Searched refs:audit (Results 1 - 25 of 207) sorted by relevance

123456789

/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/arch/x86/ia32/
H A DMakefile12 audit-class-$(CONFIG_AUDIT) := audit.o
13 obj-$(CONFIG_IA32_EMULATION) += $(audit-class-y)
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/arch/x86/ia32/
H A DMakefile12 audit-class-$(CONFIG_AUDIT) := audit.o
13 obj-$(CONFIG_IA32_EMULATION) += $(audit-class-y)
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/security/apparmor/include/
H A Dcapability.h24 * @audit: caps that are to be audited
31 kernel_cap_t audit; member in struct:aa_caps
38 int audit);
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/security/apparmor/include/
H A Dcapability.h24 * @audit: caps that are to be audited
31 kernel_cap_t audit; member in struct:aa_caps
38 int audit);
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/security/integrity/ima/
H A Dima_audit.c15 #include <linux/audit.h>
25 unsigned long audit; local
27 if (!strict_strtoul(str, 0, &audit))
28 ima_audit = audit ? 1 : 0;
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/security/integrity/ima/
H A Dima_audit.c15 #include <linux/audit.h>
25 unsigned long audit; local
27 if (!strict_strtoul(str, 0, &audit))
28 ima_audit = audit ? 1 : 0;
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/security/apparmor/
H A Dcapability.c23 #include "include/audit.h"
38 * audit_cb - call back for capability components of audit struct
39 * @ab - audit buffer (NOT NULL)
40 * @va - audit struct to audit data from (NOT NULL)
50 * audit_caps - audit a capability
56 * Do auditing of capability and handle, audit/complain/kill modes switching
76 !cap_raised(profile->caps.audit, cap)))
123 * @audit: whether an audit recor
129 aa_capable(struct task_struct *task, struct aa_profile *profile, int cap, int audit) argument
[all...]
H A Ddomain.c23 #include "include/audit.h"
112 perms.audit = perms.quiet = perms.kill = 0;
383 goto audit;
407 goto audit;
418 goto audit;
459 goto audit;
469 goto audit;
507 audit:
620 goto audit;
658 goto audit;
[all...]
H A Dfile.c16 #include "include/audit.h"
61 * file_audit_cb - call back for file specific audit fields
63 * @va: audit struct to audit values of (NOT NULL)
120 u32 mask = perms->audit;
201 perms.audit = map_old_perms(dfa_user_audit(dfa, state));
206 perms.audit = map_old_perms(dfa_other_audit(dfa, state));
258 * aa_path_perm - do permissions check & audit for @path
365 goto audit;
370 goto audit;
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/security/apparmor/
H A Dcapability.c23 #include "include/audit.h"
38 * audit_cb - call back for capability components of audit struct
39 * @ab - audit buffer (NOT NULL)
40 * @va - audit struct to audit data from (NOT NULL)
50 * audit_caps - audit a capability
56 * Do auditing of capability and handle, audit/complain/kill modes switching
76 !cap_raised(profile->caps.audit, cap)))
123 * @audit: whether an audit recor
129 aa_capable(struct task_struct *task, struct aa_profile *profile, int cap, int audit) argument
[all...]
H A Ddomain.c23 #include "include/audit.h"
112 perms.audit = perms.quiet = perms.kill = 0;
383 goto audit;
407 goto audit;
418 goto audit;
459 goto audit;
469 goto audit;
507 audit:
620 goto audit;
658 goto audit;
[all...]
H A Dfile.c16 #include "include/audit.h"
61 * file_audit_cb - call back for file specific audit fields
63 * @va: audit struct to audit values of (NOT NULL)
120 u32 mask = perms->audit;
201 perms.audit = map_old_perms(dfa_user_audit(dfa, state));
206 perms.audit = map_old_perms(dfa_other_audit(dfa, state));
258 * aa_path_perm - do permissions check & audit for @path
365 goto audit;
370 goto audit;
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/net/netlabel/
H A Dnetlabel_user.h37 #include <linux/audit.h>
45 * netlbl_netlink_auditinfo - Fetch the audit information from a NETLINK msg
47 * @audit_info: NetLabel audit information
H A Dnetlabel_user.c35 #include <linux/audit.h>
87 * netlbl_audit_start_common - Start an audit message
88 * @type: audit message type
89 * @audit_info: NetLabel audit information
92 * Start an audit message using the type specified in @type and fill the audit
93 * message with some fields common to all NetLabel audit messages. Returns
94 * a pointer to the audit buffer on success, NULL on failure.
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/net/netlabel/
H A Dnetlabel_user.h37 #include <linux/audit.h>
45 * netlbl_netlink_auditinfo - Fetch the audit information from a NETLINK msg
47 * @audit_info: NetLabel audit information
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.0.25b/source/lib/replace/system/
H A Dpasswd.h55 #include <sys/audit.h>
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.5.8/lib/replace/system/
H A Dpasswd.h62 #include <sys/audit.h>
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/lib/
H A Daudit.c3 #include <linux/audit.h>
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/lib/
H A Daudit.c3 #include <linux/audit.h>
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/arch/ia64/kernel/
H A Daudit.c3 #include <linux/audit.h>
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/arch/ia64/kernel/
H A Daudit.c3 #include <linux/audit.h>
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.0.25b/source/lib/replace/system/
H A Dpasswd.h55 #include <sys/audit.h>
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.5.8/lib/replace/system/
H A Dpasswd.h62 #include <sys/audit.h>
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.0.25b/source/lib/replace/system/
H A Dpasswd.h55 #include <sys/audit.h>
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.5.8/lib/replace/system/
H A Dpasswd.h62 #include <sys/audit.h>

Completed in 194 milliseconds

123456789