On Tue, 2008-01-08 at 14:26 -0500, Daniel J Walsh wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > I want to make this code available to audit2why/audit2allow, > setroubleshoot and potentially system-config-selinux. > > I have two questions, > > > Is there a way for audit2why to figure out whether an AVC would be > dontaudited by the current policy? The avd returned by sepol_compute_av_reason() includes all of the access vectors. avd.auditdeny is the set of permissions that would be audited if denied, i.e. the complement of the dontaudit rules. Something like if (~avd.auditdeny & av) then printf("would be dontaudit'd"); > If we add audit2why python bindings should I put it in libselinux? > sepolgen? > > > Attached .h file describes functions and constants. I'm not sure what you are doing - auditwhy presently is a program that links in the static libsepol, since the libsepol interfaces being used by it are not provided by the shared libsepol (as they aren't properly encapsulated). > > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v1.4.8 (GNU/Linux) > Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org > > iEYEARECAAYFAkeDzlcACgkQrlYvE4MpobPCjwCgueX3P6iolC2wjwhRGoYRR5pT > S98An21rXxPf//hNoP1iDivDJw9AlhsL > =cTHu > -----END PGP SIGNATURE----- -- Stephen Smalley National Security Agency -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with the words "unsubscribe selinux" without quotes as the message.