/linux-master/security/integrity/ |
H A D | integrity_audit.c | 50 audit_log_format(ab, "pid=%d uid=%u auid=%u ses=%u", 56 audit_log_format(ab, " op=%s cause=%s comm=", op, cause); 59 audit_log_format(ab, " name="); 63 audit_log_format(ab, " dev="); 65 audit_log_format(ab, " ino=%lu", inode->i_ino); 67 audit_log_format(ab, " res=%d errno=%d", !result, errno);
|
/linux-master/security/ |
H A D | lsm_audit.c | 177 audit_log_format(ab, " %s=%pI6c", name1, addr); 179 audit_log_format(ab, " %s=%d", name2, ntohs(port)); 186 audit_log_format(ab, " %s=%pI4", name1, &addr); 188 audit_log_format(ab, " %s=%d", name2, ntohs(port)); 209 audit_log_format(ab, " pid=%d comm=", task_tgid_nr(current)); 216 audit_log_format(ab, " ipc_key=%d ", a->u.ipc_id); 219 audit_log_format(ab, " capability=%d ", a->u.cap); 228 audit_log_format(ab, " dev="); 230 audit_log_format(ab, " ino=%lu", inode->i_ino); 241 audit_log_format(a [all...] |
/linux-master/drivers/md/ |
H A D | dm-audit.c | 32 audit_log_format(ab, "module=%s op=%s", dm_msg_prefix, op); 50 audit_log_format(ab, " dev=%d:%d error_msg='%s'", dev_major, 57 audit_log_format(ab, " dev=%d:%d sector=?", dev_major, 64 audit_log_format(ab, " res=%d", result); 80 audit_log_format(ab, " dev=%d:%d sector=%llu res=%d",
|
/linux-master/security/apparmor/ |
H A D | audit.c | 97 audit_log_format(ab, "apparmor=\"%s\"", 102 audit_log_format(ab, " operation=\"%s\"", ad->op); 105 audit_log_format(ab, " class=\"%s\"", 111 audit_log_format(ab, " info=\"%s\"", ad->info); 113 audit_log_format(ab, " error=%d", ad->error); 123 audit_log_format(ab, " namespace="); 127 audit_log_format(ab, " profile="); 130 audit_log_format(ab, " label="); 137 audit_log_format(ab, " name=");
|
H A D | ipc.c | 58 audit_log_format(ab, " requested_mask=\"%s\"", 61 audit_log_format(ab, " denied_mask=\"%s\"", 66 audit_log_format(ab, "signal=unknown(%d)", 69 audit_log_format(ab, " signal=%s", sig_names[ad->signal]); 71 audit_log_format(ab, " signal=rtmin+%d", 73 audit_log_format(ab, " peer=");
|
H A D | mount.c | 30 audit_log_format(ab, "ro"); 32 audit_log_format(ab, "rw"); 34 audit_log_format(ab, ", nosuid"); 36 audit_log_format(ab, ", nodev"); 38 audit_log_format(ab, ", noexec"); 40 audit_log_format(ab, ", sync"); 42 audit_log_format(ab, ", remount"); 44 audit_log_format(ab, ", mand"); 46 audit_log_format(ab, ", dirsync"); 48 audit_log_format(a [all...] |
H A D | net.c | 77 audit_log_format(ab, " family=\"%s\"", 80 audit_log_format(ab, " family=\"unknown(%d)\"", 83 audit_log_format(ab, " sock_type=\"%s\"", 86 audit_log_format(ab, " sock_type=\"unknown(%d)\"", 88 audit_log_format(ab, " protocol=%d", ad->net.protocol); 91 audit_log_format(ab, " requested_mask="); 96 audit_log_format(ab, " denied_mask="); 102 audit_log_format(ab, " peer=");
|
H A D | lib.c | 251 audit_log_format(ab, fmt, names[i]); 265 audit_log_format(ab, "\""); 269 audit_log_format(ab, "%s", str); 271 audit_log_format(ab, " "); 275 audit_log_format(ab, "\""); 289 audit_log_format(ab, " requested_mask="); 295 audit_log_format(ab, "denied_mask="); 300 audit_log_format(ab, " peer=");
|
H A D | task.c | 211 audit_log_format(ab, " requested_mask=\"%s\"", 215 audit_log_format(ab, " denied_mask=\"%s\"", 219 audit_log_format(ab, " peer="); 310 audit_log_format(ab, " requested=\"userns_create\""); 313 audit_log_format(ab, " denied=\"userns_create\"");
|
H A D | resource.c | 35 audit_log_format(ab, " rlimit=%s value=%lu", 38 audit_log_format(ab, " peer=");
|
H A D | file.c | 54 audit_log_format(ab, " requested_mask=\"%s\"", str); 59 audit_log_format(ab, " denied_mask=\"%s\"", str); 62 audit_log_format(ab, " fsuid=%d", 64 audit_log_format(ab, " ouid=%d", 69 audit_log_format(ab, " target="); 73 audit_log_format(ab, " target=");
|
H A D | capability.c | 48 audit_log_format(ab, " capname=");
|
/linux-master/net/netlabel/ |
H A D | netlabel_user.c | 97 audit_log_format(audit_buf, "netlabel: auid=%u ses=%u", 105 audit_log_format(audit_buf, " subj=%s", secctx);
|
