Home
last modified time | relevance | path

Searched refs:audit (Results 1 – 25 of 164) sorted by relevance

1234567

/external/selinux/python/sepolgen/tests/test_data/
Daudit.log1 type=AVC msg=audit(1162850331.422:978): avc: denied { ioctl } for pid=6314 comm="pam_timestamp_c…
2 type=SYSCALL msg=audit(1162850331.422:978): arch=40000003 syscall=54 success=no exit=-22 a0=2 a1=54…
3 type=AVC_PATH msg=audit(1162850331.422:978): path="pipe:[96391]"
4 type=AVC msg=audit(1162850332.318:979): avc: denied { read } for pid=6306 comm="beagled" name=".…
5 type=SYSCALL msg=audit(1162850332.318:979): arch=40000003 syscall=33 success=yes exit=0 a0=bfdb2fde…
6 type=AVC msg=audit(1162850333.186:980): avc: denied { read } for pid=6306 comm="beagled" name="m…
7 type=SYSCALL msg=audit(1162850333.186:980): arch=40000003 syscall=5 success=yes exit=24 a0=11833c a…
8 type=AVC msg=audit(1162850335.022:981): avc: denied { read write } for pid=6336 comm="clock-appl…
9 type=SYSCALL msg=audit(1162850335.022:981): arch=40000003 syscall=5 success=yes exit=13 a0=9c0e840 …
10 type=AVC msg=audit(1162850335.022:982): avc: denied { lock } for pid=6336 comm="clock-applet" na…
[all …]
Dhttpd.log1 type=USER_AVC msg=audit(1163772866.369:8084): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st…
2 type=USER_AVC msg=audit(1163772866.437:8085): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st…
3 type=USER_AVC msg=audit(1163772866.449:8086): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st…
4 type=USER_AVC msg=audit(1163772866.449:8087): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st…
5 type=USER_AVC msg=audit(1163772866.449:8088): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st…
6 type=USER_AVC msg=audit(1163772866.453:8089): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st…
7 type=USER_AVC msg=audit(1163772866.453:8090): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st…
8 type=USER_AVC msg=audit(1163772866.453:8091): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st…
9 type=USER_AVC msg=audit(1163772866.453:8092): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st…
10 type=USER_AVC msg=audit(1163772866.453:8093): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st…
[all …]
Dshort.log1 type=AVC msg=audit(1162850331.422:978): avc: denied { ioctl } for pid=6314 comm="pam_timestamp_c…
2 type=SYSCALL msg=audit(1162850331.422:978): arch=40000003 syscall=54 success=no exit=-22 a0=2 a1=54…
3 type=AVC_PATH msg=audit(1162850331.422:978): path="pipe:[96391]"
4 type=AVC msg=audit(1162850332.318:979): avc: denied { read } for pid=6306 comm="beagled" name=".…
5 type=SYSCALL msg=audit(1162850332.318:979): arch=40000003 syscall=33 success=yes exit=0 a0=bfdb2fde…
6 type=AVC msg=audit(1162850333.186:980): avc: denied { read } for pid=6306 comm="beagled" name="m…
7 type=SYSCALL msg=audit(1162850333.186:980): arch=40000003 syscall=5 success=yes exit=24 a0=11833c a…
8 type=AVC msg=audit(1162850335.022:981): avc: denied { read write } for pid=6336 comm="clock-appl…
9 type=SYSCALL msg=audit(1162850335.022:981): arch=40000003 syscall=5 success=yes exit=13 a0=9c0e840 …
10 type=AVC msg=audit(1162850335.022:982): avc: denied { lock } for pid=6336 comm="clock-applet" na…
[all …]
/external/selinux/python/sepolgen/tests/
Daudit.txt1 type=AVC msg=audit(1158584779.745:708): avc: denied { dac_read_search } for pid=8132 comm="sh" c…
2 type=SYSCALL msg=audit(1158584779.745:708): arch=40000003 syscall=195 success=no exit=-13 a0=80d243…
