Home
last modified time | relevance | path

Searched full:audit (Results 1 – 25 of 935) sorted by relevance

12345678910>>...38

/external/selinux/python/sepolgen/tests/test_data/
Daudit.log1 type=AVC msg=audit(1162850331.422:978): avc: denied { ioctl } for pid=6314 comm="pam_timestamp_c…
2 type=SYSCALL msg=audit(1162850331.422:978): arch=40000003 syscall=54 success=no exit=-22 a0=2 a1=54…
3 type=AVC_PATH msg=audit(1162850331.422:978): path="pipe:[96391]"
4 type=AVC msg=audit(1162850332.318:979): avc: denied { read } for pid=6306 comm="beagled" name=".…
5 type=SYSCALL msg=audit(1162850332.318:979): arch=40000003 syscall=33 success=yes exit=0 a0=bfdb2fde…
6 type=AVC msg=audit(1162850333.186:980): avc: denied { read } for pid=6306 comm="beagled" name="m…
7 type=SYSCALL msg=audit(1162850333.186:980): arch=40000003 syscall=5 success=yes exit=24 a0=11833c a…
8 type=AVC msg=audit(1162850335.022:981): avc: denied { read write } for pid=6336 comm="clock-appl…
9 type=SYSCALL msg=audit(1162850335.022:981): arch=40000003 syscall=5 success=yes exit=13 a0=9c0e840 …
10 type=AVC msg=audit(1162850335.022:982): avc: denied { lock } for pid=6336 comm="clock-applet" na…
[all …]
Dhttpd.log1 type=USER_AVC msg=audit(1163772866.369:8084): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st…
2 type=USER_AVC msg=audit(1163772866.437:8085): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st…
3 type=USER_AVC msg=audit(1163772866.449:8086): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st…
4 type=USER_AVC msg=audit(1163772866.449:8087): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st…
5 type=USER_AVC msg=audit(1163772866.449:8088): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st…
6 type=USER_AVC msg=audit(1163772866.453:8089): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st…
7 type=USER_AVC msg=audit(1163772866.453:8090): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st…
8 type=USER_AVC msg=audit(1163772866.453:8091): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st…
9 type=USER_AVC msg=audit(1163772866.453:8092): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st…
10 type=USER_AVC msg=audit(1163772866.453:8093): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st…
[all …]
Dshort.log1 type=AVC msg=audit(1162850331.422:978): avc: denied { ioctl } for pid=6314 comm="pam_timestamp_c…
2 type=SYSCALL msg=audit(1162850331.422:978): arch=40000003 syscall=54 success=no exit=-22 a0=2 a1=54…
3 type=AVC_PATH msg=audit(1162850331.422:978): path="pipe:[96391]"
4 type=AVC msg=audit(1162850332.318:979): avc: denied { read } for pid=6306 comm="beagled" name=".…
5 type=SYSCALL msg=audit(1162850332.318:979): arch=40000003 syscall=33 success=yes exit=0 a0=bfdb2fde…
6 type=AVC msg=audit(1162850333.186:980): avc: denied { read } for pid=6306 comm="beagled" name="m…
7 type=SYSCALL msg=audit(1162850333.186:980): arch=40000003 syscall=5 success=yes exit=24 a0=11833c a…
8 type=AVC msg=audit(1162850335.022:981): avc: denied { read write } for pid=6336 comm="clock-appl…
9 type=SYSCALL msg=audit(1162850335.022:981): arch=40000003 syscall=5 success=yes exit=13 a0=9c0e840 …
10 type=AVC msg=audit(1162850335.022:982): avc: denied { lock } for pid=6336 comm="clock-applet" na…
[all …]
/external/selinux/python/sepolgen/tests/
Daudit.txt1 type=AVC msg=audit(1158584779.745:708): avc: denied { dac_read_search } for pid=8132 comm="sh" c…
