OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:audit
(Results
1 - 25
of
393
) sorted by null
1
2
3
4
5
6
7
8
9
10
11
>>
/toolchain/binutils/binutils-2.25/ld/testsuite/ld-elf/
audit.rd
2
.*
Audit
library: \[tmpdir/
audit
.so\].*
depaudit.rd
2
.*Dependency
audit
library: \[tmpdir/
audit
.so\].*
depaudit2.rd
2
.*Dependency
audit
library: \[tmpdir/
audit
.so:tmpdir/audit2.so:tmpdir/audit3.so\].*
audit.exp
40
"-Wl,--
audit
=tmpdir/
audit
.so" ""
41
{main.c} {{"readelf" {-d} "
audit
.rd"}} "
audit
.out"}
43
"-Wl,-Ptmpdir/
audit
.so" ""
45
{"Run with --depaudit=
audit
.so"
46
"-Wl,--depaudit=tmpdir/
audit
.so" ""
48
{"Run with shared with --
audit
"
49
"-shared -Wl,--
audit
=tmpdir/
audit
.so" "-fPIC
[
all
...]
/external/iptables/extensions/
libxt_AUDIT.t
2
-j
AUDIT
--type accept;=;OK
3
-j
AUDIT
--type drop;=;OK
4
-j
AUDIT
--type reject;=;OK
5
-j
AUDIT
;;FAIL
6
-j
AUDIT
--type wrong;;FAIL
libxt_AUDIT.man
1
This target allows to create
audit
records for packets hitting the target.
6
Set type of
audit
record.
12
iptables \-A AUDIT_DROP \-j
AUDIT
\-\-type drop
libxt_AUDIT.c
1
/* Shared library add-on to xtables for
AUDIT
20
"
AUDIT
target options\n"
52
printf("
AUDIT
");
86
.name = "
AUDIT
",
/system/core/logd/
README.auditd
3
The
audit
daemon is a simplified version of its desktop
4
counterpart designed to gather the
audit
logs from the
5
audit
kernel subsystem. The
audit
subsystem of the kernel
8
To enable the
audit
subsystem, you must add this to your
libaudit.h
28
#include <linux/
audit
.h>
50
* Opens a connection to the
Audit
netlink socket
82
* Sets a pid to receive
audit
netlink events from the kernel
86
* The pid whom to set as the receiver of
audit
messages
93
* Sets the rate limit to receive
audit
netlink events from the kernel
97
* The cap of the maximum number of
audit
messages a second
/external/tpm2/
CommandAudit.c
15
// This function initializes the command
audit
list. This function is simulates the behavior of manufacturing. A
25
// Clear all the
audit
commands
31
// Set initial command
audit
hash algorithm to be context integrity hash
34
// Set up
audit
counter to be 0
36
// Write command
audit
persistent data to NV
46
// This function clears the command
audit
digest on a TPM Reset.
63
// This function will SET the
audit
flag for a command. This function will not SET the
audit
flag for a
64
// command that is not implemented. This ensures that the
audit
status is not SET when
72
// TRUE the command code
audit
status was change
[
all
...]
SetCommandCodeAuditStatus.c
36
// Change the hash algorithm for
audit
41
// command
audit
processing on exit.
44
// Save the change of command
audit
data (this sets g_updateNV so that NV
/external/selinux/python/sepolgen/tests/
test_audit.py
21
import sepolgen.
