths(fc_path=selinux.selinux_file_context_path()): 292 def get_fcdict(fc_path=selinux.selinux_file_context_path()): 387 entrypoint = selinux.getfilecon(path)[1].split(":")[2] 431 path = root + selinux.selinux_binary_policy_path() 437 raise ValueError(_("No SELinux Policy installed")) 596 fd = open(selinux.selinux_usersconf_path(), "r") 801 if selinux.is_selinux_enabled() == 1 [all...] |
network.py | 5 # setrans is a tool for analyzing process transistions in SELinux policy
|
/packages/apps/TvSettings/Settings/src/com/android/tv/settings/about/ |
AboutFragment.java | 27 import android.os.SELinux; 58 private static final String PROPERTY_SELINUX_STATUS = "ro.build.selinux"; 136 if (!SELinux.isSELinuxEnabled()) { 138 } else if (!SELinux.isSELinuxEnforced()) { 142 // Remove selinux information if property is not present
|
/external/selinux/policycoreutils/scripts/ |
fixfiles | 4 # Script to restore labels on a SELinux box 86 if [ -e /etc/selinux/fixfiles_exclude_dirs ] 99 done < /etc/selinux/fixfiles_exclude_dirs 133 if [ -e /etc/selinux/config ]; then 134 . /etc/selinux/config 135 FC=/etc/selinux/${SELINUXTYPE}/contexts/files/file_contexts 137 FC=/etc/security/selinux/file_contexts
|
/external/selinux/policycoreutils/semanage/ |
semanage | 4 # AUTHOR: David Quigley <selinux@davequigley.com> 7 # semanage is a tool for managing SELinux configuration files 81 raise ValueError("%s must be an SELinux role:\nValid roles: %s" % (v, ", ".join(roles))) 247 parser.add_argument('-S', '--store', action=SetStore, help=_("Select an alternate SELinux Policy Store to manage")) 271 parser.add_argument('-t', '--type', help=_('SELinux Type for the object')) 275 parser.add_argument('-L', '--level', default='s0', help=_('Default SELinux Level for SELinux user, s0 Default. (MLS/MCS Systems only)')) 282 SELinux Range for SELinux login mapping 283 defaults to the SELinux user record range [all...] |
/external/selinux/libselinux/include/selinux/ |
selinux.h | 11 /* Return 1 if we are running on a SELinux kernel, or 0 if not or -1 if we get an error. */ 13 /* Return 1 if we are running on a SELinux MLS kernel, or 0 otherwise. */ 288 * SELinux kernel enforcing status to match it, and loads the policy. 334 /* Disable SELinux at runtime (must be done prior to initial policy load). */ 492 selinux_getenforcemode reads the /etc/selinux/config file and determines 499 selinux_boolean_sub reads the /etc/selinux/TYPE/booleans.subs_dist file 507 selinux_getpolicytype reads the /etc/selinux/config file and determines 514 selinux_policy_root reads the /etc/selinux/config file and returns 633 /* Get the SELinux username and level to use for a given Linux username. 640 /* Get the SELinux username and level to use for a given Linux username and service. [all...] |
/external/selinux/libsemanage/src/ |
conf-parse.y | 26 #include <selinux/selinux.h> 152 if (strcasecmp($3, "selinux") == 0) 157 yyerror("target_platform can only be 'selinux' or 'xen'"); 343 conf->store_root_path = strdup("/var/lib/selinux"); 344 conf->compiler_directory_path = strdup("/usr/libexec/selinux/hll");
|
/system/core/init/ |
util.cpp | 27 #include <selinux/label.h> 28 #include <selinux/android.h> 404 // Try to avoid the mknod() call if we can. Since SELinux makes 406 int fd = open("/sys/fs/selinux/null", O_RDWR); 408 // OOPS, /sys/fs/selinux/null isn't available, likely because 409 // /sys/fs/selinux isn't mounted. Fall back to mknod.
|
/external/selinux/libselinux/src/ |
seusers.c | 9 #include <selinux/selinux.h> 10 #include <selinux/context.h>
|
checkAccess.c | 7 #include <selinux/avc.h>
|
/external/selinux/policycoreutils/mcstrans/src/ |
mcscolor.c | 12 #include <selinux/selinux.h> 13 #include <selinux/context.h>
|
/external/selinux/policycoreutils/setsebool/ |
setsebool.c | 11 #include <selinux/selinux.h> 42 fputs("setsebool: SELinux is disabled.\n", stderr);
|
/bionic/libc/kernel/uapi/linux/ |
xattr.h | 51 #define XATTR_SELINUX_SUFFIX "selinux"
|
/build/core/tasks/ |
build_custom_images.mk | 37 # - CUSTOM_IMAGE_SELINUX, set to "true" if the image supports selinux.
|
/cts/tests/tests/security/src/android/security/cts/ |
SELinuxTest.java | 37 * Verify that the SELinux configuration is sane.
|
/development/ndk/platforms/android-21/include/linux/ |
xattr.h | 46 #define XATTR_SELINUX_SUFFIX "selinux"
|
/device/generic/qemu/ |
qemu_base.mk | 71 # SELinux packages
|
/external/libselinux/src/ |
init.c | 39 /* We check to see if the preferred mount point for selinux file
|
/external/selinux/policycoreutils/mcstrans/share/examples/default/ |
setrans.conf | 2 # Multi-Level Security translation table for SELinux
|
/external/selinux/policycoreutils/mcstrans/share/examples/include/setrans.d/ |
include-example | 2 # Multi-Level Security translation table for SELinux
|
/external/selinux/policycoreutils/sepolicy/sepolicy/templates/ |
etc_rw.py | 4 # policygentool is a tool for the initial generation of SELinux policy
|
rw.py | 4 # policygentool is a tool for the initial generation of SELinux policy
|
test_module.py | 4 # policygentool is a tool for the initial generation of SELinux policy
|
tmp.py | 4 # policygentool is a tool for the initial generation of SELinux policy
|
user.py | 4 # policygentool is a tool for the initial generation of SELinux policy
|
Completed in 629 milliseconds
<<21222324252627282930>>