/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/security/selinux/include/ |
H A D | audit.h | 55 struct audit_context *actx);
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/linux/ |
H A D | selinux.h | 18 struct audit_context;
|
H A D | audit.h | 371 struct audit_context; 433 void *p = current->audit_context; 460 extern int auditsc_get_stamp(struct audit_context *ctx, 575 extern void audit_log(struct audit_context *ctx, gfp_t gfp_mask, 579 extern struct audit_buffer *audit_log_start(struct audit_context *ctx, gfp_t gfp_mask, int type);
|
H A D | sched.h | 998 struct audit_context; /* See audit.c */ 1321 struct audit_context *audit_context; member in struct:task_struct
|
H A D | security.h | 1635 struct audit_context *actx); 2931 struct audit_context *actx); 2948 void *lsmrule, struct audit_context *actx)
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/kernel/ |
H A D | auditsc.c | 73 /* AUDIT_NAMES is the number of slots we reserve in the audit_context 166 struct audit_context { struct 181 struct audit_context *previous; /* For nested syscalls */ 261 static int audit_match_perm(struct audit_context *ctx, int mask) 304 static int audit_match_filetype(struct audit_context *ctx, int which) 332 static void audit_set_auditable(struct audit_context *ctx) 340 static int put_tree_ref(struct audit_context *ctx, struct audit_chunk *chunk) 361 static int grow_tree_refs(struct audit_context *ctx) 378 static void unroll_tree_refs(struct audit_context *ctx, 408 static void free_tree_refs(struct audit_context *ct [all...] |
H A D | audit.h | 1 /* audit -- definition of audit_context structure and supporting types 32 /* At task start time, the audit_state is set in the audit_context using 36 AUDIT_DISABLED, /* Do not create per-task audit_context. 39 AUDIT_SETUP_CONTEXT, /* Create the per-task audit_context, 43 AUDIT_BUILD_CONTEXT, /* Create the per-task audit_context, 49 AUDIT_RECORD_CONTEXT /* Create the per-task audit_context, 166 extern void audit_filter_inodes(struct task_struct *, struct audit_context *);
|
H A D | audit.c | 155 struct audit_context *ctx; /* NULL or associated context */ 1038 static struct audit_buffer * audit_buffer_alloc(struct audit_context *ctx, 1113 static inline void audit_get_stamp(struct audit_context *ctx, 1131 * @ctx: audit_context (may be NULL) 1144 struct audit_buffer *audit_log_start(struct audit_context *ctx, gfp_t gfp_mask, 1494 void audit_log(struct audit_context *ctx, gfp_t gfp_mask, int type,
|
H A D | audit_watch.c | 274 audit_filter_inodes(current, current->audit_context);
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/microblaze/kernel/ |
H A D | ptrace.c | 136 if (unlikely(current->audit_context)) 148 if (unlikely(current->audit_context))
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/netlabel/ |
H A D | netlabel_user.c | 107 audit_buf = audit_log_start(current->audit_context, GFP_ATOMIC, type);
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/security/integrity/ima/ |
H A D | ima_audit.c | 43 ab = audit_log_start(current->audit_context, GFP_KERNEL, audit_msgno);
|
H A D | ima.h | 158 struct audit_context *actx)
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/um/kernel/ |
H A D | ptrace.c | 194 if (unlikely(current->audit_context)) {
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/mips/kernel/ |
H A D | ptrace.c | 545 if (unlikely(current->audit_context) && entryexit) 571 if (unlikely(current->audit_context) && !entryexit)
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/sh/kernel/ |
H A D | ptrace_32.c | 476 if (unlikely(current->audit_context)) 488 if (unlikely(current->audit_context))
|
H A D | ptrace_64.c | 450 if (unlikely(current->audit_context)) 462 if (unlikely(current->audit_context))
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/security/selinux/ss/ |
H A D | services.c | 490 ab = audit_log_start(current->audit_context, 709 audit_log(current->audit_context, GFP_ATOMIC, AUDIT_SELINUX_ERR, 855 audit_log(current->audit_context, 1320 audit_log(current->audit_context, GFP_ATOMIC, AUDIT_SELINUX_ERR, 2346 audit_log(current->audit_context, GFP_ATOMIC, 2485 audit_log(current->audit_context, GFP_ATOMIC, AUDIT_SELINUX_ERR, 2840 struct audit_context *actx)
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/security/ |
H A D | lsm_audit.c | 379 ab = audit_log_start(current->audit_context, GFP_ATOMIC, AUDIT_AVC);
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/sparc/kernel/ |
H A D | ptrace_64.c | 1071 if (unlikely(current->audit_context) && !ret) 1086 if (unlikely(current->audit_context)) {
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/s390/kernel/ |
H A D | ptrace.c | 676 if (unlikely(current->audit_context)) 687 if (unlikely(current->audit_context))
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/security/selinux/ |
H A D | selinuxfs.c | 165 audit_log(current->audit_context, GFP_KERNEL, AUDIT_MAC_STATUS, 239 audit_log(current->audit_context, GFP_KERNEL, AUDIT_MAC_STATUS, 352 audit_log(current->audit_context, GFP_KERNEL, AUDIT_MAC_POLICY_LOAD,
|
H A D | avc.c | 185 audit_log(current->audit_context, GFP_KERNEL, AUDIT_KERNEL, "AVC INITIALIZED\n");
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/powerpc/kernel/ |
H A D | ptrace.c | 1682 if (unlikely(current->audit_context)) { 1706 if (unlikely(current->audit_context))
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/x86/kernel/ |
H A D | ptrace.c | 1378 if (unlikely(current->audit_context)) { 1400 if (unlikely(current->audit_context))
|