Searched refs:audit (Results 1 – 25 of 164) sorted by relevance
1234567
/external/selinux/python/sepolgen/tests/test_data/ |
D | audit.log | 1 type=AVC msg=audit(1162850331.422:978): avc: denied { ioctl } for pid=6314 comm="pam_timestamp_c… 2 type=SYSCALL msg=audit(1162850331.422:978): arch=40000003 syscall=54 success=no exit=-22 a0=2 a1=54… 3 type=AVC_PATH msg=audit(1162850331.422:978): path="pipe:[96391]" 4 type=AVC msg=audit(1162850332.318:979): avc: denied { read } for pid=6306 comm="beagled" name=".… 5 type=SYSCALL msg=audit(1162850332.318:979): arch=40000003 syscall=33 success=yes exit=0 a0=bfdb2fde… 6 type=AVC msg=audit(1162850333.186:980): avc: denied { read } for pid=6306 comm="beagled" name="m… 7 type=SYSCALL msg=audit(1162850333.186:980): arch=40000003 syscall=5 success=yes exit=24 a0=11833c a… 8 type=AVC msg=audit(1162850335.022:981): avc: denied { read write } for pid=6336 comm="clock-appl… 9 type=SYSCALL msg=audit(1162850335.022:981): arch=40000003 syscall=5 success=yes exit=13 a0=9c0e840 … 10 type=AVC msg=audit(1162850335.022:982): avc: denied { lock } for pid=6336 comm="clock-applet" na… [all …]
|
D | httpd.log | 1 type=USER_AVC msg=audit(1163772866.369:8084): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st… 2 type=USER_AVC msg=audit(1163772866.437:8085): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st… 3 type=USER_AVC msg=audit(1163772866.449:8086): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st… 4 type=USER_AVC msg=audit(1163772866.449:8087): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st… 5 type=USER_AVC msg=audit(1163772866.449:8088): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st… 6 type=USER_AVC msg=audit(1163772866.453:8089): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st… 7 type=USER_AVC msg=audit(1163772866.453:8090): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st… 8 type=USER_AVC msg=audit(1163772866.453:8091): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st… 9 type=USER_AVC msg=audit(1163772866.453:8092): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st… 10 type=USER_AVC msg=audit(1163772866.453:8093): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st… [all …]
|
D | short.log | 1 type=AVC msg=audit(1162850331.422:978): avc: denied { ioctl } for pid=6314 comm="pam_timestamp_c… 2 type=SYSCALL msg=audit(1162850331.422:978): arch=40000003 syscall=54 success=no exit=-22 a0=2 a1=54… 3 type=AVC_PATH msg=audit(1162850331.422:978): path="pipe:[96391]" 4 type=AVC msg=audit(1162850332.318:979): avc: denied { read } for pid=6306 comm="beagled" name=".… 5 type=SYSCALL msg=audit(1162850332.318:979): arch=40000003 syscall=33 success=yes exit=0 a0=bfdb2fde… 6 type=AVC msg=audit(1162850333.186:980): avc: denied { read } for pid=6306 comm="beagled" name="m… 7 type=SYSCALL msg=audit(1162850333.186:980): arch=40000003 syscall=5 success=yes exit=24 a0=11833c a… 8 type=AVC msg=audit(1162850335.022:981): avc: denied { read write } for pid=6336 comm="clock-appl… 9 type=SYSCALL msg=audit(1162850335.022:981): arch=40000003 syscall=5 success=yes exit=13 a0=9c0e840 … 10 type=AVC msg=audit(1162850335.022:982): avc: denied { lock } for pid=6336 comm="clock-applet" na… [all …]
|
/external/selinux/python/sepolgen/tests/ |
