OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
refs:SELinux
(Results
1 - 22
of
22
) sorted by null
/cts/tools/selinux/
SELinuxNeverallowTestFrame.py
35
* Neverallow Rules
SELinux
tests.
143
assertTrue("The following errors were encountered when validating the
SELinux
"
/compatibility/cdd/9_security-model/
9_7_kernel-security-features.md
4
(
SELinux
) mandatory access control (MAC) system, seccomp sandboxing, and other
8
SELinux
or any other security features are implemented below the Android
14
* [C-0-3] MUST NOT make
SELinux
or any other security features implemented
66
* [C-1-1] MUST implement
SELinux
.
67
* [C-1-2] MUST set
SELinux
to global enforcing mode.
73
for both AOSP
SELinux
domains as well as device/vendor specific domains.
75
in per-application
SELinux
sandboxes with per-app
SELinux
restrictions on each
77
* SHOULD retain the default
SELinux
policy provided in the system/sepolicy
85
equivalent to
SELinux
[
all
...]
/frameworks/base/core/java/android/os/
SELinux.java
27
*
SELinux
interaction.
30
public class
SELinux
{
31
private static final String TAG = "
SELinux
";
33
/** Keep in sync with ./external/libselinux/include/
selinux
/android.h */
41
* Determine whether
SELinux
is disabled or enabled.
42
* @return a boolean indicating whether
SELinux
is enabled.
47
* Determine whether
SELinux
is permissive or enforcing.
48
* @return a boolean indicating whether
SELinux
is enforcing.
105
* Restores a file to its default
SELinux
security context.
106
* If the system is not compiled with
SELinux
, then {@code true
[
all
...]
/frameworks/base/cmds/am/src/com/android/commands/am/
Am.java
25
import android.os.
SELinux
;
122
final String tcon =
SELinux
.getFileContext(file.getAbsolutePath());
123
if (!
SELinux
.checkSELinuxAccess(seLinuxContext, tcon, "file", "write")) {
/external/chromium-trace/catapult/devil/devil/android/
flag_changer.py
171
"""Set
SELinux
to permissive, if needed.
184
"""Restore
SELinux
policy if it had been previously made permissive."""
/frameworks/base/services/backup/java/com/android/server/backup/
KeyValueAdbBackupEngine.java
19
import android.os.
SELinux
;
134
if (!
SELinux
.restorecon(mBackupDataName)) {
135
Slog.e(TAG, "
SELinux
restorecon failed on " + mBackupDataName);
BackupManagerService.java
77
import android.os.
SELinux
;
821
if (!
SELinux
.restorecon(mBaseStateDir)) {
822
Slog.e(TAG, "
SELinux
restorecon failed on " + mBaseStateDir);
[
all
...]
/packages/apps/TvSettings/Settings/src/com/android/tv/settings/about/
AboutFragment.java
27
import android.os.
SELinux
;
65
private static final String PROPERTY_SELINUX_STATUS = "ro.build.
selinux
";
145
if (!
SELinux
.isSELinuxEnabled()) {
147
} else if (!
SELinux
.isSELinuxEnforced()) {
151
// Remove
selinux
information if property is not present
/system/sepolicy/
treble_sepolicy_tests_for_release.mk
6
# compatibility guarantees are upheld between
SELinux
version bumps.
51
# targeting the $(version)
SELinux
release. This ensures that our policy will build
Android.mk
6
#
SELinux
policy version.
7
# Must be <= /sys/fs/
selinux
/policyvers reported by the Android kernel.
184
# Include
SELinux
policy. We do this here because different modules
189
# inside init/init.cpp for loading
SELinux
policy from files.
192
# Use split
SELinux
policy
270
LOCAL_MODULE_PATH := $(TARGET_OUT)/etc/
selinux
380
LOCAL_MODULE_PATH := $(TARGET_OUT)/etc/
selinux
424
LOCAL_MODULE_PATH := $(TARGET_OUT_VENDOR)/etc/
selinux
439
LOCAL_MODULE_PATH := $(TARGET_OUT)/etc/
selinux
/mapping
474
LOCAL_MODULE_PATH := $(TARGET_OUT)/etc/
selinux
/mappin
[
all
...]
/frameworks/base/core/java/com/android/internal/content/
NativeLibraryHelper.java
35
import android.os.
SELinux
;
302
} else if (!
SELinux
.restorecon(path)) {
303
throw new IOException("Cannot set
SELinux
context for " + path.getPath());
/frameworks/base/services/backup/java/com/android/server/backup/internal/
PerformBackupTask.java
47
import android.os.
SELinux
;
[
all
...]
/frameworks/base/services/core/java/com/android/server/pm/
PackageInstallerService.java
60
import android.os.
SELinux
;
656
if (!
SELinux
.restorecon(stageDir)) {
[
all
...]
ShortcutService.java
73
import android.os.
SELinux
;
[
all
...]
UserManagerService.java
63
import android.os.
SELinux
;
[
all
...]
PackageManagerService.java
225
import android.os.
SELinux
;
[
all
...]
/frameworks/base/services/core/java/com/android/server/wallpaper/
WallpaperManagerService.java
74
import android.os.
SELinux
;
257
// has the right
SELinux
label.
261
SELinux
.restorecon(changedFile);
281
SELinux
.restorecon(changedFile);
285
// We also make sure to reapply the correct
SELinux
label.
[
all
...]
/frameworks/base/services/core/java/com/android/server/fingerprint/
FingerprintService.java
62
import android.os.
SELinux
;
[
all
...]
/build/make/core/
config.mk
[
all
...]
/frameworks/base/packages/SettingsProvider/src/com/android/providers/settings/
SettingsProvider.java
61
import android.os.
SELinux
;
691
SELinux
.restorecon(cacheDir);
[
all
...]
/frameworks/base/config/
preloaded-classes
[
all
...]
boot-image-profile.txt
[
all
...]
Completed in 1410 milliseconds