2 type=SYSCALL msg=audit(1158584779.745:708): arch=40000003 syscall=195 success=no exit=-13 a0=80d243…
3 type=AVC msg=audit(1158584779.753:709): avc: denied { dac_override } for pid=8133 comm="vpnc-scr…
4 type=AVC msg=audit(1158584779.753:709): avc: denied { dac_read_search } for pid=8133 comm="vpnc-…
5 type=SYSCALL msg=audit(1158584779.753:709): arch=40000003 syscall=195 success=no exit=-13 a0=80d243…
6 type=AVC msg=audit(1158584779.825:710): avc: denied { dac_override } for pid=8134 comm="vpnc-scr…
7 type=AVC msg=audit(1158584779.825:710): avc: denied { dac_read_search } for pid=8134 comm="vpnc-…
8 type=SYSCALL msg=audit(1158584779.825:710): arch=40000003 syscall=195 success=no exit=-13 a0=80d243…
9 type=AVC msg=audit(1158584780.793:711): avc: denied { dac_override } for pid=8144 comm="sh" capa…
10 type=AVC msg=audit(1158584780.793:711): avc: denied { dac_read_search } for pid=8144 comm="sh" c…
[all …]
Dtest_audit.py21 import sepolgen.audit
25 audit1 = """Sep 12 08:26:43 dhcp83-5 kernel: audit(1158064002.046:4): avc: denied { read } for p…
27 # audit daemon messages
28 audit2 = """type=AVC msg=audit(1158584779.745:708): avc: denied { dac_read_search } for pid=8132…
30 log1 = """type=AVC msg=audit(1158584779.745:708): avc: denied { dac_read_search } for pid=8132 c…
31 type=SYSCALL msg=audit(1158584779.745:708): arch=40000003 syscall=195 success=no exit=-13 a0=80d243…
32 type=AVC msg=audit(1158584779.753:709): avc: denied { dac_override } for pid=8133 comm="vpnc-scr…
33 type=AVC msg=audit(1158584779.753:709): avc: denied { dac_read_search } for pid=8133 comm="vpnc-…
34 type=SYSCALL msg=audit(1158584779.753:709): arch=40000003 syscall=195 success=no exit=-13 a0=80d243…
35 type=AVC msg=audit(1158584779.825:710): avc: denied { dac_override } for pid=8134 comm="vpnc-scr…
[all …]
/external/selinux/python/audit2allow/
Dtest.log1 node=bill.example.com type=AVC_PATH msg=audit(1166045975.667:1128): path="/usr/lib/libGL.so.1.2"
2 type=AVC msg=audit(1166045975.667:1129): avc: denied { write } for comm=local dev=dm-0 name=root.lo…
3audit(1166111074.191:74): item=0 name="/etc/auto.net" inode=16483485 dev=fd:00 mode=0100755 ouid=0…
4 node=bob.example.com type=SYSCALL msg=audit(1166111074.191:74): arch=40000003 syscall=33 success=no…
5 node=bob.example.com type=AVC msg=audit(1166111074.191:74): avc: denied { execute } for pid=1394…
6 node=james.example.com type=SYSCALL msg=audit(1165963069.244:851): arch=40000003 syscall=102 succes…
7 node=james.example.com type=AVC msg=audit(1165963069.244:851): avc: denied { name_bind } for pid…
8 node=tom.example.com type=SYSCALL msg=audit(1165963069.244:852): arch=40000003 syscall=102 success=…
9 node=tom.example.com type=AVC msg=audit(1165963069.244:852): avc: denied { name_connect } for pi…
10 node=mary.example.com type=SYSCALL msg=audit(1166023021.373:910): arch=40000003 syscall=12 success=…
[all …]
Daudit2allow.132 \- translates SELinux audit messages into a description of why the access was denied (audit2allow \…
40 Read input from audit and message log, conflicts with \-i
43 Read input from audit messages since last boot conflicts with \-i
48 Note that all audit messages are not available via dmesg when
92 Translates SELinux audit messages into a description of why the access was denied
122 .B NOTE: These examples are for systems using the audit package. If you do
123 .B not use the audit package, the AVC messages will be in /var/log/messages.
