HomeSort by relevance Sort by last modified time
    Searched refs:scontext (Results 1 - 20 of 20) sorted by null

  /external/selinux/libsepol/src/
context.c 83 * allocated string of the correct size. Set `*scontext'
93 char *scontext = NULL; local
109 scontext = malloc(scontext_len);
110 if (!scontext)
112 scontext[scontext_len - 1] = '\0';
117 ptr = scontext;
130 *result = scontext;
136 free(scontext);
149 context_struct_t *scontext = NULL; local
160 scontext = (context_struct_t *) malloc(sizeof(context_struct_t))
    [all...]
mls.h 45 char **scontext);
50 char **scontext, context_struct_t * context);
59 context_struct_t * scontext,
genusers.c 187 char *scontext, *r, *s; local
210 scontext = malloc(p - q);
211 if (!scontext) {
217 r = scontext;
225 r = scontext;
230 ERR(NULL, "invalid level %s (%s:%u)", scontext,
232 free(scontext);
236 free(scontext);
256 scontext = malloc(p - q);
257 if (!scontext) {
    [all...]
services.c 376 * only. For these rules, scontext is the context before the transition,
385 static int constraint_expr_eval_reason(context_struct_t *scontext,
496 val1 = scontext->user;
502 val1 = scontext->type;
508 val1 = scontext->role;
537 l1 = &(scontext->range.level[0]);
543 l1 = &(scontext->range.level[0]);
549 l1 = &(scontext->range.level[1]);
555 l1 = &(scontext->range.level[1]);
561 l1 = &(scontext->range.level[0])
1068 context_struct_t *scontext = 0, *tcontext = 0; local
1104 context_struct_t *scontext = 0, *tcontext = 0; local
1304 context_struct_t *scontext = 0, *tcontext = 0, newcontext; local
    [all...]
mls.c 164 * the MLS fields of `context' into the string `*scontext'.
165 * Update `*scontext' to point to the end of the MLS fields.
168 const context_struct_t * context, char **scontext)
178 scontextp = *scontext;
250 *scontext = scontextp;
322 * the string `*scontext'. Update `*scontext' to
330 char oldc, char **scontext, context_struct_t * context)
347 scontextp = p = *scontext;
442 *scontext = ++p
    [all...]
  /external/selinux/sepolgen/tests/
test_audit.py 25 audit1 = """Sep 12 08:26:43 dhcp83-5 kernel: audit(1158064002.046:4): avc: denied { read } for pid=2 496 comm="bluez-pin" name=".gdm1K3IFT" dev=dm-0 ino=3601333 scontext=user_u:system_r:bluetooth_helper_t:s0-s0:c0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file"""
28 audit2 = """type=AVC msg=audit(1158584779.745:708): avc: denied { dac_read_search } for pid=8132 comm="sh" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability"""
30 log1 = """type=AVC msg=audit(1158584779.745:708): avc: denied { dac_read_search } for pid=8132 comm="sh" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
32 type=AVC msg=audit(1158584779.753:709): avc: denied { dac_override } for pid=8133 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
33 type=AVC msg=audit(1158584779.753:709): avc: denied { dac_read_search } for pid=8133 comm="vpnc-script" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
35 type=AVC msg=audit(1158584779.825:710): avc: denied { dac_override } for pid=8134 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
36 type=AVC msg=audit(1158584779.825:710): avc: denied { dac_read_search } for pid=8134 comm="vpnc-script" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
38 type=AVC msg=audit(1158584780.793:711): avc: denied { dac_override } for pid=8144 comm="sh" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
39 type=AVC msg=audit(1158584780.793:711): avc: denied { dac_read_search } for pid=8144 comm="sh" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
41 type=AVC msg=audit(1158584780.797:712): avc: denied { dac_override } for pid=8145 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capabilit
    [all...]