D | audit.txt | 1 type=AVC msg=audit(1158584779.745:708): avc: denied { dac_read_search } for pid=8132 comm="sh" c… 2 type=SYSCALL msg=audit(1158584779.745:708): arch=40000003 syscall=195 success=no exit=-13 a0=80d243… 3 type=AVC msg=audit(1158584779.753:709): avc: denied { dac_override } for pid=8133 comm="vpnc-scr… 4 type=AVC msg=audit(1158584779.753:709): avc: denied { dac_read_search } for pid=8133 comm="vpnc-… 5 type=SYSCALL msg=audit(1158584779.753:709): arch=40000003 syscall=195 success=no exit=-13 a0=80d243… 6 type=AVC msg=audit(1158584779.825:710): avc: denied { dac_override } for pid=8134 comm="vpnc-scr… 7 type=AVC msg=audit(1158584779.825:710): avc: denied { dac_read_search } for pid=8134 comm="vpnc-… 8 type=SYSCALL msg=audit(1158584779.825:710): arch=40000003 syscall=195 success=no exit=-13 a0=80d243… 9 type=AVC msg=audit(1158584780.793:711): avc: denied { dac_override } for pid=8144 comm="sh" capa… 10 type=AVC msg=audit(1158584780.793:711): avc: denied { dac_read_search } for pid=8144 comm="sh" c… [all …]
|
D | test_audit.py | 21 import sepolgen.audit 73 avc = sepolgen.audit.AVCMessage(audit1) 82 avc = sepolgen.audit.AVCMessage(granted1) 102 avc = sepolgen.audit.AVCMessage(xperms1) 110 avc = sepolgen.audit.AVCMessage(xperms_invalid) 118 avc = sepolgen.audit.AVCMessage(xperms_without) 126 avc = sepolgen.audit.AVCMessage(audit1) 150 avc = sepolgen.audit.AVCMessage(audit2) 174 path = sepolgen.audit.PathMessage(path1) 186 a = sepolgen.audit.AuditParser() [all …]
|
/external/selinux/python/audit2allow/ |
D | test.log | 1 node=bill.example.com type=AVC_PATH msg=audit(1166045975.667:1128): path="/usr/lib/libGL.so.1.2" 2 type=AVC msg=audit(1166045975.667:1129): avc: denied { write } for comm=local dev=dm-0 name=root.lo… 3 …audit(1166111074.191:74): item=0 name="/etc/auto.net" inode=16483485 dev=fd:00 mode=0100755 ouid=0… 4 node=bob.example.com type=SYSCALL msg=audit(1166111074.191:74): arch=40000003 syscall=33 success=no… 5 node=bob.example.com type=AVC msg=audit(1166111074.191:74): avc: denied { execute } for pid=1394… 6 node=james.example.com type=SYSCALL msg=audit(1165963069.244:851): arch=40000003 syscall=102 succes… 7 node=james.example.com type=AVC msg=audit(1165963069.244:851): avc: denied { name_bind } for pid… 8 node=tom.example.com type=SYSCALL msg=audit(1165963069.244:852): arch=40000003 syscall=102 success=… 9 node=tom.example.com type=AVC msg=audit(1165963069.244:852): avc: denied { name_connect } for pi… 10 node=mary.example.com type=SYSCALL msg=audit(1166023021.373:910): arch=40000003 syscall=12 success=… [all …]
|
D | audit2why | 25 import sepolgen.audit as audit namespace 99 if options.audit is True or options.boot: 131 parser = audit.AuditParser(last_load_only=self.__options.lastreload) 141 messages = audit.get_dmesg_msgs() 142 elif self.__options.audit: 144 messages = audit.get_audit_msgs() 150 messages = audit.get_audit_boot_msgs() 177 avcfilter = audit.AVCTypeFilter(self.__options.type) 179 csfilter = audit.ComputeSidTypeFilter(self.__options.type)
|
D | audit2allow | 25 import sepolgen.audit as audit namespace 99 if options.audit is True or options.boot: 131 parser = audit.AuditParser(last_load_only=self.__options.lastreload) 141 messages = audit.get_dmesg_msgs() 142 elif self.__options.audit: 144 messages = audit.get_audit_msgs() 150 messages = audit.get_audit_boot_msgs() 177 avcfilter = audit.AVCTypeFilter(self.__options.type) 179 csfilter = audit.ComputeSidTypeFilter(self.__options.type)
|
/external/syzkaller/pkg/report/testdata/linux/report/ |
D | 152 | 4 [....] Starting enhanced syslogd: rsyslogd[ 12.037795] audit: type=1400 audit(1515564630.515:5): … 13 syzkaller login: [ 19.781382] audit: type=1400 audit(1515564638.259:6): avc: denied { map } for… 17 [ 26.145521] audit: type=1400 audit(1515564644.623:7): avc: denied { map } for pid=3502 comm="… 18 [ 26.226655] audit: type=1400 audit(1515564644.704:8): avc: denied { map } for pid=3502 comm="…
