Home
last modified time | relevance | path

Searched refs:audit (Results 1 – 25 of 160) sorted by relevance

1234567

/external/linux-tools-perf/src/tools/perf/scripts/python/Perf-Trace-Util/lib/Perf/Trace/
DUtil.py53 import audit
55 'x86_64': audit.MACH_86_64,
56 'alpha' : audit.MACH_ALPHA,
57 'ia64' : audit.MACH_IA64,
58 'ppc' : audit.MACH_PPC,
59 'ppc64' : audit.MACH_PPC64,
60 's390' : audit.MACH_S390,
61 's390x' : audit.MACH_S390X,
62 'i386' : audit.MACH_X86,
63 'i586' : audit.MACH_X86,
[all …]
/external/selinux/sepolgen/tests/test_data/
Daudit.log1 type=AVC msg=audit(1162850331.422:978): avc: denied { ioctl } for pid=6314 comm="pam_timestamp_c…
2 type=SYSCALL msg=audit(1162850331.422:978): arch=40000003 syscall=54 success=no exit=-22 a0=2 a1=54…
3 type=AVC_PATH msg=audit(1162850331.422:978): path="pipe:[96391]"
4 type=AVC msg=audit(1162850332.318:979): avc: denied { read } for pid=6306 comm="beagled" name=".…
5 type=SYSCALL msg=audit(1162850332.318:979): arch=40000003 syscall=33 success=yes exit=0 a0=bfdb2fde…
6 type=AVC msg=audit(1162850333.186:980): avc: denied { read } for pid=6306 comm="beagled" name="m…
7 type=SYSCALL msg=audit(1162850333.186:980): arch=40000003 syscall=5 success=yes exit=24 a0=11833c a…
8 type=AVC msg=audit(1162850335.022:981): avc: denied { read write } for pid=6336 comm="clock-appl…
9 type=SYSCALL msg=audit(1162850335.022:981): arch=40000003 syscall=5 success=yes exit=13 a0=9c0e840 …
10 type=AVC msg=audit(1162850335.022:982): avc: denied { lock } for pid=6336 comm="clock-applet" na…
[all …]
Dhttpd.log1 type=USER_AVC msg=audit(1163772866.369:8084): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st…
2 type=USER_AVC msg=audit(1163772866.437:8085): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st…
3 type=USER_AVC msg=audit(1163772866.449:8086): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st…
4 type=USER_AVC msg=audit(1163772866.449:8087): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st…
5 type=USER_AVC msg=audit(1163772866.449:8088): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st…
6 type=USER_AVC msg=audit(1163772866.453:8089): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st…
7 type=USER_AVC msg=audit(1163772866.453:8090): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st…
8 type=USER_AVC msg=audit(1163772866.453:8091): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st…
9 type=USER_AVC msg=audit(1163772866.453:8092): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st…
10 type=USER_AVC msg=audit(1163772866.453:8093): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st…
[all …]
Dshort.log1 type=AVC msg=audit(1162850331.422:978): avc: denied { ioctl } for pid=6314 comm="pam_timestamp_c…
2 type=SYSCALL msg=audit(1162850331.422:978): arch=40000003 syscall=54 success=no exit=-22 a0=2 a1=54…
3 type=AVC_PATH msg=audit(1162850331.422:978): path="pipe:[96391]"
4 type=AVC msg=audit(1162850332.318:979): avc: denied { read } for pid=6306 comm="beagled" name=".…
5 type=SYSCALL msg=audit(1162850332.318:979): arch=40000003 syscall=33 success=yes exit=0 a0=bfdb2fde…
6 type=AVC msg=audit(1162850333.186:980): avc: denied { read } for pid=6306 comm="beagled" name="m…
7 type=SYSCALL msg=audit(1162850333.186:980): arch=40000003 syscall=5 success=yes exit=24 a0=11833c a…
8 type=AVC msg=audit(1162850335.022:981): avc: denied { read write } for pid=6336 comm="clock-appl…
9 type=SYSCALL msg=audit(1162850335.022:981): arch=40000003 syscall=5 success=yes exit=13 a0=9c0e840 …
10 type=AVC msg=audit(1162850335.022:982): avc: denied { lock } for pid=6336 comm="clock-applet" na…
[all …]
/external/selinux/sepolgen/tests/
Daudit.txt1 type=AVC msg=audit(1158584779.745:708): avc: denied { dac_read_search } for pid=8132 comm="sh" c…
