Searched refs:tclass (Results 1 – 8 of 8) sorted by relevance
/system/sepolicy/tests/ |
D | searchpolicy.py | 49 if not (args.source or args.target or args.tclass or args.perms): 62 if args.tclass: 63 tclass = set(args.tclass.split(",")) variable 65 tclass = set() variable 73 tclass=tclass, 80 rules.append("allow " + r.sctx + " " + r.tctx + ":" + r.tclass + " { " + 83 rules.append("allow " + r.sctx + " " + r.tctx + ":" + r.tclass + " " +
|
D | apex_sepolicy_tests.py | 73 tclass: str 94 def AllowRead(tclass, scontext): argument 95 return AllowPerm(tclass, scontext, 'read') 115 case AllowPerm(tclass, scontext, perm): 120 tclass={tclass},
|
D | sepolicy_tests.py | 226 def checkIsolatedComputeAllowed(tctx, tclass): argument 230 … return tctx in allowedMemberTypes and tclass in permissionAllowList["isolated_compute_allowed"] 235 tctx, tclass, p = perm.split(":") 238 if not checkIsolatedComputeAllowed(tctx, tclass) and \ 240 or tclass not in permissionAllowList[tctx] \ 250 basePermissionSet = set([":".join([rule.tctx, rule.tclass, perm]) 255 typePermissionSet = set([":".join([rule.tctx, rule.tclass, perm])
|
D | policy.py | 94 self.tclass = data[3] 226 not bool(set([Rule.tclass]) & kwargs['tclass'])): 610 for x in self.pol.QueryExpandedTERule(tclass=set(["file"]), perms=set(["entrypoint"])):
|
/system/security/keystore2/src/fuzzers/ |
D | keystore2_unsafe_fuzzer.rs | 117 tclass: &'a str, 222 FuzzCommand::CheckAccess { source, target, tclass, perm } => { 228 tclass,
|
/system/logging/logd/ |
D | LogAudit.cpp | 134 const std::string& tclass = fields[2]; in populateDenialMap() local 137 denial_to_bug.try_emplace({scontext, tcontext, tclass}, bug_num); in populateDenialMap() 179 std::string tclass = denialParse(string, ' ', "tclass="); in auditParse() local 186 auto search = denial_to_bug.find({scontext, tcontext, tclass}); in auditParse()
|
/system/security/keystore2/selinux/src/ |
D | lib.rs | 287 pub fn check_access(source: &CStr, target: &CStr, tclass: &str, perm: &str) -> Result<()> { in check_access() 290 let c_tclass = CString::new(tclass).with_context(|| { in check_access() 291 format!("check_access: Failed to convert tclass \"{}\" to CString.", tclass) in check_access() 321 source, target, tclass, perm in check_access()
|
/system/sepolicy/tools/sepolicy-analyze/ |
D | neverallow.c | 257 node->tclass = cls->s.value; in read_classperms() 335 cls = policydb->class_val_to_struct[node->tclass-1]; in read_classperms() 341 …efined in class %s in policy being checked.\n", id, policydb->p_class_val_to_name[node->tclass-1]); in read_classperms()
|