Searched
full:selinux (Results
751 -
775 of
1108) sorted by null
<<31323334353637383940>>
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/linux/ |
netlink.h | 14 #define NETLINK_SELINUX 7 /* SELinux event notifications */
|
pfkeyv2.h | 223 __u8 sadb_x_ctx_alg; /* LSMs: e.g., selinux == 1 */
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/sepolgen/ |
audit.py | 137 import selinux.audit2why as audit2why namespace 335 selinux related messages. 342 invalid_msgs - selinux related messages that are not valid. Messages 366 # message is an SELinux related message and then parses it into
|
policygen.py | 21 classes and algorithms for the generation of SELinux policy. 27 import selinux.audit2why as audit2why namespace
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/setools/policyrep/ |
fscontext.py | 138 # there are more rule types, but modern SELinux
|
/system/core/rootdir/ |
init.rc | 339 # make the selinux kernel policy world-readable 340 chmod 0444 /sys/fs/selinux/policy 484 setprop selinux.reload_policy 1 486 # Set SELinux security contexts on upgrade or policy update.
|
/system/extras/ext4_utils/ |
ext4_crypt_init_extensions.cpp | 65 // Make sure folder exists. Use make_dir to set selinux permissions.
|
make_ext4fs.c | 75 #include <selinux/selinux.h> 76 #include <selinux/label.h> 335 error("failed to set SELinux context on %s\n", dentries[i].path);
|
/system/sepolicy/ |
README | 1 This directory contains the core Android SELinux policy configuration.
|
shell.te | 114 # Allow pulling the SELinux policy for CTS purposes
|
/system/sepolicy/tools/sepolicy-analyze/ |
README | 74 statements in the same format as the SELinux policy.conf file, i.e. after
|
/external/mesa3d/ |
configure.ac | 511 dnl SELinux awareness. 512 AC_ARG_ENABLE([selinux], 513 [AS_HELP_STRING([--enable-selinux], 514 [Build SELinux-aware Mesa @<:@default=disabled@:>@])], 518 AC_CHECK_HEADER([selinux/selinux.h],[], 519 [AC_MSG_ERROR([SELinux headers not found])]) 520 AC_CHECK_LIB([selinux],[is_selinux_enabled],[], 521 [AC_MSG_ERROR([SELinux library not found])]) [all...] |
/frameworks/base/services/core/java/com/android/server/wallpaper/ |
WallpaperManagerService.java | 67 import android.os.SELinux; 233 // has the right SELinux label. 237 SELinux.restorecon(changedFile); 256 SELinux.restorecon(changedFile); 260 // We also make sure to reapply the correct SELinux label. 468 boolean didRestorecon = SELinux.restorecon(wallpaper.cropFile.getAbsoluteFile()); [all...] |
/docs/source.android.com/src/devices/tech/debug/ |
asan.jd | 115 to disable SELinux, like so:</p> 194 $ adb shell setenforce 0 # disable SELinux
|
/docs/source.android.com/src/security/overview/ |
kernel-security.jd | 108 Linux (SELinux) to apply access control policies and establish an environment of 110 href="{@docRoot}security/selinux/index.html">Validating
|
/external/dbus/bus/ |
main.c | 41 #include "selinux.h" 595 _dbus_warn ("SELinux pre-initialization failed\n");
|
/external/selinux/policycoreutils/mcstrans/src/ |
mcstransd.c | 16 #include <selinux/selinux.h>
|
/external/selinux/prebuilts/bin/ |
seinfo.py | 34 description="SELinux policy information tool.") 36 parser.add_argument("policy", help="Path to the SELinux policy to query.", nargs="?")
|
/external/selinux/sepolgen/src/sepolgen/ |
policygen.py | 21 classes and algorithms for the generation of SELinux policy. 27 import selinux.audit2why as audit2why namespace
|
/frameworks/native/vulkan/doc/implementors_guide/ |
implementors_guide.adoc | 42 On debuggable devices (+ro.debuggable+ property exists and is non-zero, generally rooted or engineering builds) the loader will also search the directory +/data/local/debug/vulkan+ and attempt to load layer libraries it finds there. This directory doesn't exist by default. On Android N and later, because this location is writable by adb, SELinux policies prevent mapping code located here as executable. So to use layers from here, SELinux enforcement must be disabled: +adb shell setenforce 0+. This mechanism is not intended for application developers, only for IHV and OEM engineers working on test devices that don't have private or sensitive data.
|
/system/core/logd/ |
main.cpp | 68 // init is out of the way, pedantically all permissions and selinux 492 // LogAudit listens on NETLINK_AUDIT socket for selinux
|
/bionic/tests/ |
sys_stat_test.cpp | 85 // SELinux policy forbids us from creating FIFOs. http://b/17646702.
|
/developers/samples/android/wearable/wear/WearNotifications/ |
template-params.xml | 82 be used sparingly. (e.g. VPN clients, SELinux, custom instrumentation runners) -->
|
/external/dbus/ |
config.h | 169 /* SELinux support */
|
/external/iproute2/include/linux/ |
xfrm.h | 230 __u8 ctx_alg; /* LSMs: e.g., selinux == 1 */
|
Completed in 1592 milliseconds
<<31323334353637383940>>