2 type=SYSCALL msg=audit(1158584779.745:708): arch=40000003 syscall=195 success=no exit=-13 a0=80d243…
3 type=AVC msg=audit(1158584779.753:709): avc: denied { dac_override } for pid=8133 comm="vpnc-scr…
4 type=AVC msg=audit(1158584779.753:709): avc: denied { dac_read_search } for pid=8133 comm="vpnc-…
5 type=SYSCALL msg=audit(1158584779.753:709): arch=40000003 syscall=195 success=no exit=-13 a0=80d243…
6 type=AVC msg=audit(1158584779.825:710): avc: denied { dac_override } for pid=8134 comm="vpnc-scr…
7 type=AVC msg=audit(1158584779.825:710): avc: denied { dac_read_search } for pid=8134 comm="vpnc-…
8 type=SYSCALL msg=audit(1158584779.825:710): arch=40000003 syscall=195 success=no exit=-13 a0=80d243…
9 type=AVC msg=audit(1158584780.793:711): avc: denied { dac_override } for pid=8144 comm="sh" capa…
10 type=AVC msg=audit(1158584780.793:711): avc: denied { dac_read_search } for pid=8144 comm="sh" c…
[all …]
Dtest_audit.py21 import sepolgen.audit
61 avc = sepolgen.audit.AVCMessage(audit1)
69 avc = sepolgen.audit.AVCMessage(granted1)
90 avc = sepolgen.audit.AVCMessage(audit1)
114 avc = sepolgen.audit.AVCMessage(audit2)
138 path = sepolgen.audit.PathMessage(path1)
150 a = sepolgen.audit.AuditParser()
159 a = sepolgen.audit.AuditParser()
167 a = sepolgen.audit.AuditParser()
176 parser = sepolgen.audit.AuditParser()
[all …]
/external/selinux/policycoreutils/audit2allow/
Dtest.log1 node=bill.example.com type=AVC_PATH msg=audit(1166045975.667:1128): path="/usr/lib/libGL.so.1.2"
2 type=AVC msg=audit(1166045975.667:1129): avc: denied { write } for comm=local dev=dm-0 name=root.lo…
3audit(1166111074.191:74): item=0 name="/etc/auto.net" inode=16483485 dev=fd:00 mode=0100755 ouid=0…
4 node=bob.example.com type=SYSCALL msg=audit(1166111074.191:74): arch=40000003 syscall=33 success=no…
5 node=bob.example.com type=AVC msg=audit(1166111074.191:74): avc: denied { execute } for pid=1394…
6 node=james.example.com type=SYSCALL msg=audit(1165963069.244:851): arch=40000003 syscall=102 succes…
7 node=james.example.com type=AVC msg=audit(1165963069.244:851): avc: denied { name_bind } for pid…
8 node=tom.example.com type=SYSCALL msg=audit(1165963069.244:852): arch=40000003 syscall=102 success=…
9 node=tom.example.com type=AVC msg=audit(1165963069.244:852): avc: denied { name_connect } for pi…
10 node=mary.example.com type=SYSCALL msg=audit(1166023021.373:910): arch=40000003 syscall=12 success=…
[all …]
Daudit2why24 import sepolgen.audit as audit namespace
92 if options.audit is True or options.boot:
124 parser = audit.AuditParser(last_load_only=self.__options.lastreload)
134 messages = audit.get_dmesg_msgs()
135 elif self.__options.audit:
137 messages = audit.get_audit_msgs()
143 messages = audit.get_audit_boot_msgs()
170 avcfilter = audit.AVCTypeFilter(self.__options.type)
172 csfilter = audit.ComputeSidTypeFilter(self.__options.type)
Daudit2allow24 import sepolgen.audit as audit namespace
92 if options.audit is True or options.boot:
124 parser = audit.AuditParser(last_load_only=self.__options.lastreload)
134 messages = audit.get_dmesg_msgs()
135 elif self.__options.audit:
137 messages = audit.get_audit_msgs()
143 messages = audit.get_audit_boot_msgs()
170 avcfilter = audit.AVCTypeFilter(self.__options.type)
172 csfilter = audit.ComputeSidTypeFilter(self.__options.type)
/external/selinux/sepolgen/
DHACKING39 other access vectors - this forms the backbone of how we turn audit
56 Audit Messages (sepolgen.audit)
60 audit system. This is not a general purpose audit parsing library - it
68 deliberately only loosely coupled to the audit parsing to allow
DChangeLog18 * audit.py: Handle times in foreign locals for audit2allow -b
33 * audit.py Dont crash if empty data is passed to sepolgen
129 * Merged support for parsing USER_AVC audit messages from Karl MacMillan.