audit
25
audit1 = """Sep 12 08:26:43 dhcp83-5 kernel:
audit
(1158064002.046:4): avc: denied { read } for pid=2 496 comm="bluez-pin" name=".gdm1K3IFT" dev=dm-0 ino=3601333 scontext=user_u:system_r:bluetooth_helper_t:s0-s0:c0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file"""
27
#
audit
daemon messages
28
audit2 = """type=AVC msg=
audit
(1158584779.745:708): avc: denied { dac_read_search } for pid=8132 comm="sh" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability"""
30
log1 = """type=AVC msg=
audit
(1158584779.745:708): avc: denied { dac_read_search } for pid=8132 comm="sh" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
31
type=SYSCALL msg=
audit
(1158584779.745:708): arch=40000003 syscall=195 success=no exit=-13 a0=80d2437 a1=bf9132f8 a2=4c56cff4 a3=0 items=0 ppid=8131 pid=8132 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sh" exe="/bin/bash" subj=user_u:system_r:vpnc_t:s0 key=(null)
32
type=AVC msg=
audit
(1158584779.753:709): avc: denied { dac_override } for pid=8133 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
33
type=AVC msg=
audit
(1158584779.753:709): avc: denied { dac_read_search } for pid=8133 comm="vpnc-script" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
34
type=SYSCALL msg=
audit
(1158584779.753:709): arch=40000003 syscall=195 success=no exit=-13 a0=80d2437 a1=bf910a48 a2=4c56cff4 a3=0 items=0 ppid=8132 pid=8133 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc-script" exe="/bin/bash" subj=user_u:system_r:vpnc_t:s0 key=(null)
35
type=AVC msg=
audit
(1158584779.825:710): avc: denied { dac_override } for pid=8134 comm="vpnc-script" capability=1 (…)
[
all
...]
audit.txt
1
type=AVC msg=
audit
(1158584779.745:708): avc: denied { dac_read_search } for pid=8132 comm="sh" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
2
type=SYSCALL msg=
audit
(1158584779.745:708): arch=40000003 syscall=195 success=no exit=-13 a0=80d2437 a1=bf9132f8 a2=4c56cff4 a3=0 items=0 ppid=8131 pid=8132 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sh" exe="/bin/bash" subj=user_u:system_r:vpnc_t:s0 key=(null)
3
type=AVC msg=
audit
(1158584779.753:709): avc: denied { dac_override } for pid=8133 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
4
type=AVC msg=
audit
(1158584779.753:709): avc: denied { dac_read_search } for pid=8133 comm="vpnc-script" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
5
type=SYSCALL msg=
audit
(1158584779.753:709): arch=40000003 syscall=195 success=no exit=-13 a0=80d2437 a1=bf910a48 a2=4c56cff4 a3=0 items=0 ppid=8132 pid=8133 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc-script" exe="/bin/bash" subj=user_u:system_r:vpnc_t:s0 key=(null)
6
type=AVC msg=
audit
(1158584779.825:710): avc: denied { dac_override } for pid=8134 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
7
type=AVC msg=
audit
(1158584779.825:710): avc: denied { dac_read_search } for pid=8134 comm="vpnc-script" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
8
type=SYSCALL msg=
audit
(1158584779.825:710): arch=40000003 syscall=195 success=no exit=-13 a0=80d2437 a1=bf910a48 a2=4c56cff4 a3=0 items=0 ppid=8132 pid=8134 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc-script" exe="/bin/bash" subj=user_u:system_r:vpnc_t:s0 key=(null)
9
type=AVC msg=
audit
(1158584780.793:711): avc: denied { dac_override } for pid=8144 comm="sh" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability
10
type=AVC msg=
audit
(1158584780.793:711): avc: denied { dac_read_search } for pid=8144 comm="sh" capability=2 sconte (…)
[
all
...]
