HomeSort by relevance Sort by last modified time
    Searched full:selinux (Results 651 - 675 of 1108) sorted by null

<<21222324252627282930>>

  /external/selinux/policycoreutils/restorecond/
watch.c 18 #include <selinux/selinux.h>
  /external/selinux/sepolgen/tests/
test_refpolicy.py 22 import selinux namespace
49 if selinux.is_selinux_mls_enabled():
  /system/core/logd/
README.property 4 ro.logd.auditd bool true Enable selinux audit daemon
5 ro.logd.auditd.dmesg bool true selinux audit messages duplicated and
  /system/sepolicy/
access_vectors 405 mac_override # unused by SELinux
406 mac_admin # unused by SELinux
  /system/vold/
PrivateVolume.cpp 71 // TODO: figure out better SELinux labels for private volumes
189 // TODO: change reported mountpoint once we have better selinux support
  /system/vold/fs/
Ext4.cpp 45 #include <selinux/selinux.h>
Vfat.cpp 44 #include <selinux/selinux.h>
  /external/selinux/policycoreutils/semanage/
test-semanage.py 209 import selinux namespace
211 boolean_state = selinux.security_get_boolean_active("httpd_anon_write")
280 import selinux namespace
282 if selinux.security_getenforce() == 1:
298 print("SELinux must be in enforcing mode for this test")
  /external/selinux/sepolgen/src/sepolgen/
access.py 23 SELinux - at the most basic level - represents access as
37 from selinux import audit2why
58 An access vector is the basic unit of access in SELinux.
61 SELinux. It represents the access a source type has to a target
70 done to verify that the strings are valid SELinux identifiers.
  /packages/apps/Settings/src/com/android/settings/
DeviceInfoSettings.java 25 import android.os.SELinux;
61 private static final String PROPERTY_SELINUX_STATUS = "ro.build.selinux";
123 if (!SELinux.isSELinuxEnabled()) {
126 } else if (!SELinux.isSELinuxEnforced()) {
131 // Remove selinux information if property is not present
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/sepolgen/
access.py 23 SELinux - at the most basic level - represents access as
37 from selinux import audit2why
58 An access vector is the basic unit of access in SELinux.
61 SELinux. It represents the access a source type has to a target
70 done to verify that the strings are valid SELinux identifiers.
  /system/core/init/
property_service.cpp 46 #include <selinux/selinux.h>
47 #include <selinux/label.h>
178 if (strcmp("selinux.reload_policy", name) == 0 && strcmp("1", value) == 0) {
182 } else if (strcmp("selinux.restorecon_recursive", name) == 0 && valuelen > 0) {
  /docs/source.android.com/src/security/bulletin/
2015-08-01.jd 213 guarded with SELinux, it does have access to audio and video streams as well as
247 guarded with SELinux, it does have access to audio and video streams as well as
282 guarded with SELinux, it does have access to audio and video streams as well as
318 guarded with SELinux, it does have access to audio and video streams as well as
355 guarded with SELinux, it does have access to audio and video streams as well as
391 guarded with SELinux, it does have access to audio and video streams as well as
426 guarded with SELinux, it does have access to audio and video streams as well as
461 guarded with SELinux, it does have access to audio and video streams as well as
497 mediaserver is guarded with SELinux, it does have access to audio and video
566 <p>- The wpa_supplicant process is tightly constrained by SELinux policy o
    [all...]
  /external/selinux/policycoreutils/sandbox/
seunshare.c 29 #include <selinux/selinux.h>
30 #include <selinux/context.h> /* for context-mangling functions */
442 /* get selinux context */
513 /* copy selinux context */
708 fprintf(stderr, _("Error: execution context specified, but SELinux is not enabled\n"));
835 /* selinux context */
  /external/dbus/doc/
dbus-daemon.1.in 612 .I "<selinux>"
615 The <selinux> element contains settings related to Security Enhanced Linux.
622 An <associate> element appears below an <selinux> element and
632 short discussion of SELinux below.
651 .SH SELinux
654 See http://www.nsa.gov/selinux/ for full details on SELinux. Some useful excerpts:
665 greater efficiency, the policy enforcement code of SELinux typically
685 D\-Bus performs SELinux security checks in two places.
  /bionic/libc/bionic/
libc_init_common.cpp 129 // init won't have /dev/null available, but SELinux provides an equivalent.
130 dev_null = TEMP_FAILURE_RETRY(open("/sys/fs/selinux/null", O_RDWR));
229 // of executing a setuid program or the result of an SELinux
  /external/libselinux/include/selinux/
selinux.h 11 /* Return 1 if we are running on a SELinux kernel, or 0 if not or -1 if we get an error. */
13 /* Return 1 if we are running on a SELinux MLS kernel, or 0 otherwise. */
230 /* Disable SELinux at runtime (must be done prior to initial policy load). */
  /external/ltrace/
configure.ac 128 AC_CHECK_HEADERS(selinux/selinux.h)
129 AC_CHECK_LIB(selinux, security_get_boolean_active)
  /external/selinux/libselinux/src/
audit2why.c 16 #include <selinux/selinux.h>
214 /* SELinux disabled, must use -p option. */
  /external/selinux/libsemanage/src/
handle.c 24 #include <selinux/selinux.h>
89 /* By default always reload policy after commit if SELinux is enabled. */
  /external/selinux/secilc/docs/
cil_introduction.md 4 The SELinux Common Intermediate Language (CIL) is designed to be a language that sits between one or more high level policy languages (such as the current module language) and the low-level kernel policy representation. The intermediate language provides several benefits:
27 * Don't fix what isn't broken - CIL is an opportunity to make bold changes to SELinux policy, but there is no reason to re-think core concepts that are working well. All changes to existing language constructs need a clear and compelling reason. One key aspect of the current policy to retain is it's order-independent, declarative style.
38 * Policy customization without breaking updates - one of the challenges in SELinux is allowing a system builder or administrator to change the access allowed on a system - including removing unwanted access - while not preventing the application of future policy updates from the vendor. It is desirable, therefore, to allow an administrator to make changes to vendor policy without necessitating the direct modification of the shipped policy files. This is most clearly seen when an administrator wants to remove access allowed by a vendor policy that is not already controlled by a policy boolean.
  /external/selinux/secilc/
secilc.c 53 printf(" -t, --target=<type> specify target architecture. may be selinux or\n");
54 printf(" xen. (default: selinux)\n");
124 if (!strcmp(optarg, "selinux")) {
  /system/sepolicy/tools/
checkfc.c 10 #include <selinux/selinux.h>
11 #include <selinux/label.h>
  /external/dbus/
configure.ac 151 AC_ARG_ENABLE(selinux, AS_HELP_STRING([--enable-selinux],[build with SELinux support]),enable_selinux=$enableval,enable_selinux=auto)
152 AC_ARG_ENABLE(libaudit,AS_HELP_STRING([--enable-libaudit],[build audit daemon support for SELinux]),enable_libaudit=$enableval,enable_libaudit=auto)
986 # SELinux detection
990 # See if we have SELinux library
991 AC_CHECK_LIB(selinux, is_selinux_enabled,
994 # see if we have the SELinux header with the new D-Bus stuff in it
996 AC_MSG_CHECKING([for DBUS Flask permissions in selinux/av_permissions.h])
997 AC_COMPILE_IFELSE([AC_LANG_PROGRAM([[#include <selinux/av_permissions.h>]]
    [all...]
  /cts/tests/tests/security/src/android/security/cts/
ServicePermissionsTest.java 113 // SELinux likely prevented the dump - assume safe

Completed in 326 milliseconds

<<21222324252627282930>>