  /external/selinux/sepolgen/src/sepolgen/
audit.py 146 scontext - context for the source (process) that generated the message
160 scontext=user_u:system_r:setroubleshootd_t:s0
167 scontext=user_u:system_r:bluetooth_helper_t:s0-s0:c0
172 self.scontext = refpolicy.SecurityContext()
225 if fields[0] == "scontext":
226 self.scontext = refpolicy.SecurityContext(fields[1])
247 scontext = self.scontext.to_string()
251 if (scontext, tcontext, self.tclass, access_tuple) in avcdict.keys():
252 self.type, self.data = avcdict[(scontext, tcontext, self.tclass, access_tuple)
    [all...]
policygen.py 190 for i in [x[TCONTEXT] for x in sesearch([ALLOW], {SCONTEXT: av.src_type, CLASS: av.obj_class, PERMS: av.perms})]:
259 s.append(' scontext="%s" tcontext="%s"' %
260 (str(msg.scontext), str(msg.tcontext)))
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/sepolgen/
audit.py 146 scontext - context for the source (process) that generated the message
160 scontext=user_u:system_r:setroubleshootd_t:s0
167 scontext=user_u:system_r:bluetooth_helper_t:s0-s0:c0
172 self.scontext = refpolicy.SecurityContext()
225 if fields[0] == "scontext":
226 self.scontext = refpolicy.SecurityContext(fields[1])
247 scontext = self.scontext.to_string()
251 if (scontext, tcontext, self.tclass, access_tuple) in avcdict.keys():
252 self.type, self.data = avcdict[(scontext, tcontext, self.tclass, access_tuple)
    [all...]
policygen.py 190 for i in [x[TCONTEXT] for x in sesearch([ALLOW], {SCONTEXT: av.src_type, CLASS: av.obj_class, PERMS: av.perms})]:
259 s.append(' scontext="%s" tcontext="%s"' %
260 (str(msg.scontext), str(msg.tcontext)))
  /external/selinux/libselinux/src/
is_customizable_type.c 64 int is_context_customizable(const char * scontext)
75 c = context_new(scontext);
matchpathcon.c 509 char * scontext = NULL; local
518 if (selabel_lookup_raw(hnd, &scontext, path, st.st_mode)) {
522 rc = lsetfilecon_raw(path, scontext);
523 freecon(scontext);
  /external/selinux/policycoreutils/gui/
fcontextPage.py 34 def __init__(self, scontext):
35 self.scontext = scontext
36 con = scontext.split(":")
44 return self.scontext
154 scontext = store.get_value(iter, TYPE_COL)
155 scon = context(scontext)
  /external/selinux/libsepol/include/sepol/policydb/
services.h 141 * allocated string of the correct size. Set `*scontext'
146 sepol_security_context_t * scontext, /* OUT */
151 * has the string representation specified by `scontext'.
153 extern int sepol_context_to_sid(const sepol_security_context_t scontext, /* IN */
  /external/selinux/checkpolicy/
checkpolicy.c 126 sepol_security_context_t scontext; local
130 rc = sepol_sid_to_context(sid, &scontext, &scontext_len);
134 printf("sid %d -> scontext %s\n", sid, scontext);
135 free(scontext);
383 sepol_security_context_t scontext; local
768 &scontext, &scontext_len);
771 printf("\nscontext %s\n", scontext);
772 free(scontext);
785 printf("scontext? ")
    [all...]
  /external/jetty/src/java/org/eclipse/jetty/server/handler/
ResourceHandler.java 155 Context scontext = ContextHandler.getCurrentContext(); local
156 _context = (scontext==null?null:scontext.getContextHandler());
  /external/jetty/src/java/org/eclipse/jetty/servlet/
StatisticsServlet.java 54 ContextHandler.Context scontext = (ContextHandler.Context) context; local
55 Server _server = scontext.getContextHandler().getServer();
DefaultServlet.java 311 ContextHandler.Context scontext=ContextHandler.getCurrentContext(); local
312 if (scontext==null)
    [all...]
  /external/selinux/libselinux/include/selinux/
selinux.h 613 extern int is_context_customizable(const char * scontext);
  /external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/
org.mortbay.jetty.server_6.1.23.v201004211559.jar 

Completed in 466 milliseconds