Home
last modified time | relevance | path

Searched refs:audit (Results 1 – 15 of 15) sorted by relevance

/security/apparmor/
Ddomain.c112 perms.audit = perms.quiet = perms.kill = 0; in change_profile_perms()
382 goto audit; in apparmor_bprm_set_creds()
411 goto audit; in apparmor_bprm_set_creds()
423 goto audit; in apparmor_bprm_set_creds()
474 goto audit; in apparmor_bprm_set_creds()
485 goto audit; in apparmor_bprm_set_creds()
523 audit: in apparmor_bprm_set_creds()
644 goto audit; in aa_change_hat()
682 goto audit; in aa_change_hat()
689 goto audit; in aa_change_hat()
[all …]
Dfile.c124 u32 mask = perms->audit; in aa_audit_file()
208 perms.audit = map_old_perms(dfa_user_audit(dfa, state)); in compute_perms()
213 perms.audit = map_old_perms(dfa_other_audit(dfa, state)); in compute_perms()
370 goto audit; in aa_path_link()
376 goto audit; in aa_path_link()
384 goto audit; in aa_path_link()
393 lperms.audit = perms.audit; in aa_path_link()
399 goto audit; in aa_path_link()
418 goto audit; in aa_path_link()
424 goto audit; in aa_path_link()
[all …]
Dcapability.c78 !cap_raised(profile->caps.audit, cap))) in audit_caps()
132 int audit) in aa_capable() argument
136 if (!audit) { in aa_capable()
Dpolicy.c1075 goto audit; in aa_replace_profiles()
1092 goto audit; in aa_replace_profiles()
1098 goto audit; in aa_replace_profiles()
1102 goto audit; in aa_replace_profiles()
1104 audit: in aa_replace_profiles()
DMakefile5 apparmor-y := apparmorfs.o audit.o capability.o context.o ipc.o lib.o match.o \
Dlsm.c140 int cap, int audit) in apparmor_capable() argument
144 int error = cap_capable(cred, ns, cap, audit); in apparmor_capable()
148 error = aa_capable(current, profile, cap, audit); in apparmor_capable()
711 module_param_call(audit, param_set_audit, param_get_audit,
Dpolicy_unpack.c519 profile->audit = AUDIT_ALL; in unpack_profile()
533 if (!unpack_u32(e, &(profile->caps.audit.cap[0]), NULL)) in unpack_profile()
544 if (!unpack_u32(e, &(profile->caps.audit.cap[1]), NULL)) in unpack_profile()
/security/integrity/ima/
Dima_audit.c23 unsigned long audit; in ima_audit_setup() local
25 if (!strict_strtoul(str, 0, &audit)) in ima_audit_setup()
26 ima_audit = audit ? 1 : 0; in ima_audit_setup()
/security/apparmor/include/
Dcapability.h31 kernel_cap_t audit; member
38 int audit);
Dpolicy.h188 enum audit_mode audit; member
313 return profile->audit; in AUDIT_MODE()
Dfile.h89 u32 audit; member
97 #define COMBINED_PERM_MASK(X) ((X).allow | (X).audit | (X).quiet | (X).kill)
/security/tomoyo/
DKconfig29 int "Default maximal count for audit log"
35 audit logs that the kernel can hold on memory.
36 You can read the log via /sys/kernel/security/tomoyo/audit.
37 If you don't need audit logs, you may set this value to 0.
DMakefile1 obj-y = audit.o common.o condition.o domain.o environ.o file.o gc.o group.o load_policy.o memory.o …
/security/
Dcommoncap.c81 int cap, int audit) in cap_capable() argument
/security/selinux/
Dhooks.c1501 int cap, int audit) in cred_has_capability() argument
1528 if (audit == SECURITY_CAP_AUDIT) { in cred_has_capability()
1999 int cap, int audit) in selinux_capable() argument
2003 rc = cap_capable(cred, ns, cap, audit); in selinux_capable()
2007 return cred_has_capability(cred, cap, audit); in selinux_capable()