HomeSort by relevance Sort by last modified time
    Searched refs:tcontext (Results 1 - 15 of 15) sorted by null

  /external/selinux/python/sepolgen/tests/
test_audit.py 25 audit1 = """Sep 12 08:26:43 dhcp83-5 kernel: audit(1158064002.046:4): avc: denied { read } for pid=2 496 comm="bluez-pin" name=".gdm1K3IFT" dev=dm-0 ino=3601333 scontext=user_u:system_r:bluetooth_helper_t:s0-s0:c0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file"""
28 audit2 = """type=AVC msg=audit(1158584779.745:708): avc: denied { dac_read_search } for pid=8132 comm="sh" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability"""
30 log1 = """type=AVC msg=audit(1158584779.745:708): avc: denied { dac_read_search } for pid=8132 comm="sh" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
32 type=AVC msg=audit(1158584779.753:709): avc: denied { dac_override } for pid=8133 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
33 type=AVC msg=audit(1158584779.753:709): avc: denied { dac_read_search } for pid=8133 comm="vpnc-script" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
35 type=AVC msg=audit(1158584779.825:710): avc: denied { dac_override } for pid=8134 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
36 type=AVC msg=audit(1158584779.825:710): avc: denied { dac_read_search } for pid=8134 comm="vpnc-script" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
38 type=AVC msg=audit(1158584780.793:711): avc: denied { dac_override } for pid=8144 comm="sh" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
39 type=AVC msg=audit(1158584780.793:711): avc: denied { dac_read_search } for pid=8144 comm="sh" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
41 type=AVC msg=audit(1158584780.797:712): avc: denied { dac_override } for pid=8145 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capabilit
    [all...]
  /external/selinux/python/sepolgen/src/sepolgen/
audit.py 147 tcontext - context for the target
162 tcontext=system_u:object_r:modules_object_t:s0 tclass=dir'
169 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file
174 self.tcontext = refpolicy.SecurityContext()
230 elif fields[0] == "tcontext":
231 self.tcontext = refpolicy.SecurityContext(fields[1])
253 tcontext = self.tcontext.to_string()
258 if (scontext, tcontext, self.tclass, access_tuple) in avcdict.keys():
259 self.type, self.data = avcdict[(scontext, tcontext, self.tclass, access_tuple)
    [all...]
policygen.py 205 for i in [x[TCONTEXT] for x in sesearch([ALLOW], {SCONTEXT: av.src_type, CLASS: av.obj_class, PERMS: av.perms})]:
288 s.append(' scontext="%s" tcontext="%s"' %
289 (str(msg.scontext), str(msg.tcontext)))
  /external/selinux/libsepol/src/
services.c 378 * tcontext is the context after the transition, and xcontext is the
387 context_struct_t *tcontext,
498 val2 = tcontext->user;
504 val2 = tcontext->type;
510 val2 = tcontext->role;
539 l2 = &(tcontext->range.level[0]);
545 l2 = &(tcontext->range.level[1]);
551 l2 = &(tcontext->range.level[0]);
557 l2 = &(tcontext->range.level[1]);
568 l1 = &(tcontext->range.level[0])
1027 context_struct_t *tcontext; local
1080 context_struct_t *tcontext; local
1136 context_struct_t *scontext = 0, *tcontext = 0; local
1172 context_struct_t *scontext = 0, *tcontext = 0; local
1368 context_struct_t *scontext = 0, *tcontext = 0, newcontext; local
    [all...]
mls.h 60 context_struct_t * tcontext,
mls.c 609 context_struct_t * tcontext,
625 rtr.target_type = tcontext->type;
645 return mls_context_cpy_low(newcontext, tcontext);
647 return mls_context_cpy_high(newcontext, tcontext);
649 return mls_context_cpy(newcontext, tcontext);
  /device/linaro/bootloader/edk2/BaseTools/Source/C/VfrCompile/Pccts/antlr/
pred.c 424 pred->tcontext = t;
683 a->tcontext = tlink(a->tcontext, u, k2);
690 preorder(a->tcontext);
748 Tfree(p->tcontext);
789 q->tcontext=tdup(p->tcontext);
mrhoist.c 415 p->tcontext != NULL)) {
424 if (p->tcontext == NULL) {
427 MR_dumpTreeX(depth+2,p->tcontext,0);
783 result=tdup(p->tcontext);
882 t=p->tcontext;
886 p->tcontext=t;
1071 MR_complete_tree(predDepth,&(pred->tcontext),&(pred->completionTree));
1169 require ( (p->tcontext == NULL) == (q->tcontext == NULL),
1170 "tcontext inconsistent");
    [all...]
syn.h 104 Tree *tcontext; /* used if lookahead depth of > one is needed (tree) */ member in struct:_Predicate
105 int k; /* lookahead depth for this tcontext */
110 set completionTree; /* which lookahead depths are required to complete tcontext? */
fset2.c 925 if (MR_tree_matches_constraints(k,constrain,pred->tcontext)) {
978 if (! MR_tree_matches_constraints(pred->k,constrain,pred->tcontext)) {
982 }; /* end loop on pred scontext/tcontext */
992 if (pred->tcontext != NULL) {
993 tAND=MR_computeTreeAND(t,pred->tcontext);
    [all...]
dumpnode.c 99 fprintf(stderr,"tcontext: ");
100 preorder(p->tcontext);
antlr.g     [all...]
antlr.c     [all...]
gen.c 560 /*** if ( p->k>1 && p->tcontext!=NULL ) ***/
561 if ( p->tcontext!=NULL )
564 genExprTree(p->tcontext, 1);
827 genExprTree(p->source->ampersandPred->tcontext,1);
    [all...]
fset.c 530 !is_single_tuple(predicate->tcontext)) ||
    [all...]

Completed in 302 milliseconds