Searched refs:scontext (Results 1 – 6 of 6) sorted by relevance
/system/sepolicy/tests/ |
D | apex_sepolicy_tests.py | 74 scontext: set[str] 94 def AllowRead(tclass, scontext): argument 95 return AllowPerm(tclass, scontext, 'read') 115 case AllowPerm(tclass, scontext, perm): 117 for s in scontext: 118 te_rules = list(pol.QueryTERule(scontext={s},
|
D | searchpolicy.py | 55 scontext = {args.source} variable 57 scontext = set() variable 71 TERules = pol.QueryTERule(scontext=scontext,
|
D | policy.py | 270 scontext = set() 272 scontext |= self.ResolveTypeAttribute(sctx) 273 if (len(scontext) == 0): 275 kwargs['scontext'] = scontext 526 class scontext: class 555 self.alldomains[result] = scontext()
|
D | sepolicy_tests.py | 249 baseRules = test_policy.pol.QueryExpandedTERule(scontext=["isolated_app"]) 254 currentTypeRule = test_policy.pol.QueryExpandedTERule(scontext=[subType])
|
/system/logging/logd/ |
D | LogAudit.cpp | 132 const std::string& scontext = fields[0]; in populateDenialMap() local 137 denial_to_bug.try_emplace({scontext, tcontext, tclass}, bug_num); in populateDenialMap() 177 std::string scontext = denialParse(string, ':', "scontext=u:object_r:"); in auditParse() local 180 if (scontext.empty()) { in auditParse() 181 scontext = denialParse(string, ':', "scontext=u:r:"); in auditParse() 186 auto search = denial_to_bug.find({scontext, tcontext, tclass}); in auditParse()
|
/system/security/keystore2/selinux/src/ |
D | lib.rs | 725 let scontext = Context::new("u:r:shell:s0")?; localVariable 733 &scontext, 745 &scontext,
|