124 .B Please substitute /var/log/messages for /var/log/audit/audit.log in the
129 $ cat /var/log/audit/audit.log | audit2allow \-m local > local.te
147 $ cat /var/log/audit/audit.log | audit2allow \-R \-m local > local.te
[all …]
Daudit2why25 import sepolgen.audit as audit namespace
55 help="audit messages since last boot conflicts with -i")
56 parser.add_option("-a", "--all", action="store_true", dest="audit", default=False,
57 help="read input from audit log - conflicts with -i")
94 … help="Translates SELinux audit messages into a description of why the access was denied")
99 if options.audit is True or options.boot:
131 parser = audit.AuditParser(last_load_only=self.__options.lastreload)
141 messages = audit.get_dmesg_msgs()
142 elif self.__options.audit:
144 messages = audit.get_audit_msgs()
[all …]
Daudit2allow25 import sepolgen.audit as audit namespace
55 help="audit messages since last boot conflicts with -i")
56 parser.add_option("-a", "--all", action="store_true", dest="audit", default=False,
57 help="read input from audit log - conflicts with -i")
94 … help="Translates SELinux audit messages into a description of why the access was denied")
99 if options.audit is True or options.boot:
131 parser = audit.AuditParser(last_load_only=self.__options.lastreload)
141 messages = audit.get_dmesg_msgs()
142 elif self.__options.audit:
144 messages = audit.get_audit_msgs()
[all …]
/external/ms-tpm-20-ref/TPMCmd/tpm/src/subsystem/
DCommandAudit.c36 // This file contains the functions that support command audit.
44 // This function initializes the command audit list. This function simulates
56 // Clear all the audit commands in CommandAuditPreInstall_Init()
62 // Set initial command audit hash algorithm to be context integrity hash in CommandAuditPreInstall_Init()
66 // Set up audit counter to be 0 in CommandAuditPreInstall_Init()
69 // Write command audit persistent data to NV in CommandAuditPreInstall_Init()
78 // This function clears the command audit digest on a TPM Reset.
93 // This function will SET the audit flag for a command. This function
94 // will not SET the audit flag for a command that is not implemented. This
95 // ensures that the audit status is not SET when TPM2_GetCapability() is
[all …]
/external/selinux/python/sepolgen/src/sepolgen/
Daudit.py29 """Obtain all of the avc and policy load messages from the audit
34 string contain all of the audit messages returned by ausearch.
51 """Obtain all of the avc and policy load messages from the audit
56 string contain all of the audit messages returned by ausearch.
69 string contain all of the audit messages returned by dmesg.
78 # Classes representing audit messages
81 """Base class for all objects representing audit messages.
83 AuditMessage is a base class for all audit messages and only
93 an audit message.
101 if msg[:6] == "audit(":
[all …]
/external/python/google-api-python-client/docs/dyn/
Dpagespeedonline_v5.pagespeedapi.html125 …sult": { # The Lighthouse result object. # Lighthouse response for the audit url as an object.
127 "a_key": { # An audit's result object in a Lighthouse result.
128 "description": "A String", # The description of the audit.
129 "details": { # Freeform details section of the audit.
132 …ayValue": "A String", # The value that should be displayed on the UI for this audit.
133 …;errorMessage": "A String", # An error message from a thrown error inside the audit.
134 "explanation": "A String", # An explanation of the errors in the audit.
135 "id": "A String", # The audit's id.
137 …ific to the audit, e.g. the number of nodes in the DOM or the timestamp of a specific load event. …
138 "score": "", # The score of the audit, can be null.
