/external/linux-tools-perf/src/tools/perf/scripts/python/Perf-Trace-Util/lib/Perf/Trace/ |
D | Util.py | 53 import audit 55 'x86_64': audit.MACH_86_64, 56 'alpha' : audit.MACH_ALPHA, 57 'ia64' : audit.MACH_IA64, 58 'ppc' : audit.MACH_PPC, 59 'ppc64' : audit.MACH_PPC64, 60 's390' : audit.MACH_S390, 61 's390x' : audit.MACH_S390X, 62 'i386' : audit.MACH_X86, 63 'i586' : audit.MACH_X86, [all …]
|
/external/selinux/sepolgen/tests/test_data/ |
D | audit.log | 1 type=AVC msg=audit(1162850331.422:978): avc: denied { ioctl } for pid=6314 comm="pam_timestamp_c… 2 type=SYSCALL msg=audit(1162850331.422:978): arch=40000003 syscall=54 success=no exit=-22 a0=2 a1=54… 3 type=AVC_PATH msg=audit(1162850331.422:978): path="pipe:[96391]" 4 type=AVC msg=audit(1162850332.318:979): avc: denied { read } for pid=6306 comm="beagled" name=".… 5 type=SYSCALL msg=audit(1162850332.318:979): arch=40000003 syscall=33 success=yes exit=0 a0=bfdb2fde… 6 type=AVC msg=audit(1162850333.186:980): avc: denied { read } for pid=6306 comm="beagled" name="m… 7 type=SYSCALL msg=audit(1162850333.186:980): arch=40000003 syscall=5 success=yes exit=24 a0=11833c a… 8 type=AVC msg=audit(1162850335.022:981): avc: denied { read write } for pid=6336 comm="clock-appl… 9 type=SYSCALL msg=audit(1162850335.022:981): arch=40000003 syscall=5 success=yes exit=13 a0=9c0e840 … 10 type=AVC msg=audit(1162850335.022:982): avc: denied { lock } for pid=6336 comm="clock-applet" na… [all …]
|
D | httpd.log | 1 type=USER_AVC msg=audit(1163772866.369:8084): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st… 2 type=USER_AVC msg=audit(1163772866.437:8085): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st… 3 type=USER_AVC msg=audit(1163772866.449:8086): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st… 4 type=USER_AVC msg=audit(1163772866.449:8087): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st… 5 type=USER_AVC msg=audit(1163772866.449:8088): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st… 6 type=USER_AVC msg=audit(1163772866.453:8089): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st… 7 type=USER_AVC msg=audit(1163772866.453:8090): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st… 8 type=USER_AVC msg=audit(1163772866.453:8091): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st… 9 type=USER_AVC msg=audit(1163772866.453:8092): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st… 10 type=USER_AVC msg=audit(1163772866.453:8093): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st… [all …]
|
D | short.log | 1 type=AVC msg=audit(1162850331.422:978): avc: denied { ioctl } for pid=6314 comm="pam_timestamp_c… 2 type=SYSCALL msg=audit(1162850331.422:978): arch=40000003 syscall=54 success=no exit=-22 a0=2 a1=54… 3 type=AVC_PATH msg=audit(1162850331.422:978): path="pipe:[96391]" 4 type=AVC msg=audit(1162850332.318:979): avc: denied { read } for pid=6306 comm="beagled" name=".… 5 type=SYSCALL msg=audit(1162850332.318:979): arch=40000003 syscall=33 success=yes exit=0 a0=bfdb2fde… 6 type=AVC msg=audit(1162850333.186:980): avc: denied { read } for pid=6306 comm="beagled" name="m… 7 type=SYSCALL msg=audit(1162850333.186:980): arch=40000003 syscall=5 success=yes exit=24 a0=11833c a… 8 type=AVC msg=audit(1162850335.022:981): avc: denied { read write } for pid=6336 comm="clock-appl… 9 type=SYSCALL msg=audit(1162850335.022:981): arch=40000003 syscall=5 success=yes exit=13 a0=9c0e840 … 10 type=AVC msg=audit(1162850335.022:982): avc: denied { lock } for pid=6336 comm="clock-applet" na… [all …]
|
/external/selinux/sepolgen/tests/ |
