PATH:
usr
/
share
/
doc
/
audit-2.8.5
/
rules
## These are rules are to locate poorly written programs. ## Its never planned to waste time on a syscall with incorrect parameters ## This is more of a debugging step than something people should run with ## in production. -a never,exit -F arch=b64 -S rt_sigreturn -a always,exit -S all -F exit=-EINVAL -F key=einval-retcode
[-] README-rules
[edit]
[-] 30-stig.rules
[edit]
[-] 12-cont-fail.rules
[edit]
[-] 42-injection.rules
[edit]
[+]
..
[-] 10-no-audit.rules
[edit]
[-] 23-ignore-filesystems.rules
[edit]
[-] 22-ignore-chrony.rules
[edit]
[-] 70-einval.rules
[edit]
[-] 30-nispom.rules
[edit]
[-] 41-containers.rules
[edit]
[-] 40-local.rules
[edit]
[-] 43-module-load.rules
[edit]
[-] 32-power-abuse.rules
[edit]
[-] 21-no32bit.rules
[edit]
[-] 11-loginuid.rules
[edit]
[-] 20-dont-audit.rules
[edit]
[-] 12-ignore-error.rules
[edit]
[-] 71-networking.rules
[edit]
[-] 99-finalize.rules
[edit]
[-] 30-pci-dss-v31.rules
[edit]
[-] 10-base-config.rules
[edit]
[-] 31-privileged.rules
[edit]
[-] 30-ospp-v42.rules
[edit]