/external/iproute2/etc/iproute2/
nl_protos
12
9
audit
/external/strace/xlat/
audit_arch.in
1
/* linux used to have linux/elf-em.h out of sync with linux/
audit
.h */
/external/selinux/python/sepolgen/tests/test_data/
short.log
1
type=AVC msg=
audit
(1162850331.422:978): avc: denied { ioctl } for pid=6314 comm="pam_timestamp_c" name="[96391]" dev=pipefs ino=96391 scontext=staff_u:staff_r:pam_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=fifo_file
2
type=SYSCALL msg=
audit
(1162850331.422:978): arch=40000003 syscall=54 success=no exit=-22 a0=2 a1=5401 a2=bfb6479c a3=bfb647dc items=0 ppid=6311 pid=6314 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="pam_timestamp_c" exe="/sbin/pam_timestamp_check" subj=staff_u:staff_r:pam_t:s0 key=(null)
3
type=AVC_PATH msg=
audit
(1162850331.422:978): path="pipe:[96391]"
4
type=AVC msg=
audit
(1162850332.318:979): avc: denied { read } for pid=6306 comm="beagled" name=".gdmDOM7HT" dev=dm-0 ino=14469552 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file
5
type=SYSCALL msg=
audit
(1162850332.318:979): arch=40000003 syscall=33 success=yes exit=0 a0=bfdb2fde a1=4 a2=4db18a64 a3=bfdb2fde items=0 ppid=1 pid=6306 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagled" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null)
6
type=AVC msg=
audit
(1162850333.186:980): avc: denied { read } for pid=6306 comm="beagled" name="max_user_instances" dev=proc ino=-268435218 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file
7
type=SYSCALL msg=
audit
(1162850333.186:980): arch=40000003 syscall=5 success=yes exit=24 a0=11833c a1=0 a2=1 a3=8aeffb8 items=0 ppid=1 pid=6306 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagled" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null)
8
type=AVC msg=
audit
(1162850335.022:981): avc: denied { read write } for pid=6336 comm="clock-applet" name="bonobo-activation-register.lock" dev=dm-0 ino=5434689 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=file
9
type=SYSCALL msg=
audit
(1162850335.022:981): arch=40000003 syscall=5 success=yes exit=13 a0=9c0e840 a1=42 a2=1c0 a3=9c0e840 items=0 ppid=1 pid=6336 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="clock-applet" exe="/usr/libexec/clock-applet" subj=staff_u:staff_r:staff_t:s0 key=(null)
10
type=AVC msg=
audit
(1162850335.022:982): avc: denied { lock } for pid=6336 comm="clock-applet" name="bonobo-activat (…)
[
all
...]
audit.log
1
type=AVC msg=
audit
(1162850331.422:978): avc: denied { ioctl } for pid=6314 comm="pam_timestamp_c" name="[96391]" dev=pipefs ino=96391 scontext=staff_u:staff_r:pam_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=fifo_file
2
type=SYSCALL msg=
audit
(1162850331.422:978): arch=40000003 syscall=54 success=no exit=-22 a0=2 a1=5401 a2=bfb6479c a3=bfb647dc items=0 ppid=6311 pid=6314 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="pam_timestamp_c" exe="/sbin/pam_timestamp_check" subj=staff_u:staff_r:pam_t:s0 key=(null)
3
type=AVC_PATH msg=
audit
(1162850331.422:978): path="pipe:[96391]"
4
type=AVC msg=
audit
(1162850332.318:979): avc: denied { read } for pid=6306 comm="beagled" name=".gdmDOM7HT" dev=dm-0 ino=14469552 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file
5
type=SYSCALL msg=
audit
(1162850332.318:979): arch=40000003 syscall=33 success=yes exit=0 a0=bfdb2fde a1=4 a2=4db18a64 a3=bfdb2fde items=0 ppid=1 pid=6306 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagled" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null)
6
type=AVC msg=
audit
(1162850333.186:980): avc: denied { read } for pid=6306 comm="beagled" name="max_user_instances" dev=proc ino=-268435218 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file
7
type=SYSCALL msg=
audit
(1162850333.186:980): arch=40000003 syscall=5 success=yes exit=24 a0=11833c a1=0 a2=1 a3=8aeffb8 items=0 ppid=1 pid=6306 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagled" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null)
8
type=AVC msg=
audit
(1162850335.022:981): avc: denied { read write } for pid=6336 comm="clock-applet" name="bonobo-activation-register.lock" dev=dm-0 ino=5434689 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=file
9
type=SYSCALL msg=
audit
(1162850335.022:981): arch=40000003 syscall=5 success=yes exit=13 a0=9c0e840 a1=42 a2=1c0 a3=9c0e840 items=0 ppid=1 pid=6336 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="clock-applet" exe="/usr/libexec/clock-applet" subj=staff_u:staff_r:staff_t:s0 key=(null)
10
type=AVC msg=
audit
(1162850335.022:982): avc: denied { lock } for pid=6336 comm="clock-applet" name="bonobo-activat (…)
[
all
...]
