linux/security/apparmor/include
John Johansen ade3ddc01e AppArmor: Fix dropping of allowed operations that are force audited
The audit permission flag, that specifies an audit message should be
provided when an operation is allowed, was being ignored in some cases.

This is because the auto audit mode (which determines the audit mode from
system flags) was incorrectly assigned the same value as audit mode. The
shared value would result in messages that should be audited going through
a second evaluation as to whether they should be audited based on the
auto audit, resulting in some messages being dropped.

Signed-off-by: John Johansen <john.johansen@canonical.com>
Acked-by: Kees Cook <kees@ubuntu.com>
2012-02-27 11:38:21 -08:00
..
apparmor.h module_param: make bool parameters really bool (drivers & misc) 2012-01-13 09:32:20 +10:30
apparmorfs.h AppArmor: add "file" details to securityfs 2012-02-27 11:38:18 -08:00
audit.h AppArmor: Fix dropping of allowed operations that are force audited 2012-02-27 11:38:21 -08:00
capability.h AppArmor: mediation of non file objects 2010-08-02 15:38:35 +10:00
context.h AppArmor: contexts used in attaching policy to system objects 2010-08-02 15:35:12 +10:00
domain.h AppArmor: functions for domain transitions 2010-08-02 15:35:14 +10:00
file.h headers: path.h redux 2011-01-10 08:51:44 -08:00
ipc.h AppArmor: mediation of non file objects 2010-08-02 15:38:35 +10:00
match.h Merge branch 'for-next' of git://git.kernel.org/pub/scm/linux/kernel/git/jikos/trivial 2011-01-13 10:05:56 -08:00
path.h
policy_unpack.h AppArmor: policy routines for loading and unpacking policy 2010-08-02 15:38:36 +10:00
policy.h AppArmor: core policy routines 2010-08-02 15:38:37 +10:00
procattr.h AppArmor: userspace interfaces 2010-08-02 15:35:13 +10:00
resource.h AppArmor: export known rlimit names/value mappings in securityfs 2012-02-27 11:38:19 -08:00
sid.h AppArmor: core policy routines 2010-08-02 15:38:37 +10:00