/external/selinux/policycoreutils/audit2allow/ |
Makefile | 10 all: audit2why 12 audit2why: 13 ln -sf audit2allow audit2why 21 (cd $(BINDIR); ln -sf audit2allow audit2why) 25 install -m 644 audit2why.1 $(MANDIR)/man1/
|
audit2allow | 32 import selinux.audit2why as audit2why namespace 86 parser.add_option("-w", "--why", dest="audit2why", action="store_true", default=(os.path.basename(sys.argv[0])=="audit2why"), 244 if rc == audit2why.ALLOW: 249 if rc == audit2why.DONTAUDIT: 254 if rc == audit2why.BOOLEAN: 266 if rc == audit2why.TERULE: 271 if rc == audit2why.CONSTRAINT: 278 if rc == audit2why.RBAC [all...] |
audit2why | 32 import selinux.audit2why as audit2why namespace 86 parser.add_option("-w", "--why", dest="audit2why", action="store_true", default=(os.path.basename(sys.argv[0])=="audit2why"), 244 if rc == audit2why.ALLOW: 249 if rc == audit2why.DONTAUDIT: 254 if rc == audit2why.BOOLEAN: 266 if rc == audit2why.TERULE: 271 if rc == audit2why.CONSTRAINT: 277 if rc == audit2why.RBAC [all...] |
/external/selinux/prebuilts/bin/ |
audit2why | 7 exec python $ANDROID_BUILD_TOP/external/selinux/policycoreutils/audit2allow/audit2why "$@" 9 echo "audit2why is only supported on linux"
|
/external/selinux/sepolgen/src/sepolgen/ |
audit.py | 130 import selinux.audit2why as audit2why namespace 174 self.type = audit2why.TERULE 247 self.type, self.data = audit2why.analyze(scontext, tcontext, self.tclass, self.accesses); 248 if self.type == audit2why.NOPOLICY: 249 self.type = audit2why.TERULE 250 if self.type == audit2why.BADTCON: 252 if self.type == audit2why.BADSCON: 254 if self.type == audit2why.BADSCON: 256 if self.type == audit2why.BADPERM [all...] |
policygen.py | 32 import selinux.audit2why as audit2why namespace 163 if av.type == audit2why.ALLOW: 165 if av.type == audit2why.DONTAUDIT: 168 if av.type == audit2why.BOOLEAN: 174 if av.type == audit2why.CONSTRAINT: 182 if ( av.type == audit2why.TERULE and
|
access.py | 35 from selinux import audit2why namespace 89 self.type = audit2why.TERULE 259 def add(self, src_type, tgt_type, obj_class, perms, audit_msg=None, avc_type=audit2why.TERULE, data=[]):
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/sepolgen/ |
audit.py | 130 import selinux.audit2why as audit2why namespace 174 self.type = audit2why.TERULE 247 self.type, self.data = audit2why.analyze(scontext, tcontext, self.tclass, self.accesses); 248 if self.type == audit2why.NOPOLICY: 249 self.type = audit2why.TERULE 250 if self.type == audit2why.BADTCON: 252 if self.type == audit2why.BADSCON: 254 if self.type == audit2why.BADSCON: 256 if self.type == audit2why.BADPERM [all...] |
policygen.py | 32 import selinux.audit2why as audit2why namespace 163 if av.type == audit2why.ALLOW: 165 if av.type == audit2why.DONTAUDIT: 168 if av.type == audit2why.BOOLEAN: 174 if av.type == audit2why.CONSTRAINT: 182 if ( av.type == audit2why.TERULE and
|
access.py | 35 from selinux import audit2why namespace 89 self.type = audit2why.TERULE 259 def add(self, src_type, tgt_type, obj_class, perms, audit_msg=None, avc_type=audit2why.TERULE, data=[]):
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/setoolsgui/sepolgen/ |
audit.py | 130 import selinux.audit2why as audit2why namespace 174 self.type = audit2why.TERULE 247 self.type, self.data = audit2why.analyze(scontext, tcontext, self.tclass, self.accesses); 248 if self.type == audit2why.NOPOLICY: 249 self.type = audit2why.TERULE 250 if self.type == audit2why.BADTCON: 252 if self.type == audit2why.BADSCON: 254 if self.type == audit2why.BADSCON: 256 if self.type == audit2why.BADPERM [all...] |
policygen.py | 32 import selinux.audit2why as audit2why namespace 163 if av.type == audit2why.ALLOW: 165 if av.type == audit2why.DONTAUDIT: 168 if av.type == audit2why.BOOLEAN: 174 if av.type == audit2why.CONSTRAINT: 182 if ( av.type == audit2why.TERULE and
|
access.py | 35 from selinux import audit2why namespace 89 self.type = audit2why.TERULE 259 def add(self, src_type, tgt_type, obj_class, perms, audit_msg=None, avc_type=audit2why.TERULE, data=[]):
|
/external/selinux/libselinux/src/ |
Makefile | 39 AUDIT2WHYLOBJ=$(PYPREFIX)audit2why.lo 40 AUDIT2WHYSO=$(PYPREFIX)audit2why.so 50 SRCS= $(filter-out $(UNUSED_SRCS) $(GENERATED) audit2why.c, $(wildcard *.c)) 123 $(AUDIT2WHYLOBJ): audit2why.c 156 install -m 755 $(AUDIT2WHYSO) $(PYLIBDIR)/site-packages/selinux/audit2why.so
|