httpd.log
1
type=USER_AVC msg=
audit
(1163772866.369:8084): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)'
2
type=USER_AVC msg=
audit
(1163772866.437:8085): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)'
3
type=USER_AVC msg=
audit
(1163772866.449:8086): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)'
4
type=USER_AVC msg=
audit
(1163772866.449:8087): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)'
5
type=USER_AVC msg=
audit
(1163772866.449:8088): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)'
6
type=USER_AVC msg=
audit
(1163772866.453:8089): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)'
7
type=USER_AVC msg=
audit
(1163772866.453:8090): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)'
8
type=USER_AVC msg=
audit
(1163772866.453:8091): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)'
9
type=USER_AVC msg=
audit
(1163772866.453:8092): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)'
10
type=USER_AVC msg=
audit
(1163772866.453:8093): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc (…)
[
all
...]
/external/selinux/python/sepolicy/sepolicy/templates/
network.py
144
## Do not
audit
attempts to send UDP traffic on the TEMPLATETYPE port.
148
## Domain to not
audit
.
182
## Do not
audit
attempts to receive UDP traffic on the TEMPLATETYPE port.
186
## Domain to not
audit
.
217
## Do not
audit
attempts to send and receive
222
## Domain to not
audit
.
274
## Do not
audit
attempts to sbind to TEMPLATETYPE port.
278
## Domain to not
audit
.
311
## Do not
audit
attempts to make a TCP connection to TEMPLATETYPE port.
349
## Do not
audit
attempts to send TEMPLATETYPE_client packets
[
all
...]
/external/selinux/python/audit2allow/
audit2allow.1
32
\- translates SELinux
audit
messages into a description of why the access was denied (audit2allow \-w)
40
Read input from
audit
and message log, conflicts with \-i
43
Read input from
audit
messages since last boot conflicts with \-i
48
Note that all
audit
messages are not available via dmesg when
89
Translates SELinux
audit
messages into a description of why the access was denied
119
.B NOTE: These examples are for systems using the
audit
package. If you do
120
.B not use the
audit
package, the AVC messages will be in /var/log/messages.
121
.B Please substitute /var/log/messages for /var/log/
audit
/
audit
.log in the
126
$ cat /var/log/
audit
/audit.log | audit2allow \-m local > local.t
[
all
...]
test.log
1
node=bill.example.com type=AVC_PATH msg=
audit
(1166045975.667:1128): path="/usr/lib/libGL.so.1.2"
2
type=AVC msg=
audit
(1166045975.667:1129): avc: denied { write } for comm=local dev=dm-0 name=root.lock pid=10581 scontext=system_u:system_r:postfix_local_t:s0 tclass=file tcontext=system_u:object_r:mail_spool_t:s0
3
node=bob.example.com type=PATH msg=
audit
(1166111074.191:74): item=0 name="/etc/auto.net" inode=16483485 dev=fd:00 mode=0100755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:automount_lock_t:s0 type=CWD msg=
audit
(1166111074.191:74): cwd="/"
4
node=bob.example.com type=SYSCALL msg=
audit
(1166111074.191:74): arch=40000003 syscall=33 success=no exit=-13 a0=92c5288 a1=1 a2=154d50 a3=92c5120 items=1 ppid=13935 pid=13944 auid=3267 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="automount" exe="/usr/sbin/automount" subj=system_u:system_r:automount_t:s0 key=(null)
5
node=bob.example.com type=AVC msg=
audit
(1166111074.191:74): avc: denied { execute } for pid=13944 comm="automount" name="auto.net" dev=dm-0 ino=16483485 scontext=system_u:system_r:automount_t:s0 tcontext=system_u:object_r:automount_lock_t:s0 tclass=file
