Home
last modified time | relevance | path

Searched refs:audit (Results 26 – 50 of 116) sorted by relevance

12345

/openbmc/openbmc/poky/meta/recipes-extended/pam/
H A Dlibpam_1.6.0.bb48 PACKAGECONFIG[audit] = "--enable-audit,--disable-audit,audit,"
/openbmc/linux/drivers/comedi/
H A DTODO5 - audit userspace interface
/openbmc/linux/security/apparmor/
H A Dlib.c316 perms->audit = ALL_PERMS_MASK; in aa_apply_modes_to_perms()
322 perms->audit = 0; in aa_apply_modes_to_perms()
397 request &= perms->audit; in aa_check_perms()
H A Dnet.c246 if (rules->secmark[i].audit) in aa_secmark_perm()
247 perms.audit = ALL_PERMS_MASK; in aa_secmark_perm()
H A DMakefile6 apparmor-y := apparmorfs.o audit.o capability.o task.o ipc.o lib.o match.o \
H A Dcapability.c77 !cap_raised(rules->caps.audit, cap))) in audit_caps()
H A Dpolicy_unpack.c583 if (!unpack_u8(e, &rules->secmark[i].audit, NULL)) in unpack_secmark()
659 aa_unpack_u32(e, &perm->audit, NULL) && in unpack_perm()
916 profile->audit = AUDIT_ALL; in unpack_profile()
932 if (!aa_unpack_cap_low(e, &rules->caps.audit, NULL)) in unpack_profile()
944 if (!aa_unpack_cap_high(e, &rules->caps.audit, NULL)) in unpack_profile()
/openbmc/openbmc/meta-security/recipes-ids/samhain/
H A Dsamhain.inc47 ${@bb.utils.contains('DISTRO_FEATURES', 'selinux', 'selinux audit', '', d)} \
59 PACKAGECONFIG[audit] = "ac_cv_header_auparse_h=yes,ac_cv_header_auparse_h=no,audit"
/openbmc/linux/security/tomoyo/
H A DMakefile2 obj-y = audit.o common.o condition.o domain.o environ.o file.o gc.o group.o load_policy.o memory.o …
/openbmc/openbmc/poky/meta/recipes-extended/shadow/
H A Dshadow.inc75 PACKAGECONFIG[audit] = "--with-audit,--without-audit,audit"
/openbmc/openbmc/meta-security/dynamic-layers/meta-perl/recipes-security/bastille/files/
H A Dconfig41 # Q: ICMP services to audit: [ ]
69 # Q: TCP services to audit: [telnet ftp imap pop3 finger sunrpc exec login linuxconf ssh]
75 # Q: UDP services to audit: [31337]
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-core/dbus/
H A Ddbus-broker_32.bb18 DEPENDS += " ${@bb.utils.contains('DISTRO_FEATURES', 'selinux', 'audit (>= 3.0)', '', d)}"
/openbmc/linux/security/apparmor/include/
H A Dpolicy.h205 enum audit_mode audit; member
370 return profile->audit; in AUDIT_MODE()
H A Dnet.h84 u8 audit; member
H A Dfile.h109 #define COMBINED_PERM_MASK(X) ((X).allow | (X).audit | (X).quiet | (X).kill)
/openbmc/openbmc/poky/meta/recipes-devtools/binutils/binutils/
H A D0012-Only-generate-an-RPATH-entry-if-LD_RUN_PATH-is-not-e.patch30 @@ -1805,6 +1808,8 @@ ldelf_before_allocation (char *audit, char *depaudit,
/openbmc/linux/tools/perf/
H A Dcommand-list.txt34 perf-trace mainporcelain audit
/openbmc/linux/arch/ia64/kernel/
H A DMakefile31 obj-$(CONFIG_AUDIT) += audit.o
/openbmc/linux/arch/parisc/kernel/
H A DMakefile33 obj-$(CONFIG_AUDIT) += audit.o
/openbmc/openbmc/meta-openembedded/meta-gnome/recipes-gnome/gdm/
H A Dgdm_46.0.bb7 audit \
/openbmc/openbmc/meta-security/dynamic-layers/meta-python/recipes-security/mfa/
H A Dpython3-privacyidea_3.9.1.bb1 SUMMARY = "identity, multifactor authentication (OTP), authorization, audit"
/openbmc/linux/arch/s390/kernel/
H A DMakefile54 obj-$(CONFIG_AUDIT) += audit.o
/openbmc/openbmc/poky/meta/recipes-core/dbus/
H A Ddbus_1.14.10.bb41 PACKAGECONFIG[audit] = "--enable-libaudit,--disable-libaudit,audit"
/openbmc/openbmc/poky/meta/recipes-devtools/rpm/
H A Drpm_4.19.1.1.bb77 PACKAGECONFIG[audit] = "-DWITH_AUDIT=ON,-DWITH_AUDIT=OFF,audit"
/openbmc/linux/include/net/iucv/
H A Diucv.h117 u32 audit; member

12345