Home
last modified time | relevance | path

Searched refs:tclass (Results 1 – 8 of 8) sorted by relevance

/system/sepolicy/tests/
Dsearchpolicy.py49 if not (args.source or args.target or args.tclass or args.perms):
62 if args.tclass:
63 tclass = set(args.tclass.split(",")) variable
65 tclass = set() variable
73 tclass=tclass,
80 rules.append("allow " + r.sctx + " " + r.tctx + ":" + r.tclass + " { " +
83 rules.append("allow " + r.sctx + " " + r.tctx + ":" + r.tclass + " " +
Dapex_sepolicy_tests.py73 tclass: str
94 def AllowRead(tclass, scontext): argument
95 return AllowPerm(tclass, scontext, 'read')
115 case AllowPerm(tclass, scontext, perm):
120 tclass={tclass},
Dsepolicy_tests.py226 def checkIsolatedComputeAllowed(tctx, tclass): argument
230 … return tctx in allowedMemberTypes and tclass in permissionAllowList["isolated_compute_allowed"]
235 tctx, tclass, p = perm.split(":")
238 if not checkIsolatedComputeAllowed(tctx, tclass) and \
240 or tclass not in permissionAllowList[tctx] \
250 basePermissionSet = set([":".join([rule.tctx, rule.tclass, perm])
255 typePermissionSet = set([":".join([rule.tctx, rule.tclass, perm])
Dpolicy.py94 self.tclass = data[3]
226 not bool(set([Rule.tclass]) & kwargs['tclass'])):
610 for x in self.pol.QueryExpandedTERule(tclass=set(["file"]), perms=set(["entrypoint"])):
/system/security/keystore2/src/fuzzers/
Dkeystore2_unsafe_fuzzer.rs117 tclass: &'a str,
222 FuzzCommand::CheckAccess { source, target, tclass, perm } => {
228 tclass,
/system/logging/logd/
DLogAudit.cpp134 const std::string& tclass = fields[2]; in populateDenialMap() local
137 denial_to_bug.try_emplace({scontext, tcontext, tclass}, bug_num); in populateDenialMap()
179 std::string tclass = denialParse(string, ' ', "tclass="); in auditParse() local
186 auto search = denial_to_bug.find({scontext, tcontext, tclass}); in auditParse()
/system/security/keystore2/selinux/src/
Dlib.rs287 pub fn check_access(source: &CStr, target: &CStr, tclass: &str, perm: &str) -> Result<()> { in check_access()
290 let c_tclass = CString::new(tclass).with_context(|| { in check_access()
291 format!("check_access: Failed to convert tclass \"{}\" to CString.", tclass) in check_access()
321 source, target, tclass, perm in check_access()
/system/sepolicy/tools/sepolicy-analyze/
Dneverallow.c257 node->tclass = cls->s.value; in read_classperms()
335 cls = policydb->class_val_to_struct[node->tclass-1]; in read_classperms()
341 …efined in class %s in policy being checked.\n", id, policydb->p_class_val_to_name[node->tclass-1]); in read_classperms()