/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/security/apparmor/ |
H A D | audit.c | 15 #include <linux/audit.h> 19 #include "include/audit.h" 95 * Currently AppArmor auditing is fed straight into the audit framework. 100 * system control of whether user audit messages go to system log 105 * @ab: audit buffer to fill (NOT NULL) 106 * @ca: audit structure containing data to audit (NOT NULL) 108 * Record common AppArmor audit data from @sa 154 * aa_audit_msg - Log a message to the audit subsystem 155 * @sa: audit even [all...] |
H A D | policy.c | 887 * Returns: the error to be returned after audit is done 973 goto audit; 990 goto audit; 996 goto audit; 1000 goto audit; 1002 audit: 1100 /* don't fail removal if audit fails */
|
H A D | lsm.c | 24 #include <linux/audit.h> 29 #include "include/audit.h" 139 int cap, int audit) 143 int error = cap_capable(task, cred, cap, audit); 147 error = aa_capable(task, profile, cap, audit); 717 module_param_call(audit, param_set_audit, param_get_audit, 720 /* Determines if audit header is included in audited messages. This 721 * provides more context if the audit daemon is not running 138 apparmor_capable(struct task_struct *task, const struct cred *cred, int cap, int audit) argument
|
H A D | policy_unpack.c | 25 #include "include/audit.h" 69 /* audit callback for unpack fields */ 83 * audit_iface - do audit message for policy unpacking/load/replace/remove 465 * NOTE: unpack profile sets audit struct if there is a failure 502 /* per profile debug flags (complain, audit) */ 516 profile->audit = AUDIT_ALL; 530 if (!unpack_u32(e, &(profile->caps.audit.cap[0]), NULL)) 541 if (!unpack_u32(e, &(profile->caps.audit.cap[1]), NULL))
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/security/integrity/ima/ |
H A D | ima.h | 25 #include <linux/audit.h> 142 /* LSM based policy rules require audit */
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/include/linux/ |
H A D | lsm_audit.h | 19 #include <linux/audit.h> 27 /* Auxiliary data to use in generating the audit record. */ 144 /* Initialize an LSM audit data structure. */
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/arch/s390/kernel/ |
H A D | Makefile | 39 obj-$(CONFIG_AUDIT) += audit.o
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/security/apparmor/ |
H A D | audit.c | 15 #include <linux/audit.h> 19 #include "include/audit.h" 95 * Currently AppArmor auditing is fed straight into the audit framework. 100 * system control of whether user audit messages go to system log 105 * @ab: audit buffer to fill (NOT NULL) 106 * @ca: audit structure containing data to audit (NOT NULL) 108 * Record common AppArmor audit data from @sa 154 * aa_audit_msg - Log a message to the audit subsystem 155 * @sa: audit even [all...] |
H A D | policy.c | 887 * Returns: the error to be returned after audit is done 973 goto audit; 990 goto audit; 996 goto audit; 1000 goto audit; 1002 audit: 1100 /* don't fail removal if audit fails */
|
H A D | lsm.c | 24 #include <linux/audit.h> 29 #include "include/audit.h" 139 int cap, int audit) 143 int error = cap_capable(task, cred, cap, audit); 147 error = aa_capable(task, profile, cap, audit); 717 module_param_call(audit, param_set_audit, param_get_audit, 720 /* Determines if audit header is included in audited messages. This 721 * provides more context if the audit daemon is not running 138 apparmor_capable(struct task_struct *task, const struct cred *cred, int cap, int audit) argument
|
H A D | policy_unpack.c | 25 #include "include/audit.h" 69 /* audit callback for unpack fields */ 83 * audit_iface - do audit message for policy unpacking/load/replace/remove 465 * NOTE: unpack profile sets audit struct if there is a failure 502 /* per profile debug flags (complain, audit) */ 516 profile->audit = AUDIT_ALL; 530 if (!unpack_u32(e, &(profile->caps.audit.cap[0]), NULL)) 541 if (!unpack_u32(e, &(profile->caps.audit.cap[1]), NULL))
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/security/integrity/ima/ |
H A D | ima.h | 25 #include <linux/audit.h> 142 /* LSM based policy rules require audit */
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/include/linux/ |
H A D | lsm_audit.h | 19 #include <linux/audit.h> 27 /* Auxiliary data to use in generating the audit record. */ 144 /* Initialize an LSM audit data structure. */
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/arch/s390/kernel/ |
H A D | Makefile | 39 obj-$(CONFIG_AUDIT) += audit.o
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/arch/microblaze/kernel/ |
H A D | ptrace.c | 33 #include <linux/audit.h>
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/arch/microblaze/kernel/ |
H A D | ptrace.c | 33 #include <linux/audit.h>
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/include/net/iucv/ |
H A D | iucv.h | 106 * audit: 32 bit error information of purged or replied messages 116 u32 audit; member in struct:iucv_message
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/security/selinux/ |
H A D | nlmsgtab.c | 20 #include <linux/audit.h>
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/kernel/ |
H A D | audit.h | 0 /* audit -- definition of audit_context structure and supporting types 23 #include <linux/audit.h> 37 * No syscall-specific audit records can 51 * time, and always write out the audit 108 /* audit watch functions */
|
H A D | Makefile | 73 obj-$(CONFIG_AUDIT) += audit.o auditfilter.o
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/security/selinux/ |
H A D | nlmsgtab.c | 20 #include <linux/audit.h>
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/include/net/iucv/ |
H A D | iucv.h | 106 * audit: 32 bit error information of purged or replied messages 116 u32 audit; member in struct:iucv_message
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/kernel/ |
H A D | audit.h | 0 /* audit -- definition of audit_context structure and supporting types 23 #include <linux/audit.h> 37 * No syscall-specific audit records can 51 * time, and always write out the audit 108 /* audit watch functions */
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/net/netlabel/ |
H A D | netlabel_addrlist.c | 42 #include <linux/audit.h> 315 * @audit_buf: audit buffer 348 * @audit_buf: audit buffer
|
H A D | netlabel_addrlist.h | 39 #include <linux/audit.h>
|