D | audit.txt | 1 type=AVC msg=audit(1158584779.745:708): avc: denied { dac_read_search } for pid=8132 comm="sh" c… 2 type=SYSCALL msg=audit(1158584779.745:708): arch=40000003 syscall=195 success=no exit=-13 a0=80d243… 3 type=AVC msg=audit(1158584779.753:709): avc: denied { dac_override } for pid=8133 comm="vpnc-scr… 4 type=AVC msg=audit(1158584779.753:709): avc: denied { dac_read_search } for pid=8133 comm="vpnc-… 5 type=SYSCALL msg=audit(1158584779.753:709): arch=40000003 syscall=195 success=no exit=-13 a0=80d243… 6 type=AVC msg=audit(1158584779.825:710): avc: denied { dac_override } for pid=8134 comm="vpnc-scr… 7 type=AVC msg=audit(1158584779.825:710): avc: denied { dac_read_search } for pid=8134 comm="vpnc-… 8 type=SYSCALL msg=audit(1158584779.825:710): arch=40000003 syscall=195 success=no exit=-13 a0=80d243… 9 type=AVC msg=audit(1158584780.793:711): avc: denied { dac_override } for pid=8144 comm="sh" capa… 10 type=AVC msg=audit(1158584780.793:711): avc: denied { dac_read_search } for pid=8144 comm="sh" c… [all …]
|
D | test_audit.py | 21 import sepolgen.audit 61 avc = sepolgen.audit.AVCMessage(audit1) 69 avc = sepolgen.audit.AVCMessage(granted1) 90 avc = sepolgen.audit.AVCMessage(audit1) 114 avc = sepolgen.audit.AVCMessage(audit2) 138 path = sepolgen.audit.PathMessage(path1) 150 a = sepolgen.audit.AuditParser() 159 a = sepolgen.audit.AuditParser() 167 a = sepolgen.audit.AuditParser() 176 parser = sepolgen.audit.AuditParser() [all …]
|
/external/selinux/policycoreutils/audit2allow/ |
D | test.log | 1 node=bill.example.com type=AVC_PATH msg=audit(1166045975.667:1128): path="/usr/lib/libGL.so.1.2" 2 type=AVC msg=audit(1166045975.667:1129): avc: denied { write } for comm=local dev=dm-0 name=root.lo… 3 …audit(1166111074.191:74): item=0 name="/etc/auto.net" inode=16483485 dev=fd:00 mode=0100755 ouid=0… 4 node=bob.example.com type=SYSCALL msg=audit(1166111074.191:74): arch=40000003 syscall=33 success=no… 5 node=bob.example.com type=AVC msg=audit(1166111074.191:74): avc: denied { execute } for pid=1394… 6 node=james.example.com type=SYSCALL msg=audit(1165963069.244:851): arch=40000003 syscall=102 succes… 7 node=james.example.com type=AVC msg=audit(1165963069.244:851): avc: denied { name_bind } for pid… 8 node=tom.example.com type=SYSCALL msg=audit(1165963069.244:852): arch=40000003 syscall=102 success=… 9 node=tom.example.com type=AVC msg=audit(1165963069.244:852): avc: denied { name_connect } for pi… 10 node=mary.example.com type=SYSCALL msg=audit(1166023021.373:910): arch=40000003 syscall=12 success=… [all …]
|
D | audit2why | 24 import sepolgen.audit as audit namespace 92 if options.audit is True or options.boot: 124 parser = audit.AuditParser(last_load_only=self.__options.lastreload) 134 messages = audit.get_dmesg_msgs() 135 elif self.__options.audit: 137 messages = audit.get_audit_msgs() 143 messages = audit.get_audit_boot_msgs() 170 avcfilter = audit.AVCTypeFilter(self.__options.type) 172 csfilter = audit.ComputeSidTypeFilter(self.__options.type)
|
D | audit2allow | 24 import sepolgen.audit as audit namespace 92 if options.audit is True or options.boot: 124 parser = audit.AuditParser(last_load_only=self.__options.lastreload) 134 messages = audit.get_dmesg_msgs() 135 elif self.__options.audit: 137 messages = audit.get_audit_msgs() 143 messages = audit.get_audit_boot_msgs() 170 avcfilter = audit.AVCTypeFilter(self.__options.type) 172 csfilter = audit.ComputeSidTypeFilter(self.__options.type)
|
/external/selinux/sepolgen/ |
D | HACKING | 39 other access vectors - this forms the backbone of how we turn audit 56 Audit Messages (sepolgen.audit) 60 audit system. This is not a general purpose audit parsing library - it 68 deliberately only loosely coupled to the audit parsing to allow
|
D | ChangeLog | 18 * audit.py: Handle times in foreign locals for audit2allow -b 33 * audit.py Dont crash if empty data is passed to sepolgen 129 * Merged support for parsing USER_AVC audit messages from Karl MacMillan.
