/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/include/scsi/ |
H A D | osd_protocol.h | 560 /*10*/ u8 audit[20]; member in struct:osd_capability_head
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/kernel/ |
H A D | audit_watch.c | 23 #include <linux/audit.h> 33 #include "audit.h" 212 /* Duplicate the given audit watch. The new watch's rules list is initialized 255 /* Update inode info in audit rules based on filesystem event. */ 513 /* Update watch data in audit rules based on fsnotify events. */ 564 audit_panic("cannot create audit fsnotify group");
|
H A D | ptrace.c | 20 #include <linux/audit.h>
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/arch/sh/kernel/ |
H A D | ptrace_32.c | 23 #include <linux/audit.h>
|
H A D | ptrace_64.c | 29 #include <linux/audit.h>
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/arch/mips/kernel/ |
H A D | ptrace.c | 26 #include <linux/audit.h>
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/arch/mips/kernel/ |
H A D | ptrace.c | 26 #include <linux/audit.h>
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba/source/include/ |
H A D | includes.h | 333 #include <sys/audit.h>
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba/source/include/ |
H A D | includes.h | 333 #include <sys/audit.h>
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba/source/include/ |
H A D | includes.h | 333 #include <sys/audit.h>
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/fs/ |
H A D | xattr.c | 20 #include <linux/audit.h>
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/net/netlabel/ |
H A D | netlabel_cipso_v4.c | 35 #include <linux/audit.h> 134 * @audit_info: NetLabel audit information 336 * @audit_info: NetLabel audit information 375 * @audit_info: NetLabel audit information
|
H A D | netlabel_kapi.c | 34 #include <linux/audit.h> 61 * @audit_info: NetLabel audit information 95 * @audit_info: NetLabel audit information 206 * @audit_info: NetLabel audit information 248 * @audit_info: NetLabel audit information 284 * @audit_info: NetLabel audit information 300 * @audit_info: NetLabel audit information 318 * @audit_info: NetLabel audit information 1022 * netlbl_audit_start - Start an audit message 1023 * @type: audit messag [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/security/selinux/ |
H A D | avc.c | 29 #include <linux/audit.h> 436 * will be called by generic audit code 437 * @ab: the audit buffer 452 * will be called by generic audit code 453 * @ab: the audit buffer 473 * @a: auxiliary audit data 505 * We will NOT audit the denial even though the denied 795 * @auditdata: auxiliary audit data
|
H A D | hooks.c | 74 #include <linux/audit.h> 88 #include "audit.h" 1426 int cap, int audit) 1453 if (audit == SECURITY_CAP_AUDIT) 1469 The 'adp' parameter is optional and allows other audit 1497 /* Same as inode_has_perm, but pass explicit audit data containing 1854 int cap, int audit) 1858 rc = cap_capable(tsk, cred, cap, audit); 1862 return task_has_capability(tsk, cred, cap, audit); 2012 * Do not audit th 1424 task_has_capability(struct task_struct *tsk, const struct cred *cred, int cap, int audit) argument 1853 selinux_capable(struct task_struct *tsk, const struct cred *cred, int cap, int audit) argument [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/ipc/ |
H A D | util.c | 13 * Mar 2006 - support for audit of ipc object properties 33 #include <linux/audit.h> 774 * This function does some common audit and permissions check for some IPC_XXX 778 * - performs some audit and permission check, depending on the given cmd
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/kernel/ |
H A D | ptrace.c | 20 #include <linux/audit.h>
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/net/netlabel/ |
H A D | netlabel_cipso_v4.c | 35 #include <linux/audit.h> 134 * @audit_info: NetLabel audit information 336 * @audit_info: NetLabel audit information 375 * @audit_info: NetLabel audit information
|
H A D | netlabel_kapi.c | 34 #include <linux/audit.h> 61 * @audit_info: NetLabel audit information 95 * @audit_info: NetLabel audit information 206 * @audit_info: NetLabel audit information 248 * @audit_info: NetLabel audit information 284 * @audit_info: NetLabel audit information 300 * @audit_info: NetLabel audit information 318 * @audit_info: NetLabel audit information 1022 * netlbl_audit_start - Start an audit message 1023 * @type: audit messag [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/security/selinux/ |
H A D | avc.c | 29 #include <linux/audit.h> 436 * will be called by generic audit code 437 * @ab: the audit buffer 452 * will be called by generic audit code 453 * @ab: the audit buffer 473 * @a: auxiliary audit data 505 * We will NOT audit the denial even though the denied 795 * @auditdata: auxiliary audit data
|
H A D | hooks.c | 74 #include <linux/audit.h> 88 #include "audit.h" 1426 int cap, int audit) 1453 if (audit == SECURITY_CAP_AUDIT) 1469 The 'adp' parameter is optional and allows other audit 1497 /* Same as inode_has_perm, but pass explicit audit data containing 1854 int cap, int audit) 1858 rc = cap_capable(tsk, cred, cap, audit); 1862 return task_has_capability(tsk, cred, cap, audit); 2012 * Do not audit th 1424 task_has_capability(struct task_struct *tsk, const struct cred *cred, int cap, int audit) argument 1853 selinux_capable(struct task_struct *tsk, const struct cred *cred, int cap, int audit) argument [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/fs/ |
H A D | xattr.c | 20 #include <linux/audit.h>
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/ipc/ |
H A D | util.c | 13 * Mar 2006 - support for audit of ipc object properties 33 #include <linux/audit.h> 774 * This function does some common audit and permissions check for some IPC_XXX 778 * - performs some audit and permission check, depending on the given cmd
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/include/linux/ |
H A D | security.h | 43 /* If capable should audit the security request */ 55 int cap, int audit); 1254 * @audit: Whether to write an audit message or not 1298 * Allocate and initialize an LSM audit rule structure. 1299 * @field contains the required Audit action. Fields flags are defined in include/linux/audit.h 1308 * @rule contains the audit rule of interest. 1317 * @rule points to the audit rule that will be checked against. 1318 * @actx points to the audit context associated with the check. 1322 * Deallocate the LSM audit rul [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/net/iucv/ |
H A D | iucv.c | 1084 msg->audit = (*(u32 *) &parm->purge.ipaudit) >> 8; 1663 msg.audit = imc->ipaudit;
|