/external/selinux/libsepol/src/ |
context.c | 83 * allocated string of the correct size. Set `*scontext' 93 char *scontext = NULL; local 109 scontext = malloc(scontext_len); 110 if (!scontext) 112 scontext[scontext_len - 1] = '\0'; 117 ptr = scontext; 130 *result = scontext; 136 free(scontext); 149 context_struct_t *scontext = NULL; local 160 scontext = (context_struct_t *) malloc(sizeof(context_struct_t)) [all...] |
mls.h | 45 char **scontext); 50 char **scontext, context_struct_t * context); 59 context_struct_t * scontext,
|
genusers.c | 187 char *scontext, *r, *s; local 210 scontext = malloc(p - q); 211 if (!scontext) { 217 r = scontext; 225 r = scontext; 230 ERR(NULL, "invalid level %s (%s:%u)", scontext, 232 free(scontext); 236 free(scontext); 256 scontext = malloc(p - q); 257 if (!scontext) { [all...] |
services.c | 376 * only. For these rules, scontext is the context before the transition, 385 static int constraint_expr_eval_reason(context_struct_t *scontext, 496 val1 = scontext->user; 502 val1 = scontext->type; 508 val1 = scontext->role; 537 l1 = &(scontext->range.level[0]); 543 l1 = &(scontext->range.level[0]); 549 l1 = &(scontext->range.level[1]); 555 l1 = &(scontext->range.level[1]); 561 l1 = &(scontext->range.level[0]) 1068 context_struct_t *scontext = 0, *tcontext = 0; local 1104 context_struct_t *scontext = 0, *tcontext = 0; local 1304 context_struct_t *scontext = 0, *tcontext = 0, newcontext; local [all...] |
mls.c | 164 * the MLS fields of `context' into the string `*scontext'. 165 * Update `*scontext' to point to the end of the MLS fields. 168 const context_struct_t * context, char **scontext) 178 scontextp = *scontext; 250 *scontext = scontextp; 322 * the string `*scontext'. Update `*scontext' to 330 char oldc, char **scontext, context_struct_t * context) 347 scontextp = p = *scontext; 442 *scontext = ++p [all...] |
/external/selinux/sepolgen/tests/ |
test_audit.py | 25 audit1 = """Sep 12 08:26:43 dhcp83-5 kernel: audit(1158064002.046:4): avc: denied { read } for pid=2 496 comm="bluez-pin" name=".gdm1K3IFT" dev=dm-0 ino=3601333 scontext=user_u:system_r:bluetooth_helper_t:s0-s0:c0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file""" 28 audit2 = """type=AVC msg=audit(1158584779.745:708): avc: denied { dac_read_search } for pid=8132 comm="sh" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability""" 30 log1 = """type=AVC msg=audit(1158584779.745:708): avc: denied { dac_read_search } for pid=8132 comm="sh" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability 32 type=AVC msg=audit(1158584779.753:709): avc: denied { dac_override } for pid=8133 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability 33 type=AVC msg=audit(1158584779.753:709): avc: denied { dac_read_search } for pid=8133 comm="vpnc-script" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability 35 type=AVC msg=audit(1158584779.825:710): avc: denied { dac_override } for pid=8134 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability 36 type=AVC msg=audit(1158584779.825:710): avc: denied { dac_read_search } for pid=8134 comm="vpnc-script" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability 38 type=AVC msg=audit(1158584780.793:711): avc: denied { dac_override } for pid=8144 comm="sh" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability 39 type=AVC msg=audit(1158584780.793:711): avc: denied { dac_read_search } for pid=8144 comm="sh" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability 41 type=AVC msg=audit(1158584780.797:712): avc: denied { dac_override } for pid=8145 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capabilit [all...] |
/external/selinux/sepolgen/src/sepolgen/ |
