-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Stephen Smalley wrote: > On Tue, 2008-01-08 at 14:26 -0500, Daniel J Walsh wrote: > I want to make this code available to audit2why/audit2allow, > setroubleshoot and potentially system-config-selinux. > > I have two questions, > > > Is there a way for audit2why to figure out whether an AVC would be > dontaudited by the current policy? > >> The avd returned by sepol_compute_av_reason() includes all of the access >> vectors. avd.auditdeny is the set of permissions that would be audited >> if denied, i.e. the complement of the dontaudit rules. Something like if >> (~avd.auditdeny & av) then printf("would be dontaudit'd"); > > If we add audit2why python bindings should I put it in libselinux? > sepolgen? > > > Attached .h file describes functions and constants. > >> I'm not sure what you are doing - auditwhy presently is a program that >> links in the static libsepol, since the libsepol interfaces being used >> by it are not provided by the shared libsepol (as they aren't properly >> encapsulated). > I want to be able to take an AVC message and tell why it happened. I want to do this by analyzing the online policy. If a boolean exists that would have allowed the behaviour I want to tell the user this. I also want to use the commands myself, to analyze multiple policies. Tell me if this AVC effects RHEL5, FC7, FC8, Rawhide I guess we can link against the libsepol.a file when building it. I don;t really care to use C against these functions, so making a C Library interface is not that important to me. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.8 (GNU/Linux) Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org iEYEARECAAYFAkeD46cACgkQrlYvE4MpobPmNACfaVVi6FqCApczQ+UvYDfvSAAD O7cAniCzP9cmESmBGm9FXblXZXOOqYCW =rlEW -----END PGP SIGNATURE----- -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with the words "unsubscribe selinux" without quotes as the message.