H A D | netlabel_addrlist.c | 318 audit_log_format(audit_buf, " netif=%s", dev); 319 audit_log_format(audit_buf, " %s=%pI4", dir, &addr); 326 audit_log_format(audit_buf, " %s_prefixlen=%d", dir, mask_len); 352 audit_log_format(audit_buf, " netif=%s", dev); 353 audit_log_format(audit_buf, " %s=%pI6", dir, addr); 365 audit_log_format(audit_buf, " %s_prefixlen=%d", dir, mask_len);
|
H A D | netlabel_domainhash.c | 221 audit_log_format(audit_buf, " nlbl_domain=%s", 246 audit_log_format(audit_buf, " nlbl_protocol=unlbl"); 250 audit_log_format(audit_buf, 256 audit_log_format(audit_buf, 261 audit_log_format(audit_buf, " res=%u", result == 0 ? 1 : 0); 614 audit_log_format(audit_buf,
|
H A D | netlabel_unlabeled.c | 444 audit_log_format(audit_buf, " sec_obj=%s", secctx); 447 audit_log_format(audit_buf, " res=%u", ret_val == 0 ? 1 : 0); 499 audit_log_format(audit_buf, " sec_obj=%s", secctx); 502 audit_log_format(audit_buf, " res=%u", entry != NULL ? 1 : 0); 559 audit_log_format(audit_buf, " sec_obj=%s", secctx); 562 audit_log_format(audit_buf, " res=%u", entry != NULL ? 1 : 0); 744 audit_log_format(audit_buf,
|
/linux-master/net/netfilter/ |
H A D | xt_AUDIT.c | 40 audit_log_format(ab, " saddr=%pI4 daddr=%pI4 proto=%hhu", 60 audit_log_format(ab, " saddr=%pI6c daddr=%pI6c proto=%hhu", 78 audit_log_format(ab, "mark=%#x", skb->mark); 100 audit_log_format(ab, " saddr=? daddr=? proto=-1");
|
H A D | nft_log.c | 38 audit_log_format(ab, " saddr=%pI4 daddr=%pI4 proto=%hhu", 58 audit_log_format(ab, " saddr=%pI6c daddr=%pI6c proto=%hhu", 77 audit_log_format(ab, "mark=%#x", skb->mark); 99 audit_log_format(ab, " saddr=? daddr=? proto=-1");
|
/linux-master/kernel/ |
H A D | auditsc.c | 1106 audit_log_format(ab, "opid=%d oauid=%d ouid=%d oses=%d", pid, 1111 audit_log_format(ab, " obj=(none)"); 1114 audit_log_format(ab, " obj=%s", ctx); 1118 audit_log_format(ab, " ocomm="); 1162 audit_log_format(*ab, "argc=%d", context->execve.argc); 1261 audit_log_format(*ab, "%s", abuf); 1303 audit_log_format(ab, " %s=0", prefix); 1306 audit_log_format(ab, " %s=%016llx", prefix, cap->val); 1312 audit_log_format(ab, " cap_fe=? cap_fver=? cap_fp=? cap_fi=?"); 1317 audit_log_format(a [all...] |
H A D | audit.c | 392 audit_log_format(ab, "op=set %s=%u old=%u ", function_name, new, old); 397 audit_log_format(ab, " res=%d", allow_changes); 1100 audit_log_format(*ab, "pid=%d uid=%u ", pid, uid); 1140 audit_log_format(ab, " feature=%s old=%u new=%u old_lock=%u new_lock=%u res=%d", 1398 audit_log_format(ab, " msg='%.*s'", 1402 audit_log_format(ab, " data="); 1417 audit_log_format(ab, " op=%s audit_enabled=%d res=0", 1433 audit_log_format(ab, " op=trim res=1"); 1464 audit_log_format(ab, " op=make_equiv old="); 1466 audit_log_format(a 2004 void audit_log_format(struct audit_buffer *ab, const char *fmt, ...) function 2477 EXPORT_SYMBOL(audit_log_format); variable [all...] |
H A D | audit_fsnotify.c | 126 audit_log_format(ab, " op=%s path=", op); 129 audit_log_format(ab, " list=%d res=1", rule->listnr);
|
/linux-master/security/smack/ |
H A D | smack_access.c | 315 audit_log_format(ab, "lsm=SMACK fn=%s action=%s", 318 audit_log_format(ab, " subject="); 320 audit_log_format(ab, " object="); 323 audit_log_format(ab, " labels_differ"); 325 audit_log_format(ab, " requested=%s", sad->request);
|
/linux-master/security/selinux/ |
H A D | avc.c | 661 audit_log_format(ab, "avc: %s ", sad->denied ? "denied" : "granted"); 664 audit_log_format(ab, " null"); 670 audit_log_format(ab, " {"); 675 audit_log_format(ab, " %s", perms[i]); 683 audit_log_format(ab, " 0x%x", av); 685 audit_log_format(ab, " } for "); 708 audit_log_format(ab, " ssid=%d", sad->ssid); 710 audit_log_format(ab, " scontext=%s", scontext); 715 audit_log_format(ab, " tsid=%d", sad->tsid); 717 audit_log_format(a [all...] |
/linux-master/security/integrity/evm/ |
H A D | evm_secfs.c | 222 audit_log_format(ab, "xattr="); 267 audit_log_format(ab, " res=0"); 271 audit_log_format(ab, " res=%d", (err < 0) ? err : 0);
|
/linux-master/drivers/tty/ |
H A D | tty_audit.c | 75 audit_log_format(ab, "%s pid=%u uid=%u auid=%u ses=%u major=%d minor=%d comm=", 80 audit_log_format(ab, " data=");
|