/external/iptables/extensions/
Dlibxt_AUDIT.man1 This target allows to create audit records for packets hitting the target.
6 Set type of audit record.
/external/openssh/
DAndroid.mk205 audit-bsm.c \
206 audit-linux.c \
207 audit.c \
Dconfig.h.in10 /* System only supports IPv4 audit records */
249 /* Define to 1 if you have the <bsm/audit.h> header file. */
718 /* Define to 1 if you have the <linux/audit.h> header file. */
1142 /* Define to 1 if you have the <sys/audit.h> header file. */
1575 /* Use audit debugging module */
1620 /* Use BSM audit module */
1629 /* Use Linux audit module */
1657 /* Define if you want IRIX audit trails */
DREADME.platform79 The BSM audit event range available for third party TCB applications is
Dconfigure.ac400 sys/audit.h \
625 AC_DEFINE([AU_IPv4], [0], [System only supports IPv4 audit records])
626 [#include <bsm/audit.h>]
715 [Define if you want IRIX audit trails])
767 AC_CHECK_HEADERS([linux/seccomp.h linux/filter.h linux/audit.h], [],
1509 AC_ARG_WITH([audit], optwith
1510 [ --with-audit=module Enable audit support (modules=debug,bsm,linux)],
1512 AC_MSG_CHECKING([for supported audit module])
1518 AC_CHECK_HEADERS([bsm/audit.h], [],
1519 [AC_MSG_ERROR([BSM enabled and bsm/audit.h not found])],
[all …]
/external/chromium-trace/trace-viewer/tracing/third_party/components/polymer/
Dbuild.log9 grunt-audit: 1.0.0
/external/chromium-trace/trace-viewer/tracing/third_party/components/webcomponentsjs/
Dbuild.log9 gulp-audit: 1.0.0
/external/llvm/test/Other/
Dcan-execute.txt14 test, but for now this test serves as a reminder to audit all the callers if
/external/selinux/
DREADME5 yum install audit-libs-devel bison bzip2-devel dbus-devel dbus-glib-devel flex flex-devel flex-stat…
/external/sepolicy/tools/sepolicy-analyze/
DREADME18 conditional rules, audit-related rules (auditallow or dontaudit),
/external/selinux/policycoreutils/
DChangeLog207 * semanage: audit message to show what record(s) and item(s) have chaged
722 * Merged unicode-to-string fix for seobject audit from Dan Walsh.
775 * Added newrole audit message on login failure
921 and semanage audit calls from Dan Walsh.
962 * Merged newrole audit patch from Steve Grubb.
1221 settings when analyzing audit messages.
/external/selinux/policycoreutils/semanage/
Dseobject.py77 import audit
80 self.audit_fd = audit.audit_open()
92 …self.log_list.append([self.audit_fd, audit.AUDIT_ROLE_ASSIGN, sys.argv[0], str(msg), name, 0, sena…
95 …self.log_list.append([self.audit_fd, audit.AUDIT_ROLE_REMOVE, sys.argv[0], str(msg), name, 0, sena…
99 audit.audit_log_semanage_message(*(l + [success]))
/external/libnl/lib/
Dutils.c448 __ADD(NETLINK_AUDIT,audit)
/external/clang/docs/
DDataFlowSanitizerDesign.rst25 one can audit how a sensitive data item is used within a program and

1234567