3 type=AVC msg=audit(1158584779.753:709): avc: denied { dac_override } for pid=8133 comm="vpnc-scr…
4 type=AVC msg=audit(1158584779.753:709): avc: denied { dac_read_search } for pid=8133 comm="vpnc-…
5 type=SYSCALL msg=audit(1158584779.753:709): arch=40000003 syscall=195 success=no exit=-13 a0=80d243…
6 type=AVC msg=audit(1158584779.825:710): avc: denied { dac_override } for pid=8134 comm="vpnc-scr…
7 type=AVC msg=audit(1158584779.825:710): avc: denied { dac_read_search } for pid=8134 comm="vpnc-…
8 type=SYSCALL msg=audit(1158584779.825:710): arch=40000003 syscall=195 success=no exit=-13 a0=80d243…
9 type=AVC msg=audit(1158584780.793:711): avc: denied { dac_override } for pid=8144 comm="sh" capa…
10 type=AVC msg=audit(1158584780.793:711): avc: denied { dac_read_search } for pid=8144 comm="sh" c…
[all …]
Dtest_audit.py21 import sepolgen.audit
73 avc = sepolgen.audit.AVCMessage(audit1)
82 avc = sepolgen.audit.AVCMessage(granted1)
102 avc = sepolgen.audit.AVCMessage(xperms1)
110 avc = sepolgen.audit.AVCMessage(xperms_invalid)
118 avc = sepolgen.audit.AVCMessage(xperms_without)
126 avc = sepolgen.audit.AVCMessage(audit1)
150 avc = sepolgen.audit.AVCMessage(audit2)
174 path = sepolgen.audit.PathMessage(path1)
186 a = sepolgen.audit.AuditParser()
[all …]
/external/selinux/python/audit2allow/
Dtest.log1 node=bill.example.com type=AVC_PATH msg=audit(1166045975.667:1128): path="/usr/lib/libGL.so.1.2"
2 type=AVC msg=audit(1166045975.667:1129): avc: denied { write } for comm=local dev=dm-0 name=root.lo…
3audit(1166111074.191:74): item=0 name="/etc/auto.net" inode=16483485 dev=fd:00 mode=0100755 ouid=0…
4 node=bob.example.com type=SYSCALL msg=audit(1166111074.191:74): arch=40000003 syscall=33 success=no…
5 node=bob.example.com type=AVC msg=audit(1166111074.191:74): avc: denied { execute } for pid=1394…
6 node=james.example.com type=SYSCALL msg=audit(1165963069.244:851): arch=40000003 syscall=102 succes…
7 node=james.example.com type=AVC msg=audit(1165963069.244:851): avc: denied { name_bind } for pid…
8 node=tom.example.com type=SYSCALL msg=audit(1165963069.244:852): arch=40000003 syscall=102 success=…
9 node=tom.example.com type=AVC msg=audit(1165963069.244:852): avc: denied { name_connect } for pi…
10 node=mary.example.com type=SYSCALL msg=audit(1166023021.373:910): arch=40000003 syscall=12 success=…
[all …]
Daudit2why25 import sepolgen.audit as audit namespace
99 if options.audit is True or options.boot:
131 parser = audit.AuditParser(last_load_only=self.__options.lastreload)
141 messages = audit.get_dmesg_msgs()
142 elif self.__options.audit:
144 messages = audit.get_audit_msgs()
150 messages = audit.get_audit_boot_msgs()
177 avcfilter = audit.AVCTypeFilter(self.__options.type)
179 csfilter = audit.ComputeSidTypeFilter(self.__options.type)
Daudit2allow25 import sepolgen.audit as audit namespace
99 if options.audit is True or options.boot:
131 parser = audit.AuditParser(last_load_only=self.__options.lastreload)
141 messages = audit.get_dmesg_msgs()
142 elif self.__options.audit:
144 messages = audit.get_audit_msgs()
150 messages = audit.get_audit_boot_msgs()
177 avcfilter = audit.AVCTypeFilter(self.__options.type)
179 csfilter = audit.ComputeSidTypeFilter(self.__options.type)
/external/syzkaller/pkg/report/testdata/linux/report/
D1524 [....] Starting enhanced syslogd: rsyslogd[ 12.037795] audit: type=1400 audit(1515564630.515:5): …
13 syzkaller login: [ 19.781382] audit: type=1400 audit(1515564638.259:6): avc: denied { map } for…
