/openbmc/openbmc/meta-openembedded/meta-oe/recipes-security/audit/ |
H A D | audit_4.0.3.bb | 2 DESCRIPTION = "The audit package contains the user space utilities for \ 3 storing and searching the audit records generated by the audit subsystem \ 5 HOMEPAGE = "http://people.redhat.com/sgrubb/audit/" 10 SRC_URI = "git://github.com/linux-audit/${BPN}-userspace.git;branch=master;protocol=https \ 25 SYSTEMD_SERVICE:auditd = "auditd.service audit-rules.service" 50 SUMMARY:audispd-plugins = "Plugins for the audit event dispatcher" 52 interface to the audit system, audispd. These plugins can do things \ 61 ${datadir}/audit-rules/* ${libexecdir}/* \ 63 FILES:audispd-plugins = "${sysconfdir}/audit/audisp-remote.conf \ 64 ${sysconfdir}/audit/plugins.d/au-remote.conf \ [all …]
|
/openbmc/linux/tools/perf/scripts/python/Perf-Trace-Util/lib/Perf/Trace/ |
H A D | Util.py | 54 import audit 56 'x86_64': audit.MACH_86_64, 57 'aarch64': audit.MACH_AARCH64, 58 'alpha' : audit.MACH_ALPHA, 59 'ia64' : audit.MACH_IA64, 60 'ppc' : audit.MACH_PPC, 61 'ppc64' : audit.MACH_PPC64, 62 'ppc64le' : audit.MACH_PPC64LE, 63 's390' : audit.MACH_S390, 64 's390x' : audit.MACH_S390X, [all …]
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-security/audit/audit/ |
H A D | auditd | 49 if [ -f /etc/audit/audit.rules ] 51 /sbin/auditctl -R /etc/audit/audit.rules >/dev/null 87 if [ ! -e /var/log/audit ]; then 88 mkdir -p /var/log/audit 89 [ -x /sbin/restorecon ] && /sbin/restorecon -F $(readlink -f /var/log/audit)
|
H A D | 0001-Fixed-swig-host-contamination-issue.patch | 6 The audit build uses swig to generate a python wrapper. 36 audit.py audit_wrap.c: ${srcdir}/../src/auditswig.i 40 CLEANFILES = audit.py* audit_wrap.c *~ 50 -%include "/usr/include/linux/audit.h" 51 +%include "../lib/audit.h" 54 %include "../lib/audit-records.h"
|
/openbmc/linux/Documentation/ABI/stable/ |
H A D | procfs-audit_loginuid | 3 KernelVersion: 2.6.11-rc2 1e2d1492e178 ("[PATCH] audit: handle loginuid through proc") 4 Contact: linux-audit@redhat.com 5 Users: audit and login applications 8 read to get the audit login UID of process $pid as a 20 Contact: linux-audit@redhat.com 21 Users: audit and login applications 24 audit login session ID of process $pid as a decimal
|
/openbmc/docs/designs/ |
H A D | phosphor-audit.md | 1 # phosphor-audit 70 The phosphor-audit service represents a service that provides user activity 73 The key benefit of using phosphor-audit is that all action handling will be kept 81 +----------------+ audit event +-----------------+ 87 +----------------+ | | audit | | +-------------+ | 101 The audit event from diagram generated by an application to track user activity. 102 The application sends 'signal' to audit service via D-Bus. What is happening 103 next in audit service's handler depends on user requirements and needs. It is 110 before sending it to the audit service, if the request is filtered out, it will 112 check, the audit event call sends the data through D-Bus to the audit service [all …]
|
/openbmc/linux/arch/x86/ia32/ |
H A D | Makefile | 6 audit-class-$(CONFIG_AUDIT) := audit.o 7 obj-$(CONFIG_IA32_EMULATION) += $(audit-class-y)
|
/openbmc/openbmc/meta-security/recipes-ids/aide/ |
H A D | aide_0.18.8.bb | 20 ${@bb.utils.contains('DISTRO_FEATURES', 'selinux', 'selinux audit', '', d)} \ 27 PACKAGECONFIG[audit] = "--with-audit, --without-audit,audit"
|
/openbmc/linux/security/integrity/ |
H A D | integrity_audit.c | 20 unsigned long audit; in integrity_audit_setup() local 22 if (!kstrtoul(str, 0, &audit)) in integrity_audit_setup() 23 integrity_audit_info = audit ? 1 : 0; in integrity_audit_setup()
|
/openbmc/linux/security/apparmor/ |
H A D | domain.c | 289 perms->audit = perms->quiet = perms->kill = 0; in change_profile_perms() 658 goto audit; in profile_transition() 680 goto audit; in profile_transition() 706 goto audit; in profile_transition() 719 audit: in profile_transition() 768 goto audit; in profile_onexec() 775 goto audit; in profile_onexec() 786 goto audit; in profile_onexec() 799 audit: in profile_onexec() 945 goto audit; in apparmor_bprm_creds_for_exec() [all …]
