/security/apparmor/ |
D | domain.c | 106 perms.audit = perms.quiet = perms.kill = 0; in change_profile_perms() 376 goto audit; in apparmor_bprm_set_creds() 405 goto audit; in apparmor_bprm_set_creds() 417 goto audit; in apparmor_bprm_set_creds() 470 goto audit; in apparmor_bprm_set_creds() 481 goto audit; in apparmor_bprm_set_creds() 515 audit: in apparmor_bprm_set_creds() 636 goto audit; in aa_change_hat() 679 goto audit; in aa_change_hat() 687 goto audit; in aa_change_hat() [all …]
|
D | file.c | 124 u32 mask = perms->audit; in aa_audit_file() 208 perms.audit = map_old_perms(dfa_user_audit(dfa, state)); in compute_perms() 213 perms.audit = map_old_perms(dfa_other_audit(dfa, state)); in compute_perms() 370 goto audit; in aa_path_link() 376 goto audit; in aa_path_link() 384 goto audit; in aa_path_link() 393 lperms.audit = perms.audit; in aa_path_link() 399 goto audit; in aa_path_link() 418 goto audit; in aa_path_link() 424 goto audit; in aa_path_link() [all …]
|
D | capability.c | 80 !cap_raised(profile->caps.audit, cap))) in audit_caps() 132 int aa_capable(struct aa_profile *profile, int cap, int audit) in aa_capable() argument 136 if (!audit) { in aa_capable()
|
D | Makefile | 5 apparmor-y := apparmorfs.o audit.o capability.o context.o ipc.o lib.o match.o \
|
D | lsm.c | 140 int cap, int audit) in apparmor_capable() argument 144 int error = cap_capable(cred, ns, cap, audit); in apparmor_capable() 148 error = aa_capable(profile, cap, audit); in apparmor_capable() 714 module_param_call(audit, param_set_audit, param_get_audit,
|
D | policy_unpack.c | 531 profile->audit = AUDIT_ALL; in unpack_profile() 545 if (!unpack_u32(e, &(profile->caps.audit.cap[0]), NULL)) in unpack_profile() 556 if (!unpack_u32(e, &(profile->caps.audit.cap[1]), NULL)) in unpack_profile()
|
/security/integrity/ |
D | integrity_audit.c | 23 unsigned long audit; in integrity_audit_setup() local 25 if (!kstrtoul(str, 0, &audit)) in integrity_audit_setup() 26 integrity_audit_info = audit ? 1 : 0; in integrity_audit_setup()
|
D | Kconfig | 11 extension and audit measurement log support.
|
/security/apparmor/include/ |
D | capability.h | 33 kernel_cap_t audit; member 41 int aa_capable(struct aa_profile *profile, int cap, int audit);
|
D | file.h | 89 u32 audit; member 97 #define COMBINED_PERM_MASK(X) ((X).allow | (X).audit | (X).quiet | (X).kill)
|
D | policy.h | 211 enum audit_mode audit; member 403 return profile->audit; in AUDIT_MODE()
|
/security/tomoyo/ |
D | Kconfig | 29 int "Default maximal count for audit log" 35 audit logs that the kernel can hold on memory. 36 You can read the log via /sys/kernel/security/tomoyo/audit. 37 If you don't need audit logs, you may set this value to 0.
|
D | Makefile | 1 obj-y = audit.o common.o condition.o domain.o environ.o file.o gc.o group.o load_policy.o memory.o …
|
/security/integrity/ima/ |
D | Kconfig | 81 list, integrity appraisal and audit log. The compiled default
|
/security/ |
D | commoncap.c | 81 int cap, int audit) in cap_capable() argument
|
/security/selinux/ |
D | hooks.c | 1550 int cap, int audit) in cred_has_capability() argument 1577 if (audit == SECURITY_CAP_AUDIT) { in cred_has_capability() 2059 int cap, int audit) in selinux_capable() argument 2063 rc = cap_capable(cred, ns, cap, audit); in selinux_capable() 2067 return cred_has_capability(cred, cap, audit); in selinux_capable()
|