HomeSort by relevance Sort by last modified time
    Searched full:selinux (Results 751 - 775 of 1108) sorted by null

<<31323334353637383940>>

  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/linux/
netlink.h 14 #define NETLINK_SELINUX 7 /* SELinux event notifications */
pfkeyv2.h 223 __u8 sadb_x_ctx_alg; /* LSMs: e.g., selinux == 1 */
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/sepolgen/
audit.py 137 import selinux.audit2why as audit2why namespace
335 selinux related messages.
342 invalid_msgs - selinux related messages that are not valid. Messages
366 # message is an SELinux related message and then parses it into
policygen.py 21 classes and algorithms for the generation of SELinux policy.
27 import selinux.audit2why as audit2why namespace
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/setools/policyrep/
fscontext.py 138 # there are more rule types, but modern SELinux
  /system/core/rootdir/
init.rc 339 # make the selinux kernel policy world-readable
340 chmod 0444 /sys/fs/selinux/policy
484 setprop selinux.reload_policy 1
486 # Set SELinux security contexts on upgrade or policy update.
  /system/extras/ext4_utils/
ext4_crypt_init_extensions.cpp 65 // Make sure folder exists. Use make_dir to set selinux permissions.
make_ext4fs.c 75 #include <selinux/selinux.h>
76 #include <selinux/label.h>
335 error("failed to set SELinux context on %s\n", dentries[i].path);
  /system/sepolicy/
README 1 This directory contains the core Android SELinux policy configuration.
shell.te 114 # Allow pulling the SELinux policy for CTS purposes
  /system/sepolicy/tools/sepolicy-analyze/
README 74 statements in the same format as the SELinux policy.conf file, i.e. after
  /external/mesa3d/
configure.ac 511 dnl SELinux awareness.
512 AC_ARG_ENABLE([selinux],
513 [AS_HELP_STRING([--enable-selinux],
514 [Build SELinux-aware Mesa @<:@default=disabled@:>@])],
518 AC_CHECK_HEADER([selinux/selinux.h],[],
519 [AC_MSG_ERROR([SELinux headers not found])])
520 AC_CHECK_LIB([selinux],[is_selinux_enabled],[],
521 [AC_MSG_ERROR([SELinux library not found])])
    [all...]
  /frameworks/base/services/core/java/com/android/server/wallpaper/
WallpaperManagerService.java 67 import android.os.SELinux;
233 // has the right SELinux label.
237 SELinux.restorecon(changedFile);
256 SELinux.restorecon(changedFile);
260 // We also make sure to reapply the correct SELinux label.
468 boolean didRestorecon = SELinux.restorecon(wallpaper.cropFile.getAbsoluteFile());
    [all...]
  /docs/source.android.com/src/devices/tech/debug/
asan.jd 115 to disable SELinux, like so:</p>
194 $ adb shell setenforce 0 # disable SELinux
  /docs/source.android.com/src/security/overview/
kernel-security.jd 108 Linux (SELinux) to apply access control policies and establish an environment of
110 href="{@docRoot}security/selinux/index.html">Validating
  /external/dbus/bus/
main.c 41 #include "selinux.h"
595 _dbus_warn ("SELinux pre-initialization failed\n");
  /external/selinux/policycoreutils/mcstrans/src/
mcstransd.c 16 #include <selinux/selinux.h>
  /external/selinux/prebuilts/bin/
seinfo.py 34 description="SELinux policy information tool.")
36 parser.add_argument("policy", help="Path to the SELinux policy to query.", nargs="?")
  /external/selinux/sepolgen/src/sepolgen/
policygen.py 21 classes and algorithms for the generation of SELinux policy.
27 import selinux.audit2why as audit2why namespace
  /frameworks/native/vulkan/doc/implementors_guide/
implementors_guide.adoc 42 On debuggable devices (+ro.debuggable+ property exists and is non-zero, generally rooted or engineering builds) the loader will also search the directory +/data/local/debug/vulkan+ and attempt to load layer libraries it finds there. This directory doesn't exist by default. On Android N and later, because this location is writable by adb, SELinux policies prevent mapping code located here as executable. So to use layers from here, SELinux enforcement must be disabled: +adb shell setenforce 0+. This mechanism is not intended for application developers, only for IHV and OEM engineers working on test devices that don't have private or sensitive data.
  /system/core/logd/
main.cpp 68 // init is out of the way, pedantically all permissions and selinux
492 // LogAudit listens on NETLINK_AUDIT socket for selinux
  /bionic/tests/
sys_stat_test.cpp 85 // SELinux policy forbids us from creating FIFOs. http://b/17646702.
  /developers/samples/android/wearable/wear/WearNotifications/
template-params.xml 82 be used sparingly. (e.g. VPN clients, SELinux, custom instrumentation runners) -->
  /external/dbus/
config.h 169 /* SELinux support */
  /external/iproute2/include/linux/
xfrm.h 230 __u8 ctx_alg; /* LSMs: e.g., selinux == 1 */

Completed in 1592 milliseconds

<<31323334353637383940>>