Home
last modified time | relevance | path

Searched refs:audit2why (Results 1 – 12 of 12) sorted by relevance

/external/selinux/policycoreutils/audit2allow/
DMakefile10 all: audit2why
12 audit2why: target
13 ln -sf audit2allow audit2why
21 (cd $(BINDIR); ln -sf audit2allow audit2why)
25 install -m 644 audit2why.1 $(MANDIR)/man1/
Daudit2allow33 import selinux.audit2why as audit2why namespace
249 if rc == audit2why.ALLOW:
254 if rc == audit2why.DONTAUDIT:
259 if rc == audit2why.BOOLEAN:
271 if rc == audit2why.TERULE:
276 if rc == audit2why.CONSTRAINT:
283 if rc == audit2why.RBAC:
288 audit2why.finish()
293 if self.__options.audit2why:
347 audit2why.init(self.__options.policy)
[all …]
Daudit2why33 import selinux.audit2why as audit2why namespace
249 if rc == audit2why.ALLOW:
254 if rc == audit2why.DONTAUDIT:
259 if rc == audit2why.BOOLEAN:
271 if rc == audit2why.TERULE:
276 if rc == audit2why.CONSTRAINT:
282 if rc == audit2why.RBAC:
287 audit2why.finish()
292 if self.__options.audit2why:
346 audit2why.init(self.__options.policy)
[all …]
/external/selinux/sepolgen/src/sepolgen/
Daudit.py137 import selinux.audit2why as audit2why namespace
181 self.type = audit2why.TERULE
254 … self.type, self.data = audit2why.analyze(scontext, tcontext, self.tclass, self.accesses);
255 if self.type == audit2why.NOPOLICY:
256 self.type = audit2why.TERULE
257 if self.type == audit2why.BADTCON:
259 if self.type == audit2why.BADSCON:
261 if self.type == audit2why.BADSCON:
263 if self.type == audit2why.BADPERM:
265 if self.type == audit2why.BADCOMPUTE:
[all …]
Dpolicygen.py27 import selinux.audit2why as audit2why namespace
164 if av.type == audit2why.ALLOW:
166 if av.type == audit2why.DONTAUDIT:
169 if av.type == audit2why.BOOLEAN:
175 if av.type == audit2why.CONSTRAINT:
183 if ( av.type == audit2why.TERULE and
Daccess.py37 from selinux import audit2why
91 self.type = audit2why.TERULE
260 …def add(self, src_type, tgt_type, obj_class, perms, audit_msg=None, avc_type=audit2why.TERULE, dat…
/external/selinux/libselinux/src/
DMakefile40 AUDIT2WHYLOBJ=$(PYPREFIX)audit2why.lo
41 AUDIT2WHYSO=$(PYPREFIX)audit2why.so
51 SRCS= $(filter-out $(UNUSED_SRCS) $(GENERATED) audit2why.c, $(wildcard *.c))
124 $(AUDIT2WHYLOBJ): audit2why.c
159 install -m 755 $(AUDIT2WHYSO) $(PYLIBDIR)/site-packages/selinux/audit2why.so
/external/selinux/
DCleanSpec.mk5 $(call add-clean-step, rm -rf $(OUT_DIR)/host/linux-x86/bin/audit2why)
/external/selinux/prebuilts/bin/
Daudit2why7 exec python $ANDROID_BUILD_TOP/external/selinux/policycoreutils/audit2allow/audit2why "$@"
/external/selinux/libselinux/
DChangeLog52 * Fix audit2why error handling if SELinux is disabled, from Stephen Smalley.
109 * audit2why: make sure path is nul terminated
115 * audit2why: Fix segfault if finish() called twice
116 * audit2why: do not leak on multiple init() calls
118 * audit2why: Cleanup audit2why analysys function
174 * audit2why: silence -Wmissing-prototypes warning
237 * audit2why: close fd on enomem
255 * audit2why: work around python bug not defining
261 * fix python audit2why binding error
421 * Fix audit2why shadowed variables from Stephen Smalley.
[all …]
/external/selinux/policycoreutils/
DChangeLog100 * Extend audit2why to report additional constraint information.
132 * Coalesce audit2why and audit2allow from Dan Walsh.
135 * Change audit2why to use selinux_current_policy_path from Dan Walsh.
267 * audit2allow: use audit2why internally
525 * Add exception to audit2why call in audit2allow from Dan Walsh.
584 * Merged audit2why fix and semanage boolean --on/--off/-1/-0 support from Dan Walsh.
598 * Merged replacement for audit2why from Dan Walsh.
677 * Merged move of audit2why to /usr/bin from Dan Walsh.
1167 Fixed audit2why to call policydb_init prior to policydb_read (still
1174 Updated audit2why for relocated policydb internal headers,
[all …]
/external/selinux/libsepol/
DChangeLog781 audit2why.
788 * Added sepol_compute_av_reason() for audit2why.