HomeSort by relevance Sort by last modified time
    Searched refs:tcontext (Results 1 - 20 of 20) sorted by null

  /external/selinux/python/sepolgen/tests/
test_audit.py 25 audit1 = """Sep 12 08:26:43 dhcp83-5 kernel: audit(1158064002.046:4): avc: denied { read } for pid=2 496 comm="bluez-pin" name=".gdm1K3IFT" dev=dm-0 ino=3601333 scontext=user_u:system_r:bluetooth_helper_t:s0-s0:c0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file"""
28 audit2 = """type=AVC msg=audit(1158584779.745:708): avc: denied { dac_read_search } for pid=8132 comm="sh" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability"""
30 log1 = """type=AVC msg=audit(1158584779.745:708): avc: denied { dac_read_search } for pid=8132 comm="sh" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
32 type=AVC msg=audit(1158584779.753:709): avc: denied { dac_override } for pid=8133 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
33 type=AVC msg=audit(1158584779.753:709): avc: denied { dac_read_search } for pid=8133 comm="vpnc-script" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
35 type=AVC msg=audit(1158584779.825:710): avc: denied { dac_override } for pid=8134 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
36 type=AVC msg=audit(1158584779.825:710): avc: denied { dac_read_search } for pid=8134 comm="vpnc-script" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
38 type=AVC msg=audit(1158584780.793:711): avc: denied { dac_override } for pid=8144 comm="sh" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
39 type=AVC msg=audit(1158584780.793:711): avc: denied { dac_read_search } for pid=8144 comm="sh" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
41 type=AVC msg=audit(1158584780.797:712): avc: denied { dac_override } for pid=8145 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capabilit
    [all...]
  /system/sepolicy/tests/
searchpolicy.py 45 tcontext = {args.target} variable
47 tcontext = set() variable
58 tcontext=tcontext, variable
policy.py 142 if ("tcontext" in kwargs and
143 len(kwargs['tcontext']) > 0 and
144 Rule.tctx not in kwargs['tcontext']):
180 # (any scontext) or (any tcontext) or (any tclass) or (any perms),
184 # Example: QueryTERule(tcontext=["foo", "bar"], perms=["entrypoint"])
186 # (tcontext="foo" or tcontext="bar") and ("entrypoint" in perms)
191 # add any matching types and attributes for scontext and tcontext
197 if ("tcontext" in kwargs and len(kwargs['tcontext']) > 0)
    [all...]
  /external/selinux/python/sepolgen/src/sepolgen/
audit.py 147 tcontext - context for the target
161 tcontext=system_u:object_r:modules_object_t:s0 tclass=dir'
168 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file
173 self.tcontext = refpolicy.SecurityContext()
228 elif fields[0] == "tcontext":
229 self.tcontext = refpolicy.SecurityContext(fields[1])
246 tcontext = self.tcontext.to_string()
251 if (scontext, tcontext, self.tclass, access_tuple) in avcdict.keys():
252 self.type, self.data = avcdict[(scontext, tcontext, self.tclass, access_tuple)
    [all...]
policygen.py 190 for i in [x[TCONTEXT] for x in sesearch([ALLOW], {SCONTEXT: av.src_type, CLASS: av.obj_class, PERMS: av.perms})]:
259 s.append(' scontext="%s" tcontext="%s"' %
260 (str(msg.scontext), str(msg.tcontext)))
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/sepolgen/
audit.py 147 tcontext - context for the target
161 tcontext=system_u:object_r:modules_object_t:s0 tclass=dir'
168 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file
173 self.tcontext = refpolicy.SecurityContext()
228 elif fields[0] == "tcontext":
229 self.tcontext = refpolicy.SecurityContext(fields[1])
246 tcontext = self.tcontext.to_string()
251 if (scontext, tcontext, self.tclass, access_tuple) in avcdict.keys():
252 self.type, self.data = avcdict[(scontext, tcontext, self.tclass, access_tuple)
    [all...]