[all …]
Dcloudsearch_v1.settings.html116 …"auditLoggingSettings": { # Represents the settings for Cloud audit logging # Audit Logg…
117 …"logAdminReadActions": True or False, # Indicates whether audit logging is on/off for ad…
118 …"logDataReadActions": True or False, # Indicates whether audit logging is on/off for dat…
119 …"logDataWriteActions": True or False, # Indicates whether audit logging is on/off for da…
120 …;A String", # The resource name of the GCP Project to store audit logs. Cloud audit logging w…
137 …"auditLoggingSettings": { # Represents the settings for Cloud audit logging # Audit Logg…
138 …"logAdminReadActions": True or False, # Indicates whether audit logging is on/off for ad…
139 …"logDataReadActions": True or False, # Indicates whether audit logging is on/off for dat…
140 …"logDataWriteActions": True or False, # Indicates whether audit logging is on/off for da…
141 …;A String", # The resource name of the GCP Project to store audit logs. Cloud audit logging w…
/external/ms-tpm-20-ref/TPMCmd/tpm/include/prototypes/
DCommandAudit_fp.h44 // This function initializes the command audit list. This function simulates
57 // This function clears the command audit digest on a TPM Reset.
64 // This function will SET the audit flag for a command. This function
65 // will not SET the audit flag for a command that is not implemented. This
66 // ensures that the audit status is not SET when TPM2_GetCapability() is
74 // TRUE(1) command code audit status was changed
75 // FALSE(0) command code audit status was not changed
82 // This function will CLEAR the audit flag for a command. It will not CLEAR the
83 // audit flag for TPM_CC_SetCommandCodeAuditStatus().
90 // TRUE(1) command code audit status was changed
[all …]
/external/minijail/tools/
DREADME.md23 ### Using linux audit logs to generate policy
33 syscalls via the [audit subsystem][1] (Redhat has a nice overview [here][2])
36 The audit subsystem itself has a mechanism to log all syscalls. Though a
42 available in distro packages named `python3-audit` or `python-audit`.
44 #### Per-boot setup of audit rules on DUT
46 Set up `audit` rules and an empty seccomp policy for later use. This can be
51 As mentioned above, these extra audit rules enable `SYSCALL` auditing which
73 #### Generate policy using the audit.log
76 ./tools/generate_seccomp_policy.py --audit-comm $PROGRAM_NAME audit.log \
80 Note that the tool can also consume multiple audit logs and/or strace traces to
[all …]
Dgenerate_seccomp_policy.py21 """Tool to generate a minijail seccomp filter from strace or audit output."""
84 audit_logs: Mutually exclusive list of audit log filenames.
125 help='strace and/or audit logs', nargs='+')
126 parser.add_argument('--audit-comm', type=str, metavar='PROCESS_NAME',
127 help='relevant process name from the audit.log files')
131 parser.error('Python bindings for the audit subsystem were not found.\n'
132 'Please install the python3-audit (sometimes python-audit)'
133 ' package for your distro to process audit logs: '
137 parser.error(f'--audit-comm is required when using audit logs as input:'
141 parser.error('--audit-comm was specified yet none of the input files '
[all …]
/external/selinux/python/audit2allow/ru/
Daudit2allow.1109 .B Замените в примерах /var/log/messages на /var/log/audit/audit.log
113 $ cat /var/log/audit/audit.log | audit2allow \-m local > local.te
131 $ cat /var/log/audit/audit.log | audit2allow \-R \-m local > local.te
174 $ cat /var/log/audit/audit.log | audit2allow \-M local
189 $ cat /var/log/audit/audit.log | audit2allow >> domains/misc/local.te
/external/python/google-api-python-client/samples/audit/
Daudit.py18 """Simple command-line sample for Audit API.
20 Command-line application that retrieves events through the Audit API.
25 $ python audit.py
30 $ python audit.py --help
34 $ python audit.py --logging_level=DEBUG
51 argv, 'audit', 'v1', __doc__, __file__,
52 scope='https://www.googleapis.com/auth/apps/reporting/audit.readonly')
61 actorEmail='admin@enterprise-audit-clientlib.com').execute()
72 maxResults='2', actorEmail='admin@enterprise-audit-clientlib.com',
/external/iptables/extensions/
Dlibxt_AUDIT.txlate1 iptables-translate -t filter -A INPUT -j AUDIT --type accept
2 nft add rule ip filter INPUT counter log level audit
4 iptables-translate -t filter -A INPUT -j AUDIT --type drop
5 nft add rule ip filter INPUT counter log level audit
7 iptables-translate -t filter -A INPUT -j AUDIT --type reject
8 nft add rule ip filter INPUT counter log level audit
Dlibxt_AUDIT.t2 -j AUDIT --type accept;=;OK
3 -j AUDIT --type drop;=;OK
4 -j AUDIT --type reject;=;OK
5 -j AUDIT;;FAIL
6 -j AUDIT --type wrong;;FAIL
/external/autotest/site_utils/admin_audit/
Dmain.py7 """Tool to audit a DUT in the lab."""