6
node=james.example.com type=SYSCALL msg=
audit
(1165963069.244:851): arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf96a830 a2=b5b1e8 a3=9e58ac0 items=0 ppid=21133 pid=21134 auid=3267 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts10 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:httpd_t:s0 key=(null)
7
node=james.example.com type=AVC msg=
audit
(1165963069.244:851): avc: denied { name_bind } for pid=21134 comm="httpd" src=81 scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:object_r:reserved_port_t:s0 tclass=tcp_socket
8
node=tom.example.com type=SYSCALL msg=
audit
(1165963069.244:852): arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf96a830 a2=b5b1e8 a3=9e58ac0 items=0 ppid=21133 pid=21134 auid=3267 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts10 comm="smbd" exe="/usr/sbin/smbd" subj=system_u:system_r:smbd_t:s0 key=(null)
9
node=tom.example.com type=AVC msg=
audit
(1165963069.244:852): avc: denied { name_connect } for pid=21134 comm="smbd" src=81 scontext=sys (…)
[
all
...]
/external/openssh/
audit.c
1
/* $Id:
audit
.c,v 1.6 2011/01/17 10:15:30 dtucker Exp $ */
34
#include "
audit
.h"
47
/* Maybe add the
audit
class to struct Authmethod? */
116
* Null implementations of
audit
functions.
117
* These get used if SSH_AUDIT_EVENTS is defined but no
audit
module is enabled.
127
debug("
audit
connection from %s port %d euid %d", host, port,
132
* Called when various events occur (see
audit
.h for a list of possible
138
debug("
audit
event euid %d user %s event %d (%s)", geteuid(),
154
debug("
audit
session open euid %d user %s tty name %s", geteuid(),
170
debug("
audit
session close euid %d user %s tty name %s", geteuid()
[
all
...]
audit-bsm.c
1
/* $Id:
audit
-bsm.c,v 1.8 2012/02/23 23:40:43 dtucker Exp $ */
62
#include <bsm/
audit
.h>
146
error("BSM
audit
: getaddrinfo failed for %.100s: %.100s", host,
165
error("BSM
audit
: unknown address family for %.100s: %d",
176
In Solaris 11 the
audit
daemon has been moved to SMF. In the process
273
debug3("BSM
audit
: typ %d rc %d \"%s\"", typ, rc, string);
275
return; /*
audit
event does not match mask, do not write */
277
debug3("BSM
audit
: writing
audit
new record");
295
error("BSM
audit
: %s failed to write \"%s\" record: %s"
[
all
...]
/external/selinux/python/sepolgen/src/sepolgen/
audit.py
29
"""Obtain all of the avc and policy load messages from the
audit
34
string contain all of the
audit
messages returned by ausearch.
51
"""Obtain all of the avc and policy load messages from the
audit
56
string contain all of the
audit
messages returned by ausearch.
69
string contain all of the
audit
messages returned by dmesg.
78
# Classes representing
audit
messages
81
"""Base class for all objects representing
audit
messages.
83
AuditMessage is a base class for all
audit
messages and only
93
an
audit
message.
101
if msg[:6] == "
audit
("
[
all
...]
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/sepolgen/
audit.py
29
"""Obtain all of the avc and policy load messages from the
audit
34
string contain all of the
audit
messages returned by ausearch.
51
"""Obtain all of the avc and policy load messages from the
audit
56
string contain all of the
audit
messages returned by ausearch.
69
string contain all of the
audit
messages returned by dmesg.
78
# Classes representing
audit
messages
81
"""Base class for all objects representing
audit
messages.
83
AuditMessage is a base class for all
audit
messages and only
93
an
audit
message.
101
if msg[:6] == "
audit
("
[
all
...]
Completed in 367 milliseconds
1
2
3
4
5
6
7
8
9
10
11
>>