/external/selinux/python/sepolgen/tests/ |
test_audit.py | 25 audit1 = """Sep 12 08:26:43 dhcp83-5 kernel: audit(1158064002.046:4): avc: denied { read } for pid=2 496 comm="bluez-pin" name=".gdm1K3IFT" dev=dm-0 ino=3601333 scontext=user_u:system_r:bluetooth_helper_t:s0-s0:c0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file""" 28 audit2 = """type=AVC msg=audit(1158584779.745:708): avc: denied { dac_read_search } for pid=8132 comm="sh" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability""" 30 log1 = """type=AVC msg=audit(1158584779.745:708): avc: denied { dac_read_search } for pid=8132 comm="sh" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability 32 type=AVC msg=audit(1158584779.753:709): avc: denied { dac_override } for pid=8133 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability 33 type=AVC msg=audit(1158584779.753:709): avc: denied { dac_read_search } for pid=8133 comm="vpnc-script" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability 35 type=AVC msg=audit(1158584779.825:710): avc: denied { dac_override } for pid=8134 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability 36 type=AVC msg=audit(1158584779.825:710): avc: denied { dac_read_search } for pid=8134 comm="vpnc-script" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability 38 type=AVC msg=audit(1158584780.793:711): avc: denied { dac_override } for pid=8144 comm="sh" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability 39 type=AVC msg=audit(1158584780.793:711): avc: denied { dac_read_search } for pid=8144 comm="sh" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability 41 type=AVC msg=audit(1158584780.797:712): avc: denied { dac_override } for pid=8145 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capabilit [all...] |
/system/sepolicy/tests/ |
searchpolicy.py | 45 tcontext = {args.target} variable 47 tcontext = set() variable 58 tcontext=tcontext, variable
|
policy.py | 142 if ("tcontext" in kwargs and 143 len(kwargs['tcontext']) > 0 and 144 Rule.tctx not in kwargs['tcontext']): 180 # (any scontext) or (any tcontext) or (any tclass) or (any perms), 184 # Example: QueryTERule(tcontext=["foo", "bar"], perms=["entrypoint"]) 186 # (tcontext="foo" or tcontext="bar") and ("entrypoint" in perms) 191 # add any matching types and attributes for scontext and tcontext 197 if ("tcontext" in kwargs and len(kwargs['tcontext']) > 0) [all...] |
/external/selinux/python/sepolgen/src/sepolgen/ |
audit.py | 147 tcontext - context for the target 161 tcontext=system_u:object_r:modules_object_t:s0 tclass=dir' 168 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file 173 self.tcontext = refpolicy.SecurityContext() 228 elif fields[0] == "tcontext": 229 self.tcontext = refpolicy.SecurityContext(fields[1]) 246 tcontext = self.tcontext.to_string() 251 if (scontext, tcontext, self.tclass, access_tuple) in avcdict.keys(): 252 self.type, self.data = avcdict[(scontext, tcontext, self.tclass, access_tuple) [all...] |
policygen.py | 190 for i in [x[TCONTEXT] for x in sesearch([ALLOW], {SCONTEXT: av.src_type, CLASS: av.obj_class, PERMS: av.perms})]: 259 s.append(' scontext="%s" tcontext="%s"' % 260 (str(msg.scontext), str(msg.tcontext)))
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/sepolgen/ |
