Searched refs:tclass (Results 1 – 7 of 7) sorted by relevance
/system/sepolicy/tests/ |
D | searchpolicy.py | 35 if not (args.source or args.target or args.tclass or args.perms): 48 if args.tclass: 49 tclass = set(args.tclass.split(",")) variable 51 tclass = set() variable 59 tclass=tclass, 66 rules.append("allow " + r.sctx + " " + r.tctx + ":" + r.tclass + " { " + 69 rules.append("allow " + r.sctx + " " + r.tctx + ":" + r.tclass + " " +
|
D | policy.py | 41 self.tclass = data[3] 149 not bool(set([Rule.tclass]) & kwargs['tclass'])):
|
D | treble_sepolicy_tests.py | 137 for x in pol.QueryExpandedTERule(tclass=set(["file"]), perms=set(["entrypoint"])):
|
/system/core/logd/ |
D | LogAudit.cpp | 122 std::string tclass; in populateDenialMap() local 126 split_line >> scontext >> tcontext >> tclass >> bug_num; in populateDenialMap() 127 denial_to_bug.emplace(scontext + tcontext + tclass, bug_num); in populateDenialMap() 154 std::string tclass = denialParse(string, ' ', "tclass="); in auditParse() local 161 auto search = denial_to_bug.find(scontext + tcontext + tclass); in auditParse()
|
/system/sepolicy/tools/sepolicy-analyze/ |
D | neverallow.c | 257 node->tclass = cls->s.value; in read_classperms() 335 cls = policydb->class_val_to_struct[node->tclass-1]; in read_classperms() 341 …efined in class %s in policy being checked.\n", id, policydb->p_class_val_to_name[node->tclass-1]); in read_classperms()
|
/system/sepolicy/prebuilts/api/28.0/private/ |
D | traced_probes.te | 57 # scontext=u:r:atrace:s0 tcontext=u:r:traced_probes:s0 tclass=fd
|
/system/netd/resolv/ |
D | res_send.cpp | 327 int tclass = ntohs(*reinterpret_cast<const uint16_t*>(cp)); in res_nameinquery() local 329 if (ttype == type && tclass == cl && ns_samename(tname, name) == 1) return (1); in res_nameinquery() 369 int tclass = ntohs(*reinterpret_cast<const uint16_t*>(cp)); in res_queriesmatch() local 371 if (!res_nameinquery(tname, ttype, tclass, buf2, eom2)) return (0); in res_queriesmatch()
|