OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
refs:tcontext
(Results
1 - 8
of
8
) sorted by null
/external/selinux/sepolgen/tests/
test_audit.py
25
audit1 = """Sep 12 08:26:43 dhcp83-5 kernel: audit(1158064002.046:4): avc: denied { read } for pid=2 496 comm="bluez-pin" name=".gdm1K3IFT" dev=dm-0 ino=3601333 scontext=user_u:system_r:bluetooth_helper_t:s0-s0:c0
tcontext
=system_u:object_r:xdm_tmp_t:s0 tclass=file"""
28
audit2 = """type=AVC msg=audit(1158584779.745:708): avc: denied { dac_read_search } for pid=8132 comm="sh" capability=2 scontext=user_u:system_r:vpnc_t:s0
tcontext
=user_u:system_r:vpnc_t:s0 tclass=capability"""
30
log1 = """type=AVC msg=audit(1158584779.745:708): avc: denied { dac_read_search } for pid=8132 comm="sh" capability=2 scontext=user_u:system_r:vpnc_t:s0
tcontext
=user_u:system_r:vpnc_t:s0 tclass=capability
32
type=AVC msg=audit(1158584779.753:709): avc: denied { dac_override } for pid=8133 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0
tcontext
=user_u:system_r:vpnc_t:s0 tclass=capability
33
type=AVC msg=audit(1158584779.753:709): avc: denied { dac_read_search } for pid=8133 comm="vpnc-script" capability=2 scontext=user_u:system_r:vpnc_t:s0
tcontext
=user_u:system_r:vpnc_t:s0 tclass=capability
35
type=AVC msg=audit(1158584779.825:710): avc: denied { dac_override } for pid=8134 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0
tcontext
=user_u:system_r:vpnc_t:s0 tclass=capability
36
type=AVC msg=audit(1158584779.825:710): avc: denied { dac_read_search } for pid=8134 comm="vpnc-script" capability=2 scontext=user_u:system_r:vpnc_t:s0
tcontext
=user_u:system_r:vpnc_t:s0 tclass=capability
38
type=AVC msg=audit(1158584780.793:711): avc: denied { dac_override } for pid=8144 comm="sh" capability=1 scontext=user_u:system_r:vpnc_t:s0
tcontext
=user_u:system_r:vpnc_t:s0 tclass=capability
39
type=AVC msg=audit(1158584780.793:711): avc: denied { dac_read_search } for pid=8144 comm="sh" capability=2 scontext=user_u:system_r:vpnc_t:s0
tcontext
=user_u:system_r:vpnc_t:s0 tclass=capability
41
type=AVC msg=audit(1158584780.797:712): avc: denied { dac_override } for pid=8145 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0
tcontext
=user_u:system_r:vpnc_t:s0 tclass=capabilit
[
all
...]
/external/selinux/sepolgen/src/sepolgen/
audit.py
147
tcontext
- context for the target
161
tcontext
=system_u:object_r:modules_object_t:s0 tclass=dir'
168
tcontext
=system_u:object_r:xdm_tmp_t:s0 tclass=file
173
self.
tcontext
= refpolicy.SecurityContext()
228
elif fields[0] == "
tcontext
":
229
self.
tcontext
= refpolicy.SecurityContext(fields[1])
246
tcontext
= self.
tcontext
.to_string()
251
if (scontext,
tcontext
, self.tclass, access_tuple) in avcdict.keys():
252
self.type, self.data = avcdict[(scontext,
tcontext
, self.tclass, access_tuple)
[
all
...]
policygen.py
190
for i in [x[
TCONTEXT
] for x in sesearch([ALLOW], {SCONTEXT: av.src_type, CLASS: av.obj_class, PERMS: av.perms})]:
259
s.append(' scontext="%s"
tcontext
="%s"' %
260
(str(msg.scontext), str(msg.
tcontext
)))
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/sepolgen/
audit.py
147
tcontext
- context for the target
161
tcontext
=system_u:object_r:modules_object_t:s0 tclass=dir'
168
tcontext
=system_u:object_r:xdm_tmp_t:s0 tclass=file
173
self.
tcontext
= refpolicy.SecurityContext()
228
elif fields[0] == "
tcontext
":
229
self.
tcontext
= refpolicy.SecurityContext(fields[1])
246
tcontext
= self.
tcontext
.to_string()
251
if (scontext,
tcontext
, self.tclass, access_tuple) in avcdict.keys():
252
self.type, self.data = avcdict[(scontext,
tcontext
, self.tclass, access_tuple)
[
all
...]
policygen.py
190
for i in [x[
TCONTEXT
] for x in sesearch([ALLOW], {SCONTEXT: av.src_type, CLASS: av.obj_class, PERMS: av.perms})]:
259
s.append(' scontext="%s"
tcontext
="%s"' %
260
(str(msg.scontext), str(msg.
tcontext
)))
/external/selinux/libsepol/src/
mls.h
60
context_struct_t *
tcontext
,
services.c
377
*
tcontext
is the context after the transition, and xcontext is the
386
context_struct_t *
tcontext
,
497
val2 =
tcontext
->user;
503
val2 =
tcontext
->type;
509
val2 =
tcontext
->role;
538
l2 = &(
tcontext
->range.level[0]);
544
l2 = &(
tcontext
->range.level[1]);
550
l2 = &(
tcontext
->range.level[0]);
556
l2 = &(
tcontext
->range.level[1]);
567
l1 = &(
tcontext
->range.level[0])
959
context_struct_t *
tcontext
;
local
1012
context_struct_t *
tcontext
;
local
1068
context_struct_t *scontext = 0, *
tcontext
= 0;
local
1104
context_struct_t *scontext = 0, *
tcontext
= 0;
local
1304
context_struct_t *scontext = 0, *
tcontext
= 0, newcontext;
local
[
all
...]
mls.c
607
context_struct_t *
tcontext
,
620
rtr->target_type ==
tcontext
->type &&
638
if (newcontext->type !=
tcontext
->type) {
643
return mls_copy_context(newcontext,
tcontext
);
Completed in 1209 milliseconds