|
H A D | mount.c | 143 u32 mask = perms->audit; in audit_mount() 177 if (data && (perms->audit & AA_AUDIT_DATA)) in audit_mount() 326 goto audit; in match_mnt_path_str() 331 goto audit; in match_mnt_path_str() 340 goto audit; in match_mnt_path_str() 344 audit: in match_mnt_path_str() 621 goto audit; in profile_umount() 630 audit: in profile_umount() 689 goto audit; in build_pivotroot() 694 goto audit; in build_pivotroot() [all …]
|
H A D | file.c | 114 u32 mask = perms->audit; in aa_audit_file() 345 goto audit; in profile_path_link() 352 goto audit; in profile_path_link() 361 goto audit; in profile_path_link() 370 lperms.audit = perms.audit; in profile_path_link() 377 goto audit; in profile_path_link() 396 goto audit; in profile_path_link() 402 goto audit; in profile_path_link() 408 audit: in profile_path_link()
|
H A D | policy_compat.c | 118 perms.audit = map_old_perms(dfa_user_audit(dfa, state)); in compute_fperms_user() 133 perms.audit = map_old_perms(dfa_other_audit(dfa, state)); in compute_fperms_other() 216 perms.audit = dfa_user_audit(dfa, state); in compute_perms_entry() 240 perms.audit |= map_other(dfa_other_audit(dfa, state)); in compute_perms_entry()
|
H A D | lib.c | 316 perms->audit = ALL_PERMS_MASK; in aa_apply_modes_to_perms() 322 perms->audit = 0; in aa_apply_modes_to_perms() 397 request &= perms->audit; in aa_check_perms()
|
/openbmc/linux/security/apparmor/include/ |
H A D | perms.h | 77 u32 audit; /* set only when allow is set */ member 109 accum->audit |= addend->audit & addend->allow; in aa_perms_accum_raw() 136 accum->audit |= addend->audit & accum->allow; in aa_perms_accum()
|
H A D | capability.h | 30 kernel_cap_t audit; member
|
/openbmc/openbmc/poky/meta/recipes-extended/sudo/ |
H A D | sudo.inc | 25 PACKAGECONFIG[audit] = "--with-linux-audit,--without-linux-audit,audit"
|
/openbmc/openbmc/meta-security/dynamic-layers/meta-perl/recipes-security/bastille/files/ |
H A D | upgrade_options_processing.patch | 67 "a" => \$audit, 81 -&setOptions($debug,$log_only,$verbose,$audit,$auditnobrowser,$os_version); 86 + auditonly => $audit,
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-core/basu/ |
H A D | basu_0.2.1.bb | 19 PACKAGECONFIG[audit] = "-Daudit=enabled,-Daudit=disabled,audit"
|
/openbmc/openbmc/poky/meta/recipes-extended/cronie/ |
H A D | cronie_1.7.2.bb | 35 PACKAGECONFIG[audit] = "--with-audit,--without-audit,audit,"
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/md5deep/ |
H A D | md5deep_git.bb | 1 SUMMARY = "md5deep and hashdeep to compute and audit hashsets of amounts of files." 2 …bitrary number of files. This package also includes hashdeep which is also able to audit hashsets."
|
/openbmc/linux/security/tomoyo/ |
H A D | Kconfig | 30 int "Default maximal count for audit log" 36 audit logs that the kernel can hold on memory. 37 You can read the log via /sys/kernel/security/tomoyo/audit. 38 If you don't need audit logs, you may set this value to 0.
|
/openbmc/openbmc/meta-security/recipes-core/packagegroup/ |
H A D | packagegroup-core-security.bb | 12 packagegroup-security-audit \ 22 packagegroup-security-audit \ 64 SUMMARY:packagegroup-security-audit = "Security Audit tools " 65 RDEPENDS:packagegroup-security-audit = " \
|
/openbmc/linux/arch/sparc/kernel/ |
H A D | Makefile | 115 obj-$(CONFIG_AUDIT) += audit.o 116 audit--$(CONFIG_AUDIT) := compat_audit.o 117 obj-$(CONFIG_COMPAT) += $(audit--y)
|
/openbmc/linux/tools/perf/Documentation/ |
H A D | security.txt | 140 monitoring and observability operations. Inspect system audit records for 155 audit records using journalctl command or /var/log/audit/audit.log so the 163 …audit[1318098]: AVC avc: denied { open } for pid=1318098 comm="perf" scontext=unconfined_u:unco… 168 be generated using the system audit records about blocking perf_event access.
|