|
/external/iptables/extensions/ |
D | libxt_AUDIT.man | 1 This target allows to create audit records for packets hitting the target. 6 Set type of audit record.
|
/external/openssh/ |
D | Android.mk | 205 audit-bsm.c \ 206 audit-linux.c \ 207 audit.c \
|
D | config.h.in | 10 /* System only supports IPv4 audit records */ 249 /* Define to 1 if you have the <bsm/audit.h> header file. */ 718 /* Define to 1 if you have the <linux/audit.h> header file. */ 1142 /* Define to 1 if you have the <sys/audit.h> header file. */ 1575 /* Use audit debugging module */ 1620 /* Use BSM audit module */ 1629 /* Use Linux audit module */ 1657 /* Define if you want IRIX audit trails */
|
D | README.platform | 79 The BSM audit event range available for third party TCB applications is
|
D | configure.ac | 400 sys/audit.h \ 625 AC_DEFINE([AU_IPv4], [0], [System only supports IPv4 audit records]) 626 [#include <bsm/audit.h>] 715 [Define if you want IRIX audit trails]) 767 AC_CHECK_HEADERS([linux/seccomp.h linux/filter.h linux/audit.h], [], 1509 AC_ARG_WITH([audit], optwith 1510 [ --with-audit=module Enable audit support (modules=debug,bsm,linux)], 1512 AC_MSG_CHECKING([for supported audit module]) 1518 AC_CHECK_HEADERS([bsm/audit.h], [], 1519 [AC_MSG_ERROR([BSM enabled and bsm/audit.h not found])], [all …]
|
/external/chromium-trace/trace-viewer/tracing/third_party/components/polymer/ |
D | build.log | 9 grunt-audit: 1.0.0
|
/external/chromium-trace/trace-viewer/tracing/third_party/components/webcomponentsjs/ |
D | build.log | 9 gulp-audit: 1.0.0
|
/external/llvm/test/Other/ |
D | can-execute.txt | 14 test, but for now this test serves as a reminder to audit all the callers if
|
/external/selinux/ |
D | README | 5 yum install audit-libs-devel bison bzip2-devel dbus-devel dbus-glib-devel flex flex-devel flex-stat…
|
/external/sepolicy/tools/sepolicy-analyze/ |
D | README | 18 conditional rules, audit-related rules (auditallow or dontaudit),
|
/external/selinux/policycoreutils/ |
D | ChangeLog | 207 * semanage: audit message to show what record(s) and item(s) have chaged 722 * Merged unicode-to-string fix for seobject audit from Dan Walsh. 775 * Added newrole audit message on login failure 921 and semanage audit calls from Dan Walsh. 962 * Merged newrole audit patch from Steve Grubb. 1221 settings when analyzing audit messages.
|
/external/selinux/policycoreutils/semanage/ |
D | seobject.py | 77 import audit 80 self.audit_fd = audit.audit_open() 92 …self.log_list.append([self.audit_fd, audit.AUDIT_ROLE_ASSIGN, sys.argv[0], str(msg), name, 0, sena… 95 …self.log_list.append([self.audit_fd, audit.AUDIT_ROLE_REMOVE, sys.argv[0], str(msg), name, 0, sena… 99 audit.audit_log_semanage_message(*(l + [success]))
|
/external/libnl/lib/ |
D | utils.c | 448 __ADD(NETLINK_AUDIT,audit)
|
/external/clang/docs/ |
D | DataFlowSanitizerDesign.rst | 25 one can audit how a sensitive data item is used within a program and
|