17 [ 26.145521] audit: type=1400 audit(1515564644.623:7): avc: denied { map } for pid=3502 comm="…
18 [ 26.226655] audit: type=1400 audit(1515564644.704:8): avc: denied { map } for pid=3502 comm="…
D2094 [ 29.710797] audit: type=1400 audit(1518457683.474:8): avc: denied { map_create } for pid=4183…
12 [ 29.740690] audit: type=1400 audit(1518457683.474:9): avc: denied { map_read map_write } for …
D844 [ 92.396607] general protection fault: 0000 [#1] [ 387.811073] audit: type=1326 audit(1486238739.…
D13616 [ 62.955431] audit: type=1400 audit(1513230272.694:51): avc: denied { setopt } for pid=11219 c…
D1335 [ 50.655958] audit: type=1326 audit(1512790616.230:84): auid=4294967295 uid=0 gid=0 ses=429496729…
/external/syzkaller/pkg/report/testdata/linux/guilty/
D334 audit: type=1400 audit(1518457683.474:8): avc: denied { map_create } for pid=4183 comm="syzkalle…
12 audit: type=1400 audit(1518457683.474:9): avc: denied { map_read map_write } for pid=4183 comm="…
/external/selinux/python/sepolgen/
DHACKING39 other access vectors - this forms the backbone of how we turn audit
56 Audit Messages (sepolgen.audit)
60 audit system. This is not a general purpose audit parsing library - it
68 deliberately only loosely coupled to the audit parsing to allow
/external/iptables/extensions/
Dlibxt_AUDIT.man1 This target allows to create audit records for packets hitting the target.
6 Set type of audit record.
/external/autotest/client/site_tests/platform_ToolchainOptions/
Dgold_whitelist45 /usr/lib64/audit/sotruss-lib.so
47 /usr/lib/audit/sotruss-lib.so
/external/bcc/tools/
Dcapable_example.txt73 -v, --verbose include non-audit checks
78 ./capable -v # verbose: include non-audit checks
Dcapable.py152 event.cap, name, event.audit))
/external/python/google-api-python-client/samples/audit/
DREADME3 api: audit
/external/iproute2/etc/iproute2/
Dnl_protos12 9 audit
/external/v8/src/trap-handler/
DDEPS1 # In order to make it easier to audit the signal handler code, we use very
/external/strace/xlat/
Daudit_arch.in1 /* linux used to have linux/elf-em.h out of sync with linux/audit.h */
/external/selinux/python/semanage/
Dseobject.py102 import audit
104 audit.audit_close(audit.audit_open())
109 self.audit_fd = audit.audit_open()
126 …self.log_list.append([self.audit_fd, audit.AUDIT_ROLE_ASSIGN, sys.argv[0], str(msg), name, 0, sena…
129 …self.log_list.append([self.audit_fd, audit.AUDIT_ROLE_REMOVE, sys.argv[0], str(msg), name, 0, sena…
132 …self.log_change_list.append([self.audit_fd, audit.AUDIT_USER_MAC_CONFIG_CHANGE, str(msg), "semanag…
136 audit.audit_log_semanage_message(*(l + [success]))
138 audit.audit_log_user_comm_message(*(l + [success]))
2350 …og_change("resrc=fcontext op=add-equal %s %s" % (audit.audit_encode_nv_string("sglob", target, 0),…
2363 …change("resrc=fcontext op=modify-equal %s %s" % (audit.audit_encode_nv_string("sglob", target, 0),…
[all …]
/external/selinux/secilc/docs/
Dcil_access_vector_rules.md127 This example will log an audit event whenever the corresponding [`allow`](cil_access_vector_rules.m…
137 Do not audit the access rights defined when access denied. This stops excessive log entries for kno…
175 This example will not audit the denied access:
323 This example will log an audit event whenever the corresponding [`allowx`](cil_access_vector_rules.…
333 Do not audit the access rights defined when access denied. This stops excessive log entries for kno…
371 This example will not audit the denied access:

1234567