/Linux-v4.19/tools/perf/scripts/python/Perf-Trace-Util/lib/Perf/Trace/ |
D | Util.py | 54 import audit 56 'x86_64': audit.MACH_86_64, 57 'alpha' : audit.MACH_ALPHA, 58 'ia64' : audit.MACH_IA64, 59 'ppc' : audit.MACH_PPC, 60 'ppc64' : audit.MACH_PPC64, 61 'ppc64le' : audit.MACH_PPC64LE, 62 's390' : audit.MACH_S390, 63 's390x' : audit.MACH_S390X, 64 'i386' : audit.MACH_X86, [all …]
|
/Linux-v4.19/security/apparmor/ |
D | capability.c | 79 !cap_raised(profile->caps.audit, cap))) in audit_caps() 118 static int profile_capable(struct aa_profile *profile, int cap, int audit, in profile_capable() argument 129 if (audit == SECURITY_CAP_NOAUDIT) { in profile_capable() 151 int aa_capable(struct aa_label *label, int cap, int audit) in aa_capable() argument 159 profile_capable(profile, cap, audit, &sa)); in aa_capable()
|
D | lib.c | 296 perms->audit = ALL_PERMS_MASK; in aa_apply_modes_to_perms() 302 perms->audit = 0; in aa_apply_modes_to_perms() 332 .audit = dfa_user_audit(dfa, state), in aa_compute_perms() 340 perms->audit |= map_other(dfa_other_audit(dfa, state)); in aa_compute_perms() 354 accum->audit |= addend->audit & addend->allow; in aa_perms_accum_raw() 373 accum->audit |= addend->audit & accum->allow; in aa_perms_accum() 440 request &= perms->audit; in aa_check_perms()
|
D | file.c | 124 u32 mask = perms->audit; in aa_audit_file() 240 perms.audit = map_old_perms(dfa_user_audit(dfa, state)); in aa_compute_fperms() 245 perms.audit = map_old_perms(dfa_other_audit(dfa, state)); in aa_compute_fperms() 384 goto audit; in profile_path_link() 390 goto audit; in profile_path_link() 398 goto audit; in profile_path_link() 407 lperms.audit = perms.audit; in profile_path_link() 414 goto audit; in profile_path_link() 433 goto audit; in profile_path_link() 439 goto audit; in profile_path_link() [all …]
|
D | mount.c | 143 u32 mask = perms->audit; in audit_mount() 176 if (data && (perms->audit & AA_AUDIT_DATA)) in audit_mount() 221 .audit = dfa_user_audit(dfa, state), in compute_mnt_perms() 338 goto audit; in match_mnt_path_str() 343 goto audit; in match_mnt_path_str() 352 goto audit; in match_mnt_path_str() 356 audit: in match_mnt_path_str() 573 goto audit; in profile_umount() 582 audit: in profile_umount() 633 goto audit; in build_pivotroot() [all …]
|
D | domain.c | 297 perms->audit = perms->quiet = perms->kill = 0; in change_profile_perms() 645 goto audit; in profile_transition() 667 goto audit; in profile_transition() 685 goto audit; in profile_transition() 719 goto audit; in profile_transition() 732 audit: in profile_transition() 777 goto audit; in profile_onexec() 784 goto audit; in profile_onexec() 795 goto audit; in profile_onexec() 808 audit: in profile_onexec() [all …]
|
D | Makefile | 6 apparmor-y := apparmorfs.o audit.o capability.o task.o ipc.o lib.o match.o \
|
/Linux-v4.19/arch/x86/ia32/ |
D | Makefile | 9 audit-class-$(CONFIG_AUDIT) := audit.o 10 obj-$(CONFIG_IA32_EMULATION) += $(audit-class-y)
|
/Linux-v4.19/security/integrity/ |
D | integrity_audit.c | 23 unsigned long audit; in integrity_audit_setup() local 25 if (!kstrtoul(str, 0, &audit)) in integrity_audit_setup() 26 integrity_audit_info = audit ? 1 : 0; in integrity_audit_setup()
|
D | Kconfig | 11 extension and audit measurement log support.
|
/Linux-v4.19/security/apparmor/include/ |
D | capability.h | 34 kernel_cap_t audit; member 43 int aa_capable(struct aa_label *label, int cap, int audit);
|
D | policy.h | 143 enum audit_mode audit; member 293 return profile->audit; in AUDIT_MODE()
|
D | perms.h | 72 u32 audit; /* set only when allow is set */ member
|
D | file.h | 110 #define COMBINED_PERM_MASK(X) ((X).allow | (X).audit | (X).quiet | (X).kill)
|
/Linux-v4.19/security/tomoyo/ |
D | Kconfig | 31 int "Default maximal count for audit log" 37 audit logs that the kernel can hold on memory. 38 You can read the log via /sys/kernel/security/tomoyo/audit. 39 If you don't need audit logs, you may set this value to 0.
|
D | Makefile | 2 obj-y = audit.o common.o condition.o domain.o environ.o file.o gc.o group.o load_policy.o memory.o …
|
/Linux-v4.19/arch/sparc/kernel/ |
D | Makefile | 113 obj-$(CONFIG_AUDIT) += audit.o 114 audit--$(CONFIG_AUDIT) := compat_audit.o 115 obj-$(CONFIG_COMPAT) += $(audit--y)
|
/Linux-v4.19/drivers/staging/comedi/ |
D | TODO | 5 - audit userspace interface
|
/Linux-v4.19/kernel/ |
D | capability.c | 366 static bool ns_capable_common(struct user_namespace *ns, int cap, bool audit) in ns_capable_common() argument 375 capable = audit ? security_capable(current_cred(), ns, cap) : in ns_capable_common()
|
/Linux-v4.19/tools/perf/ |
D | command-list.txt | 32 perf-trace mainporcelain audit
|
/Linux-v4.19/arch/parisc/kernel/ |
D | Makefile | 28 obj-$(CONFIG_AUDIT) += audit.o
|
/Linux-v4.19/drivers/staging/android/ |
D | TODO | 5 - audit userspace interfaces to make sure they are sane
|
/Linux-v4.19/arch/ia64/kernel/ |
D | Makefile | 33 obj-$(CONFIG_AUDIT) += audit.o
|
/Linux-v4.19/arch/s390/kernel/ |
D | Makefile | 61 obj-$(CONFIG_AUDIT) += audit.o
|
/Linux-v4.19/fs/notify/ |
D | fdinfo.c | 160 if (group->fanotify_data.audit) in fanotify_show_fdinfo()
|