Searched refs:semodule (Results 1 – 11 of 11) sorted by relevance
11 SEMODULE_OBJS = semodule.o13 all: semodule genhomedircon15 semodule: $(SEMODULE_OBJS) target19 ln -sf semodule genhomedircon23 install -m 755 semodule $(SBINDIR)24 (cd $(SBINDIR); ln -sf semodule genhomedircon)26 install -m 644 semodule.8 $(MANDIR)/man8/32 -rm -f semodule *.o genhomedircon
10 ../semodule/semodule.c43 ../gui/templates/semodule.py66 ../sepolicy/sepolicy/templates/semodule.py
10 semodule/semodule.c54 sepolicy/sepolicy/templates/semodule.py
36 ../semodule/semodule.c \80 ../sepolicy/sepolicy/templates/semodule.py \
7 semodule/semodule
20 * Add a store root path in semodule, from Yuli Khodorkovskiy27 * Deprecate base/upgrade/version in semodule. Calling these commands will37 * Add -P semodule option to man page from Dan Walsh.105 * Replace genhomedircon script with a link to semodule from Dan Walsh.176 * semodule: Add -N qualifier to no reload kernel policy260 * semodule: Document semodule -p in man page339 * semodule: support for alternative root paths425 * Change semodule upgrade behavior to install even if the module461 * Re-enable disable_dontaudit rules upon semodule -B from Christopher490 * semodule: use new interfaces in libsemanage for compressed files[all …]
1 …cy newrole run_init sandbox secon audit2allow sestatus semodule_package semodule semodule_link sem…
24 * Add semodule option to set store root path in semanage.conf and the25 semodule command, from Yuli Khodorkovskiy152 * Change semodule upgrade behavior to install even if the module218 using semodule from Joshua Brindle.
6973 …37.513:12841): avc: denied { execute } for pid=13625 comm="sh" name="semodule" dev=dm-0 ino=103…6975 …76437.513:12842): avc: denied { read } for pid=13625 comm="sh" name="semodule" dev=dm-0 ino=103…6977 …843): avc: denied { execute_no_trans } for pid=13626 comm="sh" name="semodule" dev=dm-0 ino=103…6978 … euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="semodule" exe="/usr/sbin/semodule" sub…6979 type=AVC_PATH msg=audit(1163776437.513:12843): path="/usr/sbin/semodule"6980 type=AVC msg=audit(1163776437.553:12844): avc: denied { execute } for pid=13626 comm="semodule" …6981 … euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="semodule" exe="/usr/sbin/semodule" sub…6982 …37.605:12845): avc: denied { read write search } for pid=13626 comm="semodule" name="active" de…6983 … euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="semodule" exe="/usr/sbin/semodule" sub…6984 …37.625:12846): avc: denied { read write search } for pid=13626 comm="semodule" name="modules" d…[all …]
1109 …for semodule, button in [ ("unconfined", self.disable_unconfined_button), ("permissivedomains", se…1110 if semodule in self.cust_dict["module"]:1111 button.set_active(self.cust_dict["module"][semodule]["enabled"])
85 * Preserve tunables when required by semodule program.