Searched refs:audit2why (Results 1 – 12 of 12) sorted by relevance
/external/selinux/policycoreutils/audit2allow/ |
D | Makefile | 10 all: audit2why 12 audit2why: target 13 ln -sf audit2allow audit2why 21 (cd $(BINDIR); ln -sf audit2allow audit2why) 25 install -m 644 audit2why.1 $(MANDIR)/man1/
|
D | audit2allow | 33 import selinux.audit2why as audit2why namespace 249 if rc == audit2why.ALLOW: 254 if rc == audit2why.DONTAUDIT: 259 if rc == audit2why.BOOLEAN: 271 if rc == audit2why.TERULE: 276 if rc == audit2why.CONSTRAINT: 283 if rc == audit2why.RBAC: 288 audit2why.finish() 293 if self.__options.audit2why: 347 audit2why.init(self.__options.policy) [all …]
|
D | audit2why | 33 import selinux.audit2why as audit2why namespace 249 if rc == audit2why.ALLOW: 254 if rc == audit2why.DONTAUDIT: 259 if rc == audit2why.BOOLEAN: 271 if rc == audit2why.TERULE: 276 if rc == audit2why.CONSTRAINT: 282 if rc == audit2why.RBAC: 287 audit2why.finish() 292 if self.__options.audit2why: 346 audit2why.init(self.__options.policy) [all …]
|
/external/selinux/sepolgen/src/sepolgen/ |
D | audit.py | 137 import selinux.audit2why as audit2why namespace 181 self.type = audit2why.TERULE 254 … self.type, self.data = audit2why.analyze(scontext, tcontext, self.tclass, self.accesses); 255 if self.type == audit2why.NOPOLICY: 256 self.type = audit2why.TERULE 257 if self.type == audit2why.BADTCON: 259 if self.type == audit2why.BADSCON: 261 if self.type == audit2why.BADSCON: 263 if self.type == audit2why.BADPERM: 265 if self.type == audit2why.BADCOMPUTE: [all …]
|
D | policygen.py | 27 import selinux.audit2why as audit2why namespace 164 if av.type == audit2why.ALLOW: 166 if av.type == audit2why.DONTAUDIT: 169 if av.type == audit2why.BOOLEAN: 175 if av.type == audit2why.CONSTRAINT: 183 if ( av.type == audit2why.TERULE and
|
D | access.py | 37 from selinux import audit2why 91 self.type = audit2why.TERULE 260 …def add(self, src_type, tgt_type, obj_class, perms, audit_msg=None, avc_type=audit2why.TERULE, dat…
|
/external/selinux/libselinux/src/ |
D | Makefile | 40 AUDIT2WHYLOBJ=$(PYPREFIX)audit2why.lo 41 AUDIT2WHYSO=$(PYPREFIX)audit2why.so 51 SRCS= $(filter-out $(UNUSED_SRCS) $(GENERATED) audit2why.c, $(wildcard *.c)) 124 $(AUDIT2WHYLOBJ): audit2why.c 159 install -m 755 $(AUDIT2WHYSO) $(PYLIBDIR)/site-packages/selinux/audit2why.so
|
/external/selinux/ |
D | CleanSpec.mk | 5 $(call add-clean-step, rm -rf $(OUT_DIR)/host/linux-x86/bin/audit2why)
|
/external/selinux/prebuilts/bin/ |
D | audit2why | 7 exec python $ANDROID_BUILD_TOP/external/selinux/policycoreutils/audit2allow/audit2why "$@"
|
/external/selinux/libselinux/ |
D | ChangeLog | 52 * Fix audit2why error handling if SELinux is disabled, from Stephen Smalley. 109 * audit2why: make sure path is nul terminated 115 * audit2why: Fix segfault if finish() called twice 116 * audit2why: do not leak on multiple init() calls 118 * audit2why: Cleanup audit2why analysys function 174 * audit2why: silence -Wmissing-prototypes warning 237 * audit2why: close fd on enomem 255 * audit2why: work around python bug not defining 261 * fix python audit2why binding error 421 * Fix audit2why shadowed variables from Stephen Smalley. [all …]
|
/external/selinux/policycoreutils/ |
D | ChangeLog | 100 * Extend audit2why to report additional constraint information. 132 * Coalesce audit2why and audit2allow from Dan Walsh. 135 * Change audit2why to use selinux_current_policy_path from Dan Walsh. 267 * audit2allow: use audit2why internally 525 * Add exception to audit2why call in audit2allow from Dan Walsh. 584 * Merged audit2why fix and semanage boolean --on/--off/-1/-0 support from Dan Walsh. 598 * Merged replacement for audit2why from Dan Walsh. 677 * Merged move of audit2why to /usr/bin from Dan Walsh. 1167 Fixed audit2why to call policydb_init prior to policydb_read (still 1174 Updated audit2why for relocated policydb internal headers, [all …]
|
/external/selinux/libsepol/ |
D | ChangeLog | 781 audit2why. 788 * Added sepol_compute_av_reason() for audit2why.
|