Home
last modified time | relevance | path

Searched refs:audit (Results 1 – 16 of 16) sorted by relevance

/security/apparmor/
Ddomain.c106 perms.audit = perms.quiet = perms.kill = 0; in change_profile_perms()
376 goto audit; in apparmor_bprm_set_creds()
405 goto audit; in apparmor_bprm_set_creds()
417 goto audit; in apparmor_bprm_set_creds()
470 goto audit; in apparmor_bprm_set_creds()
481 goto audit; in apparmor_bprm_set_creds()
515 audit: in apparmor_bprm_set_creds()
636 goto audit; in aa_change_hat()
679 goto audit; in aa_change_hat()
687 goto audit; in aa_change_hat()
[all …]
Dfile.c124 u32 mask = perms->audit; in aa_audit_file()
208 perms.audit = map_old_perms(dfa_user_audit(dfa, state)); in compute_perms()
213 perms.audit = map_old_perms(dfa_other_audit(dfa, state)); in compute_perms()
370 goto audit; in aa_path_link()
376 goto audit; in aa_path_link()
384 goto audit; in aa_path_link()
393 lperms.audit = perms.audit; in aa_path_link()
399 goto audit; in aa_path_link()
418 goto audit; in aa_path_link()
424 goto audit; in aa_path_link()
[all …]
Dcapability.c80 !cap_raised(profile->caps.audit, cap))) in audit_caps()
132 int aa_capable(struct aa_profile *profile, int cap, int audit) in aa_capable() argument
136 if (!audit) { in aa_capable()
DMakefile5 apparmor-y := apparmorfs.o audit.o capability.o context.o ipc.o lib.o match.o \
Dlsm.c140 int cap, int audit) in apparmor_capable() argument
144 int error = cap_capable(cred, ns, cap, audit); in apparmor_capable()
148 error = aa_capable(profile, cap, audit); in apparmor_capable()
714 module_param_call(audit, param_set_audit, param_get_audit,
Dpolicy_unpack.c531 profile->audit = AUDIT_ALL; in unpack_profile()
545 if (!unpack_u32(e, &(profile->caps.audit.cap[0]), NULL)) in unpack_profile()
556 if (!unpack_u32(e, &(profile->caps.audit.cap[1]), NULL)) in unpack_profile()
/security/integrity/
Dintegrity_audit.c23 unsigned long audit; in integrity_audit_setup() local
25 if (!kstrtoul(str, 0, &audit)) in integrity_audit_setup()
26 integrity_audit_info = audit ? 1 : 0; in integrity_audit_setup()
DKconfig11 extension and audit measurement log support.
/security/apparmor/include/
Dcapability.h33 kernel_cap_t audit; member
41 int aa_capable(struct aa_profile *profile, int cap, int audit);
Dfile.h89 u32 audit; member
97 #define COMBINED_PERM_MASK(X) ((X).allow | (X).audit | (X).quiet | (X).kill)
Dpolicy.h211 enum audit_mode audit; member
403 return profile->audit; in AUDIT_MODE()
/security/tomoyo/
DKconfig29 int "Default maximal count for audit log"
35 audit logs that the kernel can hold on memory.
36 You can read the log via /sys/kernel/security/tomoyo/audit.
37 If you don't need audit logs, you may set this value to 0.
DMakefile1 obj-y = audit.o common.o condition.o domain.o environ.o file.o gc.o group.o load_policy.o memory.o …
/security/integrity/ima/
DKconfig81 list, integrity appraisal and audit log. The compiled default
/security/
Dcommoncap.c81 int cap, int audit) in cap_capable() argument
/security/selinux/
Dhooks.c1550 int cap, int audit) in cred_has_capability() argument
1577 if (audit == SECURITY_CAP_AUDIT) { in cred_has_capability()
2059 int cap, int audit) in selinux_capable() argument
2063 rc = cap_capable(cred, ns, cap, audit); in selinux_capable()
2067 return cred_has_capability(cred, cap, audit); in selinux_capable()