policygen.py 190 for i in [x[TCONTEXT] for x in sesearch([ALLOW], {SCONTEXT: av.src_type, CLASS: av.obj_class, PERMS: av.perms})]:
259 s.append(' scontext="%s" tcontext="%s"' %
260 (str(msg.scontext), str(msg.tcontext)))
  /external/selinux/libsepol/src/
services.c 378 * tcontext is the context after the transition, and xcontext is the
387 context_struct_t *tcontext,
498 val2 = tcontext->user;
504 val2 = tcontext->type;
510 val2 = tcontext->role;
539 l2 = &(tcontext->range.level[0]);
545 l2 = &(tcontext->range.level[1]);
551 l2 = &(tcontext->range.level[0]);
557 l2 = &(tcontext->range.level[1]);
568 l1 = &(tcontext->range.level[0])
1027 context_struct_t *tcontext; local
1080 context_struct_t *tcontext; local
1136 context_struct_t *scontext = 0, *tcontext = 0; local
1172 context_struct_t *scontext = 0, *tcontext = 0; local
1368 context_struct_t *scontext = 0, *tcontext = 0, newcontext; local
    [all...]
mls.h 60 context_struct_t * tcontext,
mls.c 609 context_struct_t * tcontext,
625 rtr.target_type = tcontext->type;
645 return mls_context_cpy_low(newcontext, tcontext);
647 return mls_context_cpy_high(newcontext, tcontext);
649 return mls_context_cpy(newcontext, tcontext);
  /system/core/logd/
LogAudit.cpp 120 std::string tcontext; local
125 split_line >> scontext >> tcontext >> tclass >> bug_num;
126 denial_to_bug.emplace(scontext + tcontext + tclass, bug_num);
151 std::string tcontext = denialParse(string, ':', "tcontext=u:object_r:"); local
156 if (tcontext.empty()) {
157 tcontext = denialParse(string, ':', "tcontext=u:r:");
159 auto search = denial_to_bug.find(scontext + tcontext + tclass);
  /device/linaro/bootloader/edk2/BaseTools/Source/C/VfrCompile/Pccts/antlr/
pred.c 424 pred->tcontext = t;
683 a->tcontext = tlink(a->tcontext, u, k2);
690 preorder(a->tcontext);
748 Tfree(p->tcontext);
789 q->tcontext=tdup(p->tcontext);
mrhoist.c 415 p->tcontext != NULL)) {
424 if (p->tcontext == NULL) {
427 MR_dumpTreeX(depth+2,p->tcontext,0);
783 result=tdup(p->tcontext);
882 t=p->tcontext;
886 p->tcontext=t;
1071 MR_complete_tree(predDepth,&(pred->tcontext),&(pred->completionTree));
1169 require ( (p->tcontext == NULL) == (q->tcontext == NULL),
1170 "tcontext inconsistent");
    [all...]
syn.h 104 Tree *tcontext; /* used if lookahead depth of > one is needed (tree) */ member in struct:_Predicate
105 int k; /* lookahead depth for this tcontext */
110 set completionTree; /* which lookahead depths are required to complete tcontext? */
fset2.c 925 if (MR_tree_matches_constraints(k,constrain,pred->tcontext)) {
978 if (! MR_tree_matches_constraints(pred->k,constrain,pred->tcontext)) {
982 }; /* end loop on pred scontext/tcontext */
992 if (pred->tcontext != NULL) {
993 tAND=MR_computeTreeAND(t,pred->tcontext);
    [all...]
dumpnode.c 99 fprintf(stderr,"tcontext: ");
100 preorder(p->tcontext);
antlr.g     [all...]
antlr.c     [all...]
gen.c 560 /*** if ( p->k>1 && p->tcontext!=NULL ) ***/
561 if ( p->tcontext!=NULL )
564 genExprTree(p->tcontext, 1);
827 genExprTree(p->source->ampersandPred->tcontext,1);
    [all...]
fset.c 530 !is_single_tuple(predicate->tcontext)) ||
    [all...]

Completed in 531 milliseconds