43 _LOG_FILE = 'audit.log'
70 """Generic error raised during DUT audit."""
74 """Tool to audit a DUT."""
83 logging.debug('audit environment: %r', os.environ)
84 logging.debug('audit command was: %s', ' '.join(sys.argv))
85 logging.debug('audit parsed options: %s', opts)
174 parser = argparse.ArgumentParser(description='Audit DUT in a lab.')
180 help='DUT audit actions to execute.',
197 help='Hostname of the DUT to audit.',
/external/bcc/tools/
Dcapable.py26 ./capable -v # verbose: include non-audit checks
40 help="include non-audit checks")
125 int audit;
165 int audit;
169 audit = (cap_opt & 0b10) == 0;
172 audit = cap_opt;
192 data.audit = audit;
232 bpf_text = bpf_text.replace('FILTER2', 'if (audit == 0) { return 0; }')
255 "TIME", "UID", "PID", "TID", "COMM", "CAP", "NAME", "AUDIT", "INSETID"))
258 "TIME", "UID", "PID", "COMM", "CAP", "NAME", "AUDIT"))
[all …]
/external/selinux/python/sepolicy/sepolicy/templates/
Dnetwork.py144 ## Do not audit attempts to send UDP traffic on the TEMPLATETYPE port.
148 ## Domain to not audit.
182 ## Do not audit attempts to receive UDP traffic on the TEMPLATETYPE port.
186 ## Domain to not audit.
217 ## Do not audit attempts to send and receive
222 ## Domain to not audit.
274 ## Do not audit attempts to sbind to TEMPLATETYPE port.
278 ## Domain to not audit.
311 ## Do not audit attempts to make a TCP connection to TEMPLATETYPE port.
349 ## Do not audit attempts to send TEMPLATETYPE_client packets.
[all …]
/external/ms-tpm-20-ref/TPMCmd/tpm/src/main/
DSessionProcess.c618 // an audit session. in ComputeCpHash()
1182 || IS_ATTRIBUTE(sessionAttributes, TPMA_SESSION, audit) in RetrieveSessionData()
1210 // If the session is used for parameter encryption or audit as well, set in RetrieveSessionData()
1245 // At last process audit. in RetrieveSessionData()
1246 if(IS_ATTRIBUTE(sessionAttributes, TPMA_SESSION, audit)) in RetrieveSessionData()
1248 // Audit attribute can only appear in one session. in RetrieveSessionData()
1251 // An audit session can not be policy session. in RetrieveSessionData()
1255 // If this is a reset of the audit session, or the first use in RetrieveSessionData()
1256 // of the session as an audit session, it doesn't matter what in RetrieveSessionData()
1494 // This function is called before the command is processed if audit is enabled
[all …]
/external/python/google-api-python-client/googleapiclient/discovery_cache/documents/
Dpagespeedonline.v5.json200 …"description": "A light reference to an audit by id, used to group and weight audits in a given ca…
204 "description": "The conventional acronym for the audit/metric.",
208 "description": "The category group that the audit belongs to (optional).",
212 "description": "The audit ref id.",
216 "description": "Any audit IDs closely relevant to this one.",
223 "description": "The weight this audit's score has on the overall category score.",
353 "description": "An audit's result object in a Lighthouse result.",
357 "description": "The description of the audit.",
365 "description": "Freeform details section of the audit.",
369 "description": "The value that should be displayed on the UI for this audit.",
[all …]

12345678910>>...38