Searched refs:semodule (Results 1 – 7 of 7) sorted by relevance
10 SEMODULE_OBJS = semodule.o12 all: semodule genhomedircon14 semodule: $(SEMODULE_OBJS) target18 ln -sf semodule genhomedircon22 install -m 755 semodule $(SBINDIR)23 (cd $(SBINDIR); ln -sf semodule genhomedircon)25 install -m 644 semodule.8 $(MANDIR)/man8/31 -rm -f semodule *.o genhomedircon
6 semodule/semodule
1 SUBDIRS = setfiles load_policy newrole run_init secon sestatus semodule setsebool scripts po man hll
44 ../semodule/semodule.c \86 ../sepolicy/sepolicy/templates/semodule.py \
1 OPT_SUBDIRS ?= dbus gui mcstrans python restorecond sandbox semodule-utils
6973 …37.513:12841): avc: denied { execute } for pid=13625 comm="sh" name="semodule" dev=dm-0 ino=103…6975 …76437.513:12842): avc: denied { read } for pid=13625 comm="sh" name="semodule" dev=dm-0 ino=103…6977 …843): avc: denied { execute_no_trans } for pid=13626 comm="sh" name="semodule" dev=dm-0 ino=103…6978 … euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="semodule" exe="/usr/sbin/semodule" sub…6979 type=AVC_PATH msg=audit(1163776437.513:12843): path="/usr/sbin/semodule"6980 type=AVC msg=audit(1163776437.553:12844): avc: denied { execute } for pid=13626 comm="semodule" …6981 … euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="semodule" exe="/usr/sbin/semodule" sub…6982 …37.605:12845): avc: denied { read write search } for pid=13626 comm="semodule" name="active" de…6983 … euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="semodule" exe="/usr/sbin/semodule" sub…6984 …37.625:12846): avc: denied { read write search } for pid=13626 comm="semodule" name="modules" d…[all …]
1118 …for semodule, button in [("unconfined", self.disable_unconfined_button), ("permissivedomains", sel…1119 if semodule in self.cust_dict["module"]:1120 button.set_active(self.cust_dict["module"][semodule]["enabled"])