-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Stephen Smalley wrote: > On Tue, 2008-01-08 at 14:26 -0500, Daniel J Walsh wrote: > I want to make this code available to audit2why/audit2allow, > setroubleshoot and potentially system-config-selinux. > > I have two questions, > > > Is there a way for audit2why to figure out whether an AVC would be > dontaudited by the current policy? > >> The avd returned by sepol_compute_av_reason() includes all of the access >> vectors. avd.auditdeny is the set of permissions that would be audited >> if denied, i.e. the complement of the dontaudit rules. Something like if >> (~avd.auditdeny & av) then printf("would be dontaudit'd"); > > If we add audit2why python bindings should I put it in libselinux? > sepolgen? > > > Attached .h file describes functions and constants. > >> I'm not sure what you are doing - auditwhy presently is a program that >> links in the static libsepol, since the libsepol interfaces being used >> by it are not provided by the shared libsepol (as they aren't properly >> encapsulated). > What is the field sepol_access_vector_t decided; used for? -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.8 (GNU/Linux) Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org iEYEARECAAYFAkeE+mUACgkQrlYvE4MpobPkWQCgp3+WVMNygNHiU64LRDFCT5NX fzcAoJMxAFFyVivV9d8v7YjMrAPRDkdM =/yN7 -----END PGP SIGNATURE----- -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with the words "unsubscribe selinux" without quotes as the message.