HomeSort by relevance Sort by last modified time
    Searched refs:audit2why (Results 1 - 11 of 11) sorted by null

  /external/selinux/python/audit2allow/
Makefile 15 all: audit2why sepolgen-ifgen-attr-helper
19 audit2why:
20 ln -sf audit2allow audit2why
28 (cd $(BINDIR); ln -sf audit2allow audit2why)
33 install -m 644 audit2why.1 $(MANDIR)/man1/
audit2allow 33 import selinux.audit2why as audit2why
91 parser.add_option("-w", "--why", dest="audit2why", action="store_true", default=(os.path.basename(sys.argv[0]) == "audit2why"),
249 if rc == audit2why.ALLOW:
254 if rc == audit2why.DONTAUDIT:
259 if rc == audit2why.BOOLEAN:
271 if rc == audit2why.TERULE:
276 if rc == audit2why.CONSTRAINT:
283 if rc == audit2why.RBAC
    [all...]
audit2why 33 import selinux.audit2why as audit2why
91 parser.add_option("-w", "--why", dest="audit2why", action="store_true", default=(os.path.basename(sys.argv[0]) == "audit2why"),
249 if rc == audit2why.ALLOW:
254 if rc == audit2why.DONTAUDIT:
259 if rc == audit2why.BOOLEAN:
271 if rc == audit2why.TERULE:
276 if rc == audit2why.CONSTRAINT:
283 if rc == audit2why.RBAC
    [all...]
  /external/selinux/prebuilts/bin/
audit2why 7 exec python $ANDROID_BUILD_TOP/external/selinux/python/audit2allow/audit2why "$@"
9 echo "audit2why is only supported on linux"
  /external/selinux/python/sepolgen/src/sepolgen/
audit.py 137 import selinux.audit2why as audit2why
181 self.type = audit2why.TERULE
254 self.type, self.data = audit2why.analyze(scontext, tcontext, self.tclass, self.accesses);
255 if self.type == audit2why.NOPOLICY:
256 self.type = audit2why.TERULE
257 if self.type == audit2why.BADTCON:
259 if self.type == audit2why.BADSCON:
261 if self.type == audit2why.BADSCON:
263 if self.type == audit2why.BADPERM
    [all...]
policygen.py 27 import selinux.audit2why as audit2why
164 if av.type == audit2why.ALLOW:
166 if av.type == audit2why.DONTAUDIT:
169 if av.type == audit2why.BOOLEAN:
175 if av.type == audit2why.CONSTRAINT:
183 if ( av.type == audit2why.TERULE and
access.py 37 from selinux import audit2why
91 self.type = audit2why.TERULE
260 def add(self, src_type, tgt_type, obj_class, perms, audit_msg=None, avc_type=audit2why.TERULE, data=[]):
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/sepolgen/
audit.py 137 import selinux.audit2why as audit2why
181 self.type = audit2why.TERULE
254 self.type, self.data = audit2why.analyze(scontext, tcontext, self.tclass, self.accesses);
255 if self.type == audit2why.NOPOLICY:
256 self.type = audit2why.TERULE
257 if self.type == audit2why.BADTCON:
259 if self.type == audit2why.BADSCON:
261 if self.type == audit2why.BADSCON:
263 if self.type == audit2why.BADPERM
    [all...]
policygen.py 27 import selinux.audit2why as audit2why
164 if av.type == audit2why.ALLOW:
166 if av.type == audit2why.DONTAUDIT:
169 if av.type == audit2why.BOOLEAN:
175 if av.type == audit2why.CONSTRAINT:
183 if ( av.type == audit2why.TERULE and
access.py 37 from selinux import audit2why
91 self.type = audit2why.TERULE
260 def add(self, src_type, tgt_type, obj_class, perms, audit_msg=None, avc_type=audit2why.TERULE, data=[]):
  /external/selinux/libselinux/src/
Makefile 50 AUDIT2WHYLOBJ=$(PYPREFIX)audit2why.lo
51 AUDIT2WHYSO=$(PYPREFIX)audit2why.so
54 SRCS= $(filter-out $(GENERATED) audit2why.c, $(sort $(wildcard *.c)))
155 $(AUDIT2WHYLOBJ): audit2why.c
190 install -m 755 $(AUDIT2WHYSO) $(PYSITEDIR)/selinux/audit2why$(PYCEXT)

Completed in 110 milliseconds