audit.py | 146 scontext - context for the source (process) that generated the message 160 scontext=user_u:system_r:setroubleshootd_t:s0 167 scontext=user_u:system_r:bluetooth_helper_t:s0-s0:c0 172 self.scontext = refpolicy.SecurityContext() 225 if fields[0] == "scontext": 226 self.scontext = refpolicy.SecurityContext(fields[1]) 247 scontext = self.scontext.to_string() 251 if (scontext, tcontext, self.tclass, access_tuple) in avcdict.keys(): 252 self.type, self.data = avcdict[(scontext, tcontext, self.tclass, access_tuple) [all...] |
policygen.py | 190 for i in [x[TCONTEXT] for x in sesearch([ALLOW], {SCONTEXT: av.src_type, CLASS: av.obj_class, PERMS: av.perms})]: 259 s.append(' scontext="%s" tcontext="%s"' % 260 (str(msg.scontext), str(msg.tcontext)))
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/sepolgen/ |
audit.py | 146 scontext - context for the source (process) that generated the message 160 scontext=user_u:system_r:setroubleshootd_t:s0 167 scontext=user_u:system_r:bluetooth_helper_t:s0-s0:c0 172 self.scontext = refpolicy.SecurityContext() 225 if fields[0] == "scontext": 226 self.scontext = refpolicy.SecurityContext(fields[1]) 247 scontext = self.scontext.to_string() 251 if (scontext, tcontext, self.tclass, access_tuple) in avcdict.keys(): 252 self.type, self.data = avcdict[(scontext, tcontext, self.tclass, access_tuple) [all...] |
policygen.py | 190 for i in [x[TCONTEXT] for x in sesearch([ALLOW], {SCONTEXT: av.src_type, CLASS: av.obj_class, PERMS: av.perms})]: 259 s.append(' scontext="%s" tcontext="%s"' % 260 (str(msg.scontext), str(msg.tcontext)))
|
/external/selinux/libselinux/src/ |
is_customizable_type.c | 64 int is_context_customizable(const char * scontext) 75 c = context_new(scontext);
|
matchpathcon.c | 509 char * scontext = NULL; local 518 if (selabel_lookup_raw(hnd, &scontext, path, st.st_mode)) { 522 rc = lsetfilecon_raw(path, scontext); 523 freecon(scontext);
|
/external/selinux/policycoreutils/gui/ |
fcontextPage.py | 34 def __init__(self, scontext): 35 self.scontext = scontext 36 con = scontext.split(":") 44 return self.scontext 154 scontext = store.get_value(iter, TYPE_COL) 155 scon = context(scontext)
|
/external/selinux/libsepol/include/sepol/policydb/ |
services.h | 141 * allocated string of the correct size. Set `*scontext' 146 sepol_security_context_t * scontext, /* OUT */ 151 * has the string representation specified by `scontext'. 153 extern int sepol_context_to_sid(const sepol_security_context_t scontext, /* IN */
|
/external/selinux/checkpolicy/ |
checkpolicy.c | 126 sepol_security_context_t scontext; local 130 rc = sepol_sid_to_context(sid, &scontext, &scontext_len); 134 printf("sid %d -> scontext %s\n", sid, scontext); 135 free(scontext); 383 sepol_security_context_t scontext; local 768 &scontext, &scontext_len); 771 printf("\nscontext %s\n", scontext); 772 free(scontext); 785 printf("scontext? ") [all...] |
/external/jetty/src/java/org/eclipse/jetty/server/handler/ |
ResourceHandler.java | 155 Context scontext = ContextHandler.getCurrentContext(); local 156 _context = (scontext==null?null:scontext.getContextHandler());
|
/external/jetty/src/java/org/eclipse/jetty/servlet/ |
StatisticsServlet.java | 54 ContextHandler.Context scontext = (ContextHandler.Context) context; local 55 Server _server = scontext.getContextHandler().getServer();
|
DefaultServlet.java | 311 ContextHandler.Context scontext=ContextHandler.getCurrentContext(); local 312 if (scontext==null) [all...] |
/external/selinux/libselinux/include/selinux/ |
selinux.h | 613 extern int is_context_customizable(const char * scontext);
|
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
org.mortbay.jetty.server_6.1.23.v201004211559.jar | |