HomeSort by relevance Sort by last modified time
    Searched refs:tcontext (Results 1 - 8 of 8) sorted by null

  /external/selinux/sepolgen/tests/
test_audit.py 25 audit1 = """Sep 12 08:26:43 dhcp83-5 kernel: audit(1158064002.046:4): avc: denied { read } for pid=2 496 comm="bluez-pin" name=".gdm1K3IFT" dev=dm-0 ino=3601333 scontext=user_u:system_r:bluetooth_helper_t:s0-s0:c0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file"""
28 audit2 = """type=AVC msg=audit(1158584779.745:708): avc: denied { dac_read_search } for pid=8132 comm="sh" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability"""
30 log1 = """type=AVC msg=audit(1158584779.745:708): avc: denied { dac_read_search } for pid=8132 comm="sh" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
32 type=AVC msg=audit(1158584779.753:709): avc: denied { dac_override } for pid=8133 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
33 type=AVC msg=audit(1158584779.753:709): avc: denied { dac_read_search } for pid=8133 comm="vpnc-script" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
35 type=AVC msg=audit(1158584779.825:710): avc: denied { dac_override } for pid=8134 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
36 type=AVC msg=audit(1158584779.825:710): avc: denied { dac_read_search } for pid=8134 comm="vpnc-script" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
38 type=AVC msg=audit(1158584780.793:711): avc: denied { dac_override } for pid=8144 comm="sh" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
39 type=AVC msg=audit(1158584780.793:711): avc: denied { dac_read_search } for pid=8144 comm="sh" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
41 type=AVC msg=audit(1158584780.797:712): avc: denied { dac_override } for pid=8145 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capabilit
    [all...]
  /external/selinux/sepolgen/src/sepolgen/
audit.py 147 tcontext - context for the target
161 tcontext=system_u:object_r:modules_object_t:s0 tclass=dir'
168 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file
173 self.tcontext = refpolicy.SecurityContext()
228 elif fields[0] == "tcontext":
229 self.tcontext = refpolicy.SecurityContext(fields[1])
246 tcontext = self.tcontext.to_string()
251 if (scontext, tcontext, self.tclass, access_tuple) in avcdict.keys():
252 self.type, self.data = avcdict[(scontext, tcontext, self.tclass, access_tuple)
    [all...]
policygen.py 190 for i in [x[TCONTEXT] for x in sesearch([ALLOW], {SCONTEXT: av.src_type, CLASS: av.obj_class, PERMS: av.perms})]:
259 s.append(' scontext="%s" tcontext="%s"' %
260 (str(msg.scontext), str(msg.tcontext)))
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/sepolgen/
audit.py 147 tcontext - context for the target
161 tcontext=system_u:object_r:modules_object_t:s0 tclass=dir'
168 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file
173 self.tcontext = refpolicy.SecurityContext()
228 elif fields[0] == "tcontext":
229 self.tcontext = refpolicy.SecurityContext(fields[1])
246 tcontext = self.tcontext.to_string()
251 if (scontext, tcontext, self.tclass, access_tuple) in avcdict.keys():
252 self.type, self.data = avcdict[(scontext, tcontext, self.tclass, access_tuple)
    [all...]
policygen.py 190 for i in [x[TCONTEXT] for x in sesearch([ALLOW], {SCONTEXT: av.src_type, CLASS: av.obj_class, PERMS: av.perms})]:
259 s.append(' scontext="%s" tcontext="%s"' %
260 (str(msg.scontext), str(msg.tcontext)))
  /external/selinux/libsepol/src/
mls.h 60 context_struct_t * tcontext,
services.c 377 * tcontext is the context after the transition, and xcontext is the
386 context_struct_t *tcontext,
497 val2 = tcontext->user;
503 val2 = tcontext->type;
509 val2 = tcontext->role;
538 l2 = &(tcontext->range.level[0]);
544 l2 = &(tcontext->range.level[1]);
550 l2 = &(tcontext->range.level[0]);
556 l2 = &(tcontext->range.level[1]);
567 l1 = &(tcontext->range.level[0])
959 context_struct_t *tcontext; local
1012 context_struct_t *tcontext; local
1068 context_struct_t *scontext = 0, *tcontext = 0; local
1104 context_struct_t *scontext = 0, *tcontext = 0; local
1304 context_struct_t *scontext = 0, *tcontext = 0, newcontext; local
    [all...]
mls.c 607 context_struct_t * tcontext,
620 rtr->target_type == tcontext->type &&
638 if (newcontext->type != tcontext->type) {
643 return mls_copy_context(newcontext, tcontext);

Completed in 104 milliseconds