Home
last modified time | relevance | path

Searched refs:scontext (Results 1 – 6 of 6) sorted by relevance

/system/sepolicy/tests/
Dapex_sepolicy_tests.py74 scontext: set[str]
94 def AllowRead(tclass, scontext): argument
95 return AllowPerm(tclass, scontext, 'read')
115 case AllowPerm(tclass, scontext, perm):
117 for s in scontext:
118 te_rules = list(pol.QueryTERule(scontext={s},
Dsearchpolicy.py55 scontext = {args.source} variable
57 scontext = set() variable
71 TERules = pol.QueryTERule(scontext=scontext,
Dpolicy.py270 scontext = set()
272 scontext |= self.ResolveTypeAttribute(sctx)
273 if (len(scontext) == 0):
275 kwargs['scontext'] = scontext
526 class scontext: class
555 self.alldomains[result] = scontext()
Dsepolicy_tests.py249 baseRules = test_policy.pol.QueryExpandedTERule(scontext=["isolated_app"])
254 currentTypeRule = test_policy.pol.QueryExpandedTERule(scontext=[subType])
/system/logging/logd/
DLogAudit.cpp132 const std::string& scontext = fields[0]; in populateDenialMap() local
137 denial_to_bug.try_emplace({scontext, tcontext, tclass}, bug_num); in populateDenialMap()
177 std::string scontext = denialParse(string, ':', "scontext=u:object_r:"); in auditParse() local
180 if (scontext.empty()) { in auditParse()
181 scontext = denialParse(string, ':', "scontext=u:r:"); in auditParse()
186 auto search = denial_to_bug.find({scontext, tcontext, tclass}); in auditParse()
/system/security/keystore2/selinux/src/
Dlib.rs725 let scontext = Context::new("u:r:shell:s0")?; localVariable
733 &scontext,
745 &scontext,