/external/v8/tools/mb/docs/ |
user_guide.md | 96 ### `mb audit` 98 `mb audit` is used to track the progress of the GYP->GN migration. You can 100 `mb help audit` for more details (most people are not expected to care about
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/sepolgen/ |
policygen.py | 59 why a particular access was allowed based on the audit 254 # Format the raw audit data to explain why the 271 # from the first audit message. For the vast majority of cases this info
|
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/org.apache.ant_1.7.1.v20090120-1145/etc/checkstyle/ |
checkstyle-frames.xsl | 58 <title>CheckStyle Audit</title> 77 <td class="text-align:right"><h2>CheckStyle Audit</h2></td>
|
/external/openssh/ |
config.h.in | 10 /* System only supports IPv4 audit records */ 249 /* Define to 1 if you have the <bsm/audit.h> header file. */ 718 /* Define to 1 if you have the <linux/audit.h> header file. */ 1142 /* Define to 1 if you have the <sys/audit.h> header file. */ [all...] |
README.platform | 79 The BSM audit event range available for third party TCB applications is
|
auth.h | 153 #include "audit.h"
|
config.h | 14 /* System only supports IPv4 audit records */ 220 /* Define to 1 if you have the <bsm/audit.h> header file. */ 1040 /* Define to 1 if you have the <sys/audit.h> header file. */ [all...] |
configure.ac | 405 sys/audit.h \ 630 AC_DEFINE([AU_IPv4], [0], [System only supports IPv4 audit records]) 631 [#include <bsm/audit.h>] 720 [Define if you want IRIX audit trails]) 772 AC_CHECK_HEADERS([linux/seccomp.h linux/filter.h linux/audit.h], [], [all...] |
/external/vboot_reference/firmware/lib/tpm_lite/include/ |
tpm_error_messages.h | 130 "TPM audit construction failed and the underlying command\n\
133 "TPM audit construction failed and the underlying command\n\
|
/tools/loganalysis/tests/src/com/android/loganalysis/parser/ |
KernelLogParserTest.java | 209 final String SELINUX_DENIAL_STACK = "type=1400 audit(1384544483.730:10): avc: denied " + 321 final String SELINUX_DENIAL_STACK = "type=1400 audit(1384544483.730:10): avc: denied " +
|
/device/linaro/bootloader/edk2/SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/ |
SecureBootConfigStrings.uni | 120 #string STR_AUDIT_MODE #language en-US "Audit Mode"
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x509/ |
X509Extension.java | 158 * Audit identity extension in attribute certificates.
|
/external/ltp/doc/man3/ |
parse_opts.3 | 100 audit testing for MLS.
|
/external/minijail/ |
bpf.h | 14 #include <linux/audit.h>
|
/external/selinux/python/semanage/ |
seobject.py | 102 import audit 107 self.audit_fd = audit.audit_open() 124 self.log_list.append([self.audit_fd, audit.AUDIT_ROLE_ASSIGN, sys.argv[0], str(msg), name, 0, sename, serole, serange, oldsename, oldserole, oldserange, "", "", ""]) 127 self.log_list.append([self.audit_fd, audit.AUDIT_ROLE_REMOVE, sys.argv[0], str(msg), name, 0, sename, serole, serange, oldsename, oldserole, oldserange, "", "", ""]) 130 self.log_change_list.append([self.audit_fd, audit.AUDIT_USER_MAC_CONFIG_CHANGE, str(msg), "semanage", "", "", ""]) 134 audit.audit_log_semanage_message(*(l + [success])) 136 audit.audit_log_user_comm_message(*(l + [success])) [all...] |
/external/skia/include/private/ |
GrAuditTrail.h | 26 * ensure that the audit trail is disabled in a timely fashion. Once the information has been dealt
|
/external/strace/ |
printsiginfo.c | 40 #include <linux/audit.h>
|
/external/webrtc/webrtc/base/ |
task.h | 63 // STATE_ERROR - indicates an error - we should audit the error code in
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/lib32/ |
ld-2.11.1.so | |
ld-linux.so.2 | |
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/lib32/ |
ld-2.15.so | |
ld-linux.so.2 | |
/system/security/keystore/ |
permissions.cpp | 96 ALOGE("No keystore audit data");
|
/system/sepolicy/tools/sepolicy-analyze/ |
README | 18 conditional rules, audit-related rules (auditallow or dontaudit),
|
/external/selinux/secilc/docs/ |
cil_reference_guide.md | 282 (typetransition audit.process device.device chr_file ARG1 device.klog_device) 290 (typetransition audit.process device.device chr_file ARG1 device.klog_device)
|