/linux-master/kernel/ |
H A D | auditsc.c | 151 static int audit_match_perm(struct audit_context *ctx, int mask) 197 static int audit_match_filetype(struct audit_context *ctx, int val) 224 static void audit_set_auditable(struct audit_context *ctx) 232 static int put_tree_ref(struct audit_context *ctx, struct audit_chunk *chunk) 254 static int grow_tree_refs(struct audit_context *ctx) 271 static void unroll_tree_refs(struct audit_context *ctx, 300 static void free_tree_refs(struct audit_context *ctx) 310 static int match_tree_refs(struct audit_context *ctx, struct audit_tree *tree) 335 struct audit_context *ctx) 359 struct audit_context *ct [all...] |
H A D | audit.h | 2 /* audit -- definition of audit_context structure and supporting types 19 /* AUDIT_NAMES is the number of slots we reserve in the audit_context 24 /* At task start time, the audit_state is set in the audit_context using 28 AUDIT_STATE_DISABLED, /* Do not create per-task audit_context. 31 AUDIT_STATE_BUILD, /* Create the per-task audit_context, 37 AUDIT_STATE_RECORD /* Create the per-task audit_context, 72 struct list_head list; /* audit_context->names_list */ 102 struct audit_context { struct 105 AUDIT_CTX_UNUSED, /* audit_context is currently unused */ 264 extern int auditsc_get_stamp(struct audit_context *ct [all...] |
H A D | audit.c | 199 struct audit_context *ctx; /* NULL or associated context */ 389 ab = audit_log_start(audit_context(), GFP_KERNEL, AUDIT_CONFIG_CHANGE); 1086 static void audit_log_common_recv_msg(struct audit_context *context, 1136 ab = audit_log_start(audit_context(), GFP_KERNEL, AUDIT_FEATURE_CHANGE); 1415 audit_log_common_recv_msg(audit_context(), &ab, 1431 audit_log_common_recv_msg(audit_context(), &ab, 1462 audit_log_common_recv_msg(audit_context(), &ab, 1530 audit_log_common_recv_msg(audit_context(), &ab, 1608 ab = audit_log_start(audit_context(), GFP_KERNEL, AUDIT_EVENT_LISTENER); 1785 static struct audit_buffer *audit_buffer_alloc(struct audit_context *ct [all...] |
H A D | audit_fsnotify.c | 122 ab = audit_log_start(audit_context(), GFP_NOFS, AUDIT_CONFIG_CHANGE);
|
H A D | audit_tree.c | 525 static void audit_tree_log_remove_rule(struct audit_context *context, 542 static void kill_rules(struct audit_context *context, struct audit_tree *tree) 635 kill_rules(audit_context(), tree); 972 void audit_kill_trees(struct audit_context *context) 1018 kill_rules(audit_context(), owner);
|
H A D | audit_watch.c | 233 ab = audit_log_start(audit_context(), GFP_NOFS, AUDIT_CONFIG_CHANGE); 264 audit_filter_inodes(current, audit_context());
|
H A D | auditfilter.c | 1115 ab = audit_log_start(audit_context(), GFP_KERNEL, AUDIT_CONFIG_CHANGE);
|
/linux-master/include/linux/ |
H A D | audit.h | 29 struct audit_context; 159 void audit_log(struct audit_context *ctx, gfp_t gfp_mask, int type, 162 extern struct audit_buffer *audit_log_start(struct audit_context *ctx, gfp_t gfp_mask, int type); 215 void audit_log(struct audit_context *ctx, gfp_t gfp_mask, int type, 218 static inline struct audit_buffer *audit_log_start(struct audit_context *ctx, 309 static inline void audit_set_context(struct task_struct *task, struct audit_context *ctx) 311 task->audit_context = ctx; 314 static inline struct audit_context *audit_context(void) function 316 return current->audit_context; 600 static inline struct audit_context *audit_context(void) function [all...] |
H A D | sched.h | 51 struct audit_context; 1128 struct audit_context *audit_context; member in struct:task_struct
|
H A D | security.h | 44 struct audit_context;
|
/linux-master/net/netlabel/ |
H A D | netlabel_user.c | 93 audit_buf = audit_log_start(audit_context(), GFP_ATOMIC, type);
|
/linux-master/security/integrity/ |
H A D | integrity_audit.c | 47 ab = audit_log_start(audit_context(), GFP_KERNEL, audit_msgno);
|
H A D | integrity.h | 206 integrity_audit_log_start(struct audit_context *ctx, gfp_t gfp_mask, int type) 228 integrity_audit_log_start(struct audit_context *ctx, gfp_t gfp_mask, int type)
|
/linux-master/drivers/md/ |
H A D | dm-audit.c | 28 ab = audit_log_start(audit_context(), GFP_KERNEL, audit_type);
|
/linux-master/security/integrity/evm/ |
H A D | evm_secfs.c | 198 ab = audit_log_start(audit_context(), GFP_KERNEL,
|
/linux-master/drivers/tty/ |
H A D | tty_audit.c | 71 ab = audit_log_start(audit_context(), GFP_KERNEL, AUDIT_TTY);
|
/linux-master/kernel/entry/ |
H A D | common.c | 20 if (unlikely(audit_context())) {
|
/linux-master/security/integrity/ima/ |
H A D | ima_api.c | 405 ab = audit_log_start(audit_context(), GFP_KERNEL,
|
H A D | ima_policy.c | 1413 ab = integrity_audit_log_start(audit_context(), GFP_KERNEL,
|
/linux-master/security/ |
H A D | lsm_audit.c | 449 ab = audit_log_start(audit_context(), GFP_ATOMIC | __GFP_NOWARN,
|
/linux-master/security/selinux/ss/ |
H A D | services.c | 500 ab = audit_log_start(audit_context(), 733 audit_log(audit_context(), GFP_ATOMIC, AUDIT_SELINUX_ERR, 918 audit_log(audit_context(), 1656 ab = audit_log_start(audit_context(), GFP_ATOMIC, AUDIT_SELINUX_ERR); 3063 audit_log(audit_context(), GFP_ATOMIC, 3219 ab = audit_log_start(audit_context(),
|
/linux-master/security/selinux/ |
H A D | selinuxfs.c | 168 audit_log(audit_context(), GFP_KERNEL, AUDIT_MAC_STATUS, 617 audit_log(audit_context(), GFP_KERNEL, AUDIT_MAC_POLICY_LOAD,
|
H A D | hooks.c | 3243 ab = audit_log_start(audit_context(), 6463 ab = audit_log_start(audit_context(),
|
/linux-master/include/net/ |
H A D | xfrm.h | 703 audit_buf = audit_log_start(audit_context(), GFP_ATOMIC,
|
/linux-master/kernel/bpf/ |
H A D | syscall.c | 2174 struct audit_context *ctx = NULL; 2182 ctx = audit_context();
|