|
D | 209 | 4 [ 29.710797] audit: type=1400 audit(1518457683.474:8): avc: denied { map_create } for pid=4183… 12 [ 29.740690] audit: type=1400 audit(1518457683.474:9): avc: denied { map_read map_write } for …
|
D | 84 | 4 [ 92.396607] general protection fault: 0000 [#1] [ 387.811073] audit: type=1326 audit(1486238739.…
|
D | 136 | 16 [ 62.955431] audit: type=1400 audit(1513230272.694:51): avc: denied { setopt } for pid=11219 c…
|
D | 133 | 5 [ 50.655958] audit: type=1326 audit(1512790616.230:84): auid=4294967295 uid=0 gid=0 ses=429496729…
|
/external/syzkaller/pkg/report/testdata/linux/guilty/ |
D | 33 | 4 audit: type=1400 audit(1518457683.474:8): avc: denied { map_create } for pid=4183 comm="syzkalle… 12 audit: type=1400 audit(1518457683.474:9): avc: denied { map_read map_write } for pid=4183 comm="…
|
/external/selinux/python/sepolgen/ |
D | HACKING | 39 other access vectors - this forms the backbone of how we turn audit 56 Audit Messages (sepolgen.audit) 60 audit system. This is not a general purpose audit parsing library - it 68 deliberately only loosely coupled to the audit parsing to allow
|
/external/iptables/extensions/ |
D | libxt_AUDIT.man | 1 This target allows to create audit records for packets hitting the target. 6 Set type of audit record.
|
/external/autotest/client/site_tests/platform_ToolchainOptions/ |
D | gold_whitelist | 45 /usr/lib64/audit/sotruss-lib.so 47 /usr/lib/audit/sotruss-lib.so
|
/external/bcc/tools/ |
D | capable_example.txt | 73 -v, --verbose include non-audit checks 78 ./capable -v # verbose: include non-audit checks
|
D | capable.py | 152 event.cap, name, event.audit))
|
/external/python/google-api-python-client/samples/audit/ |
D | README | 3 api: audit
|
/external/iproute2/etc/iproute2/ |
D | nl_protos | 12 9 audit
|
/external/v8/src/trap-handler/ |
D | DEPS | 1 # In order to make it easier to audit the signal handler code, we use very
|
/external/strace/xlat/ |
D | audit_arch.in | 1 /* linux used to have linux/elf-em.h out of sync with linux/audit.h */
|
/external/selinux/python/semanage/ |
D | seobject.py | 102 import audit 104 audit.audit_close(audit.audit_open()) 109 self.audit_fd = audit.audit_open() 126 …self.log_list.append([self.audit_fd, audit.AUDIT_ROLE_ASSIGN, sys.argv[0], str(msg), name, 0, sena… 129 …self.log_list.append([self.audit_fd, audit.AUDIT_ROLE_REMOVE, sys.argv[0], str(msg), name, 0, sena… 132 …self.log_change_list.append([self.audit_fd, audit.AUDIT_USER_MAC_CONFIG_CHANGE, str(msg), "semanag… 136 audit.audit_log_semanage_message(*(l + [success])) 138 audit.audit_log_user_comm_message(*(l + [success])) 2350 …og_change("resrc=fcontext op=add-equal %s %s" % (audit.audit_encode_nv_string("sglob", target, 0),… 2363 …change("resrc=fcontext op=modify-equal %s %s" % (audit.audit_encode_nv_string("sglob", target, 0),… [all …]
|
/external/selinux/secilc/docs/ |
D | cil_access_vector_rules.md | 127 This example will log an audit event whenever the corresponding [`allow`](cil_access_vector_rules.m… 137 Do not audit the access rights defined when access denied. This stops excessive log entries for kno… 175 This example will not audit the denied access: 323 This example will log an audit event whenever the corresponding [`allowx`](cil_access_vector_rules.… 333 Do not audit the access rights defined when access denied. This stops excessive log entries for kno… 371 This example will not audit the denied access:
|
1234567