Searched refs:semodule (Results 1 – 7 of 7) sorted by relevance
9 SEMODULE_OBJS = semodule.o11 all: semodule genhomedircon13 semodule: $(SEMODULE_OBJS) target16 ln -sf semodule genhomedircon20 install -m 755 semodule $(DESTDIR)$(SBINDIR)21 (cd $(DESTDIR)$(SBINDIR); ln -sf semodule genhomedircon)23 install -m 644 semodule.8 $(DESTDIR)$(MANDIR)/man8/35 -rm -f semodule *.o genhomedircon
6 semodule/semodule
1 SUBDIRS = setfiles load_policy newrole run_init secon sestatus semodule setsebool scripts po man hll
45 ../semodule/semodule.c \87 ../sepolicy/sepolicy/templates/semodule.py \
2 OPT_SUBDIRS ?= dbus gui mcstrans python restorecond sandbox semodule-utils
6973 …37.513:12841): avc: denied { execute } for pid=13625 comm="sh" name="semodule" dev=dm-0 ino=103…6975 …76437.513:12842): avc: denied { read } for pid=13625 comm="sh" name="semodule" dev=dm-0 ino=103…6977 …843): avc: denied { execute_no_trans } for pid=13626 comm="sh" name="semodule" dev=dm-0 ino=103…6978 … euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="semodule" exe="/usr/sbin/semodule" sub…6979 type=AVC_PATH msg=audit(1163776437.513:12843): path="/usr/sbin/semodule"6980 type=AVC msg=audit(1163776437.553:12844): avc: denied { execute } for pid=13626 comm="semodule" …6981 … euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="semodule" exe="/usr/sbin/semodule" sub…6982 …37.605:12845): avc: denied { read write search } for pid=13626 comm="semodule" name="active" de…6983 … euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="semodule" exe="/usr/sbin/semodule" sub…6984 …37.625:12846): avc: denied { read write search } for pid=13626 comm="semodule" name="modules" d…[all …]
1117 …for semodule, button in [("unconfined", self.disable_unconfined_button), ("permissivedomains", sel…1118 if semodule in self.cust_dict["module"]:1119 button.set_active(self.cust_dict["module"][semodule]["enabled"])