Searched refs:audit (Results 1 – 15 of 15) sorted by relevance
/security/apparmor/ |
D | domain.c | 112 perms.audit = perms.quiet = perms.kill = 0; in change_profile_perms() 382 goto audit; in apparmor_bprm_set_creds() 411 goto audit; in apparmor_bprm_set_creds() 423 goto audit; in apparmor_bprm_set_creds() 474 goto audit; in apparmor_bprm_set_creds() 485 goto audit; in apparmor_bprm_set_creds() 523 audit: in apparmor_bprm_set_creds() 644 goto audit; in aa_change_hat() 682 goto audit; in aa_change_hat() 689 goto audit; in aa_change_hat() [all …]
|
D | file.c | 124 u32 mask = perms->audit; in aa_audit_file() 208 perms.audit = map_old_perms(dfa_user_audit(dfa, state)); in compute_perms() 213 perms.audit = map_old_perms(dfa_other_audit(dfa, state)); in compute_perms() 370 goto audit; in aa_path_link() 376 goto audit; in aa_path_link() 384 goto audit; in aa_path_link() 393 lperms.audit = perms.audit; in aa_path_link() 399 goto audit; in aa_path_link() 418 goto audit; in aa_path_link() 424 goto audit; in aa_path_link() [all …]
|
D | capability.c | 78 !cap_raised(profile->caps.audit, cap))) in audit_caps() 132 int audit) in aa_capable() argument 136 if (!audit) { in aa_capable()
|
D | policy.c | 1075 goto audit; in aa_replace_profiles() 1092 goto audit; in aa_replace_profiles() 1098 goto audit; in aa_replace_profiles() 1102 goto audit; in aa_replace_profiles() 1104 audit: in aa_replace_profiles()
|
D | Makefile | 5 apparmor-y := apparmorfs.o audit.o capability.o context.o ipc.o lib.o match.o \
|
D | lsm.c | 140 int cap, int audit) in apparmor_capable() argument 144 int error = cap_capable(cred, ns, cap, audit); in apparmor_capable() 148 error = aa_capable(current, profile, cap, audit); in apparmor_capable() 711 module_param_call(audit, param_set_audit, param_get_audit,
|
D | policy_unpack.c | 519 profile->audit = AUDIT_ALL; in unpack_profile() 533 if (!unpack_u32(e, &(profile->caps.audit.cap[0]), NULL)) in unpack_profile() 544 if (!unpack_u32(e, &(profile->caps.audit.cap[1]), NULL)) in unpack_profile()
|
/security/integrity/ima/ |
D | ima_audit.c | 23 unsigned long audit; in ima_audit_setup() local 25 if (!strict_strtoul(str, 0, &audit)) in ima_audit_setup() 26 ima_audit = audit ? 1 : 0; in ima_audit_setup()
|
/security/apparmor/include/ |
D | capability.h | 31 kernel_cap_t audit; member 38 int audit);
|
D | policy.h | 188 enum audit_mode audit; member 313 return profile->audit; in AUDIT_MODE()
|
D | file.h | 89 u32 audit; member 97 #define COMBINED_PERM_MASK(X) ((X).allow | (X).audit | (X).quiet | (X).kill)
|
/security/tomoyo/ |
D | Kconfig | 29 int "Default maximal count for audit log" 35 audit logs that the kernel can hold on memory. 36 You can read the log via /sys/kernel/security/tomoyo/audit. 37 If you don't need audit logs, you may set this value to 0.
|
D | Makefile | 1 obj-y = audit.o common.o condition.o domain.o environ.o file.o gc.o group.o load_policy.o memory.o …
|
/security/ |
D | commoncap.c | 81 int cap, int audit) in cap_capable() argument
|
/security/selinux/ |
D | hooks.c | 1501 int cap, int audit) in cred_has_capability() argument 1528 if (audit == SECURITY_CAP_AUDIT) { in cred_has_capability() 1999 int cap, int audit) in selinux_capable() argument 2003 rc = cap_capable(cred, ns, cap, audit); in selinux_capable() 2007 return cred_has_capability(cred, cap, audit); in selinux_capable()
|