Home
last modified time | relevance | path

Searched refs:sctx (Results 1 – 3 of 3) sorted by relevance

/frameworks/native/cmds/servicemanager/
DAccess.cpp125 bool Access::actionAllowed(const CallingContext& sctx, const char* tctx, const char* perm, in actionAllowed() argument
130 .context = &sctx, in actionAllowed()
134 return 0 == selinux_check_access(sctx.sid.c_str(), tctx, tclass, perm, in actionAllowed()
138 bool Access::actionAllowedFromLookup(const CallingContext& sctx, const std::string& name, const cha… in actionAllowedFromLookup() argument
145 bool allowed = actionAllowed(sctx, tctx, perm, name); in actionAllowedFromLookup()
DAccess.h48 bool actionAllowed(const CallingContext& sctx, const char* tctx, const char* perm,
50 bool actionAllowedFromLookup(const CallingContext& sctx, const std::string& name,
/frameworks/av/drm/drmserver/
DDrmManagerService.cpp66 char *sctx = NULL; in selinuxIsProtectedCallAllowed() local
73 if (getpidcon(spid, &sctx) != 0) { in selinuxIsProtectedCallAllowed()
79 bool allowed = (selinux_check_access(ssid ? ssid : sctx, drmserver_context, in selinuxIsProtectedCallAllowed()
81 freecon(sctx); in selinuxIsProtectedCallAllowed()