HomeSort by relevance Sort by last modified time
    Searched defs:audit (Results 1 - 6 of 6) sorted by null

  /external/selinux/sepolgen/tests/
test_audit.py 21 import sepolgen.audit namespace
25 audit1 = """Sep 12 08:26:43 dhcp83-5 kernel: audit(1158064002.046:4): avc: denied { read } for pid=2 496 comm="bluez-pin" name=".gdm1K3IFT" dev=dm-0 ino=3601333 scontext=user_u:system_r:bluetooth_helper_t:s0-s0:c0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file"""
27 # audit daemon messages
28 audit2 = """type=AVC msg=audit(1158584779.745:708): avc: denied { dac_read_search } for pid=8132 comm="sh" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability"""
30 log1 = """type=AVC msg=audit(1158584779.745:708): avc: denied { dac_read_search } for pid=8132 comm="sh" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
31 type=SYSCALL msg=audit(1158584779.745:708): arch=40000003 syscall=195 success=no exit=-13 a0=80d2437 a1=bf9132f8 a2=4c56cff4 a3=0 items=0 ppid=8131 pid=8132 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sh" exe="/bin/bash" subj=user_u:system_r:vpnc_t:s0 key=(null)
32 type=AVC msg=audit(1158584779.753:709): avc: denied { dac_override } for pid=8133 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
33 type=AVC msg=audit(1158584779.753:709): avc: denied { dac_read_search } for pid=8133 comm="vpnc-script" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
34 type=SYSCALL msg=audit(1158584779.753:709): arch=40000003 syscall=195 success=no exit=-13 a0=80d2437 a1=bf910a48 a2=4c56cff4 a3=0 items=0 ppid=8132 pid=8133 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc-script" exe="/bin/bash" subj=user_u:system_r:vpnc_t:s0 key=(null)
35 type=AVC msg=audit(1158584779.825:710): avc: denied { dac_override } for pid=8134 comm="vpnc-script" capability=1 (…)
    [all...]
  /external/linux-tools-perf/src/tools/perf/scripts/python/Perf-Trace-Util/lib/Perf/Trace/
Util.py 53 import audit namespace
55 'x86_64': audit.MACH_86_64,
56 'alpha' : audit.MACH_ALPHA,
57 'ia64' : audit.MACH_IA64,
58 'ppc' : audit.MACH_PPC,
59 'ppc64' : audit.MACH_PPC64,
60 's390' : audit.MACH_S390,
61 's390x' : audit.MACH_S390X,
62 'i386' : audit.MACH_X86,
63 'i586' : audit.MACH_X86
    [all...]
  /external/selinux/policycoreutils/audit2allow/
audit2allow 24 import sepolgen.audit as audit namespace
50 help="audit messages since last boot conflicts with -i")
51 parser.add_option("-a", "--all", action="store_true", dest="audit", default=False,
52 help="read input from audit log - conflicts with -i")
87 help="Translates SELinux audit messages into a description of why the access was denied")
92 if options.audit is True or options.boot:
124 parser = audit.AuditParser(last_load_only=self.__options.lastreload)
134 messages = audit.get_dmesg_msgs()
135 elif self.__options.audit
    [all...]
audit2why 24 import sepolgen.audit as audit namespace
50 help="audit messages since last boot conflicts with -i")
51 parser.add_option("-a", "--all", action="store_true", dest="audit", default=False,
52 help="read input from audit log - conflicts with -i")
87 help="Translates SELinux audit messages into a description of why the access was denied")
92 if options.audit is True or options.boot:
124 parser = audit.AuditParser(last_load_only=self.__options.lastreload)
134 messages = audit.get_dmesg_msgs()
135 elif self.__options.audit
    [all...]
  /system/core/logd/
LogAudit.cpp 118 static const char audit_str[] = " audit(";
243 char *audit = strstr(buf, " audit("); local
244 if (!audit) {
248 *audit = '\0';
253 rc = logPrint("%s %s", type, audit + 1);
255 rc = logPrint("%s", audit + 1);
257 *audit = ' ';
  /external/selinux/policycoreutils/semanage/
seobject.py 77 import audit namespace
80 self.audit_fd = audit.audit_open()
92 self.log_list.append([self.audit_fd, audit.AUDIT_ROLE_ASSIGN, sys.argv[0], str(msg), name, 0, sename, serole, serange, oldsename, oldserole, oldserange, "", "", ""])
95 self.log_list.append([self.audit_fd, audit.AUDIT_ROLE_REMOVE, sys.argv[0], str(msg), name, 0, sename, serole, serange, oldsename, oldserole, oldserange, "", "", ""])
99 audit.audit_log_semanage_message(*(l + [success]))
    [all...]

Completed in 138 milliseconds