/openbmc/openbmc/poky/meta/recipes-extended/pam/ |
H A D | libpam_1.6.0.bb | 48 PACKAGECONFIG[audit] = "--enable-audit,--disable-audit,audit,"
|
/openbmc/linux/drivers/comedi/ |
H A D | TODO | 5 - audit userspace interface
|
/openbmc/linux/security/apparmor/ |
H A D | lib.c | 316 perms->audit = ALL_PERMS_MASK; in aa_apply_modes_to_perms() 322 perms->audit = 0; in aa_apply_modes_to_perms() 397 request &= perms->audit; in aa_check_perms()
|
H A D | net.c | 246 if (rules->secmark[i].audit) in aa_secmark_perm() 247 perms.audit = ALL_PERMS_MASK; in aa_secmark_perm()
|
H A D | Makefile | 6 apparmor-y := apparmorfs.o audit.o capability.o task.o ipc.o lib.o match.o \
|
H A D | capability.c | 77 !cap_raised(rules->caps.audit, cap))) in audit_caps()
|
H A D | policy_unpack.c | 583 if (!unpack_u8(e, &rules->secmark[i].audit, NULL)) in unpack_secmark() 659 aa_unpack_u32(e, &perm->audit, NULL) && in unpack_perm() 916 profile->audit = AUDIT_ALL; in unpack_profile() 932 if (!aa_unpack_cap_low(e, &rules->caps.audit, NULL)) in unpack_profile() 944 if (!aa_unpack_cap_high(e, &rules->caps.audit, NULL)) in unpack_profile()
|
/openbmc/openbmc/meta-security/recipes-ids/samhain/ |
H A D | samhain.inc | 47 ${@bb.utils.contains('DISTRO_FEATURES', 'selinux', 'selinux audit', '', d)} \ 59 PACKAGECONFIG[audit] = "ac_cv_header_auparse_h=yes,ac_cv_header_auparse_h=no,audit"
|
/openbmc/linux/security/tomoyo/ |
H A D | Makefile | 2 obj-y = audit.o common.o condition.o domain.o environ.o file.o gc.o group.o load_policy.o memory.o …
|
/openbmc/openbmc/poky/meta/recipes-extended/shadow/ |
H A D | shadow.inc | 75 PACKAGECONFIG[audit] = "--with-audit,--without-audit,audit"
|
/openbmc/openbmc/meta-security/dynamic-layers/meta-perl/recipes-security/bastille/files/ |
H A D | config | 41 # Q: ICMP services to audit: [ ] 69 # Q: TCP services to audit: [telnet ftp imap pop3 finger sunrpc exec login linuxconf ssh] 75 # Q: UDP services to audit: [31337]
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-core/dbus/ |
H A D | dbus-broker_32.bb | 18 DEPENDS += " ${@bb.utils.contains('DISTRO_FEATURES', 'selinux', 'audit (>= 3.0)', '', d)}"
|
/openbmc/linux/security/apparmor/include/ |
H A D | policy.h | 205 enum audit_mode audit; member 370 return profile->audit; in AUDIT_MODE()
|
H A D | net.h | 84 u8 audit; member
|
H A D | file.h | 109 #define COMBINED_PERM_MASK(X) ((X).allow | (X).audit | (X).quiet | (X).kill)
|
/openbmc/openbmc/poky/meta/recipes-devtools/binutils/binutils/ |
H A D | 0012-Only-generate-an-RPATH-entry-if-LD_RUN_PATH-is-not-e.patch | 30 @@ -1805,6 +1808,8 @@ ldelf_before_allocation (char *audit, char *depaudit,
|
/openbmc/linux/tools/perf/ |
H A D | command-list.txt | 34 perf-trace mainporcelain audit
|
/openbmc/linux/arch/ia64/kernel/ |
H A D | Makefile | 31 obj-$(CONFIG_AUDIT) += audit.o
|
/openbmc/linux/arch/parisc/kernel/ |
H A D | Makefile | 33 obj-$(CONFIG_AUDIT) += audit.o
|
/openbmc/openbmc/meta-openembedded/meta-gnome/recipes-gnome/gdm/ |
H A D | gdm_46.0.bb | 7 audit \
|
/openbmc/openbmc/meta-security/dynamic-layers/meta-python/recipes-security/mfa/ |
H A D | python3-privacyidea_3.9.1.bb | 1 SUMMARY = "identity, multifactor authentication (OTP), authorization, audit"
|
/openbmc/linux/arch/s390/kernel/ |
H A D | Makefile | 54 obj-$(CONFIG_AUDIT) += audit.o
|
/openbmc/openbmc/poky/meta/recipes-core/dbus/ |
H A D | dbus_1.14.10.bb | 41 PACKAGECONFIG[audit] = "--enable-libaudit,--disable-libaudit,audit"
|
/openbmc/openbmc/poky/meta/recipes-devtools/rpm/ |
H A D | rpm_4.19.1.1.bb | 77 PACKAGECONFIG[audit] = "-DWITH_AUDIT=ON,-DWITH_AUDIT=OFF,audit"
|
/openbmc/linux/include/net/iucv/ |
H A D | iucv.h | 117 u32 audit; member
|