HomeSort by relevance Sort by last modified time
    Searched refs:audit2why (Results 1 - 11 of 11) sorted by null

  /external/selinux/policycoreutils/audit2allow/
Makefile 10 all: audit2why
12 audit2why:
13 ln -sf audit2allow audit2why
21 (cd $(BINDIR); ln -sf audit2allow audit2why)
25 install -m 644 audit2why.1 $(MANDIR)/man1/
audit2allow 33 import selinux.audit2why as audit2why namespace
91 parser.add_option("-w", "--why", dest="audit2why", action="store_true", default=(os.path.basename(sys.argv[0]) == "audit2why"),
249 if rc == audit2why.ALLOW:
254 if rc == audit2why.DONTAUDIT:
259 if rc == audit2why.BOOLEAN:
271 if rc == audit2why.TERULE:
276 if rc == audit2why.CONSTRAINT:
283 if rc == audit2why.RBAC
    [all...]
audit2why 33 import selinux.audit2why as audit2why namespace
91 parser.add_option("-w", "--why", dest="audit2why", action="store_true", default=(os.path.basename(sys.argv[0]) == "audit2why"),
249 if rc == audit2why.ALLOW:
254 if rc == audit2why.DONTAUDIT:
259 if rc == audit2why.BOOLEAN:
271 if rc == audit2why.TERULE:
276 if rc == audit2why.CONSTRAINT:
282 if rc == audit2why.RBAC
    [all...]
  /external/selinux/prebuilts/bin/
audit2why 7 exec python $ANDROID_BUILD_TOP/external/selinux/policycoreutils/audit2allow/audit2why "$@"
9 echo "audit2why is only supported on linux"
  /external/selinux/sepolgen/src/sepolgen/
audit.py 137 import selinux.audit2why as audit2why namespace
181 self.type = audit2why.TERULE
254 self.type, self.data = audit2why.analyze(scontext, tcontext, self.tclass, self.accesses);
255 if self.type == audit2why.NOPOLICY:
256 self.type = audit2why.TERULE
257 if self.type == audit2why.BADTCON:
259 if self.type == audit2why.BADSCON:
261 if self.type == audit2why.BADSCON:
263 if self.type == audit2why.BADPERM
    [all...]
policygen.py 27 import selinux.audit2why as audit2why namespace
164 if av.type == audit2why.ALLOW:
166 if av.type == audit2why.DONTAUDIT:
169 if av.type == audit2why.BOOLEAN:
175 if av.type == audit2why.CONSTRAINT:
183 if ( av.type == audit2why.TERULE and
access.py 37 from selinux import audit2why namespace
91 self.type = audit2why.TERULE
260 def add(self, src_type, tgt_type, obj_class, perms, audit_msg=None, avc_type=audit2why.TERULE, data=[]):
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/sepolgen/
audit.py 137 import selinux.audit2why as audit2why namespace
181 self.type = audit2why.TERULE
254 self.type, self.data = audit2why.analyze(scontext, tcontext, self.tclass, self.accesses);
255 if self.type == audit2why.NOPOLICY:
256 self.type = audit2why.TERULE
257 if self.type == audit2why.BADTCON:
259 if self.type == audit2why.BADSCON:
261 if self.type == audit2why.BADSCON:
263 if self.type == audit2why.BADPERM
    [all...]
policygen.py 27 import selinux.audit2why as audit2why namespace
164 if av.type == audit2why.ALLOW:
166 if av.type == audit2why.DONTAUDIT:
169 if av.type == audit2why.BOOLEAN:
175 if av.type == audit2why.CONSTRAINT:
183 if ( av.type == audit2why.TERULE and
access.py 37 from selinux import audit2why namespace
91 self.type = audit2why.TERULE
260 def add(self, src_type, tgt_type, obj_class, perms, audit_msg=None, avc_type=audit2why.TERULE, data=[]):
  /external/selinux/libselinux/src/
Makefile 40 AUDIT2WHYLOBJ=$(PYPREFIX)audit2why.lo
41 AUDIT2WHYSO=$(PYPREFIX)audit2why.so
51 SRCS= $(filter-out $(UNUSED_SRCS) $(GENERATED) audit2why.c, $(wildcard *.c))
124 $(AUDIT2WHYLOBJ): audit2why.c
159 install -m 755 $(AUDIT2WHYSO) $(PYLIBDIR)/site-packages/selinux/audit2why.so

Completed in 255 milliseconds