audit.py | 147 tcontext - context for the target 161 tcontext=system_u:object_r:modules_object_t:s0 tclass=dir' 168 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file 173 self.tcontext = refpolicy.SecurityContext() 228 elif fields[0] == "tcontext": 229 self.tcontext = refpolicy.SecurityContext(fields[1]) 246 tcontext = self.tcontext.to_string() 251 if (scontext, tcontext, self.tclass, access_tuple) in avcdict.keys(): 252 self.type, self.data = avcdict[(scontext, tcontext, self.tclass, access_tuple) [all...] |
policygen.py | 190 for i in [x[TCONTEXT] for x in sesearch([ALLOW], {SCONTEXT: av.src_type, CLASS: av.obj_class, PERMS: av.perms})]: 259 s.append(' scontext="%s" tcontext="%s"' % 260 (str(msg.scontext), str(msg.tcontext)))
|
/external/selinux/libsepol/src/ |
services.c | 378 * tcontext is the context after the transition, and xcontext is the 387 context_struct_t *tcontext, 498 val2 = tcontext->user; 504 val2 = tcontext->type; 510 val2 = tcontext->role; 539 l2 = &(tcontext->range.level[0]); 545 l2 = &(tcontext->range.level[1]); 551 l2 = &(tcontext->range.level[0]); 557 l2 = &(tcontext->range.level[1]); 568 l1 = &(tcontext->range.level[0]) 1027 context_struct_t *tcontext; local 1080 context_struct_t *tcontext; local 1136 context_struct_t *scontext = 0, *tcontext = 0; local 1172 context_struct_t *scontext = 0, *tcontext = 0; local 1368 context_struct_t *scontext = 0, *tcontext = 0, newcontext; local [all...] |
mls.h | 60 context_struct_t * tcontext,
|
mls.c | 609 context_struct_t * tcontext, 625 rtr.target_type = tcontext->type; 645 return mls_context_cpy_low(newcontext, tcontext); 647 return mls_context_cpy_high(newcontext, tcontext); 649 return mls_context_cpy(newcontext, tcontext);
|
/system/core/logd/ |
LogAudit.cpp | 120 std::string tcontext; local 125 split_line >> scontext >> tcontext >> tclass >> bug_num; 126 denial_to_bug.emplace(scontext + tcontext + tclass, bug_num); 151 std::string tcontext = denialParse(string, ':', "tcontext=u:object_r:"); local 156 if (tcontext.empty()) { 157 tcontext = denialParse(string, ':', "tcontext=u:r:"); 159 auto search = denial_to_bug.find(scontext + tcontext + tclass);
|
/device/linaro/bootloader/edk2/BaseTools/Source/C/VfrCompile/Pccts/antlr/ |
pred.c | 424 pred->tcontext = t;
683 a->tcontext = tlink(a->tcontext, u, k2);
690 preorder(a->tcontext);
748 Tfree(p->tcontext);
789 q->tcontext=tdup(p->tcontext);
|
mrhoist.c | 415 p->tcontext != NULL)) {
424 if (p->tcontext == NULL) {
427 MR_dumpTreeX(depth+2,p->tcontext,0);
783 result=tdup(p->tcontext);
882 t=p->tcontext;
886 p->tcontext=t;
1071 MR_complete_tree(predDepth,&(pred->tcontext),&(pred->completionTree));
1169 require ( (p->tcontext == NULL) == (q->tcontext == NULL),
1170 "tcontext inconsistent"); [all...] |
syn.h | 104 Tree *tcontext; /* used if lookahead depth of > one is needed (tree) */
member in struct:_Predicate 105 int k; /* lookahead depth for this tcontext */
110 set completionTree; /* which lookahead depths are required to complete tcontext? */
|
fset2.c | 925 if (MR_tree_matches_constraints(k,constrain,pred->tcontext)) {
978 if (! MR_tree_matches_constraints(pred->k,constrain,pred->tcontext)) {
982 }; /* end loop on pred scontext/tcontext */
992 if (pred->tcontext != NULL) {
993 tAND=MR_computeTreeAND(t,pred->tcontext);
[all...] |
dumpnode.c | 99 fprintf(stderr,"tcontext: ");
100 preorder(p->tcontext);
|
antlr.g | [all...] |
antlr.c | [all...] |
gen.c | 560 /*** if ( p->k>1 && p->tcontext!=NULL ) ***/
561 if ( p->tcontext!=NULL )
564 genExprTree(p->tcontext, 1);
827 genExprTree(p->source->ampersandPred->tcontext,1);
[all...] |
fset.c | 530 !is_single_tuple(predicate->tcontext)) ||
[all...] |