/linux-4.1.27/kernel/ |
H A D | auditsc.c | 131 static int audit_match_perm(struct audit_context *ctx, int mask) audit_match_perm() 174 static int audit_match_filetype(struct audit_context *ctx, int val) audit_match_filetype() 202 static void audit_set_auditable(struct audit_context *ctx) audit_set_auditable() 210 static int put_tree_ref(struct audit_context *ctx, struct audit_chunk *chunk) put_tree_ref() 231 static int grow_tree_refs(struct audit_context *ctx) grow_tree_refs() 248 static void unroll_tree_refs(struct audit_context *ctx, unroll_tree_refs() 278 static void free_tree_refs(struct audit_context *ctx) free_tree_refs() 287 static int match_tree_refs(struct audit_context *ctx, struct audit_tree *tree) match_tree_refs() 313 struct audit_context *ctx) audit_compare_uid() 337 struct audit_context *ctx) audit_compare_gid() 361 struct audit_context *ctx, audit_field_compare() 440 struct audit_context *ctx, audit_filter_rules() 748 struct audit_context *ctx, audit_filter_syscall() 779 struct audit_context *ctx) { audit_filter_inode_name() 804 void audit_filter_inodes(struct task_struct *tsk, struct audit_context *ctx) audit_filter_inodes() 821 static inline struct audit_context *audit_take_context(struct task_struct *tsk, audit_take_context() 825 struct audit_context *context = tsk->audit_context; audit_take_context() 854 tsk->audit_context = NULL; audit_take_context() 858 static inline void audit_proctitle_free(struct audit_context *context) audit_proctitle_free() 865 static inline void audit_free_names(struct audit_context *context) audit_free_names() 882 static inline void audit_free_aux(struct audit_context *context) audit_free_aux() 896 static inline struct audit_context *audit_alloc_context(enum audit_state state) audit_alloc_context() 898 struct audit_context *context; audit_alloc_context() 921 struct audit_context *context; audit_alloc() 941 tsk->audit_context = context; audit_alloc() 946 static inline void audit_free_context(struct audit_context *context) audit_free_context() 958 static int audit_log_pid_context(struct audit_context *context, pid_t pid, audit_log_pid_context() 1001 static int audit_log_single_execve_arg(struct audit_context *context, audit_log_single_execve_arg() 1137 static void audit_log_execve_info(struct audit_context *context, audit_log_execve_info() 1171 static void show_special(struct audit_context *context, int *call_panic) show_special() 1284 struct audit_context *context) audit_log_proctitle() 1324 static void audit_log_exit(struct audit_context *context, struct task_struct *tsk) audit_log_exit() 1459 struct audit_context *context; __audit_free() 1498 struct audit_context *context = tsk->audit_context; __audit_syscall_entry() 1546 struct audit_context *context; __audit_syscall_exit() 1580 tsk->audit_context = context; __audit_syscall_exit() 1586 struct audit_context *context; handle_one() 1592 context = current->audit_context; handle_one() 1616 struct audit_context *context; handle_path() 1623 context = current->audit_context; handle_path() 1671 static struct audit_names *audit_alloc_name(struct audit_context *context, audit_alloc_name() 1705 struct audit_context *context = current->audit_context; __audit_reusename() 1728 struct audit_context *context = current->audit_context; __audit_getname() 1756 struct audit_context *context = current->audit_context; __audit_inode() 1855 struct audit_context *context = current->audit_context; __audit_inode_child() 1933 * auditsc_get_stamp - get local copies of audit_context values 1934 * @ctx: audit_context for the task 1935 * @t: timespec to store time recorded in the audit_context 1936 * @serial: serial value that is recorded in the audit_context 1940 int auditsc_get_stamp(struct audit_context *ctx, auditsc_get_stamp() 2002 * audit_set_loginuid - set current task's audit_context loginuid 2043 struct audit_context *context = current->audit_context; __audit_mq_open() 2067 struct audit_context *context = current->audit_context; __audit_mq_sendrecv() 2091 struct audit_context *context = current->audit_context; __audit_mq_notify() 2110 struct audit_context *context = current->audit_context; __audit_mq_getsetattr() 2123 struct audit_context *context = current->audit_context; __audit_ipc_obj() 2143 struct audit_context *context = current->audit_context; __audit_ipc_set_perm() 2154 struct audit_context *context = current->audit_context; __audit_bprm() 2169 struct audit_context *context = current->audit_context; __audit_socketcall() 2187 struct audit_context *context = current->audit_context; __audit_fd_pair() 2201 struct audit_context *context = current->audit_context; __audit_sockaddr() 2217 struct audit_context *context = current->audit_context; __audit_ptrace() 2239 struct audit_context *ctx = tsk->audit_context; __audit_signal_info() 2256 * in audit_context */ __audit_signal_info() 2305 struct audit_context *context = current->audit_context; __audit_log_bprm_fcaps() 2343 struct audit_context *context = current->audit_context; __audit_log_capset() 2353 struct audit_context *context = current->audit_context; __audit_mmap_fd() 2422 struct audit_context *ctx = current->audit_context; audit_killed_trees()
|
H A D | audit.h | 1 /* audit -- definition of audit_context structure and supporting types 27 /* AUDIT_NAMES is the number of slots we reserve in the audit_context 32 /* At task start time, the audit_state is set in the audit_context using 36 AUDIT_DISABLED, /* Do not create per-task audit_context. 39 AUDIT_BUILD_CONTEXT, /* Create the per-task audit_context, 45 AUDIT_RECORD_CONTEXT /* Create the per-task audit_context, 77 struct list_head list; /* audit_context->names_list */ 107 struct audit_context { struct 212 extern void audit_log_name(struct audit_context *context, 321 extern void audit_filter_inodes(struct task_struct *, struct audit_context *);
|
H A D | audit.c | 181 struct audit_context *ctx; /* NULL or associated context */ 1234 static struct audit_buffer * audit_buffer_alloc(struct audit_context *ctx, audit_buffer_alloc() 1301 static inline void audit_get_stamp(struct audit_context *ctx, audit_get_stamp() 1331 * @ctx: audit_context (may be NULL) 1344 struct audit_buffer *audit_log_start(struct audit_context *ctx, gfp_t gfp_mask, audit_log_start() 1725 * @context: audit_context for the task 1731 void audit_log_name(struct audit_context *context, struct audit_names *n, audit_log_name() 1920 ab = audit_log_start(current->audit_context, GFP_KERNEL, audit_log_link_denied() 1932 audit_log_name(current->audit_context, name, link, 0, NULL); audit_log_link_denied() 1992 void audit_log(struct audit_context *ctx, gfp_t gfp_mask, int type, audit_log()
|
H A D | audit_watch.c | 277 audit_filter_inodes(current, current->audit_context); audit_update_watch()
|
H A D | fork.c | 1367 p->audit_context = NULL; copy_process()
|
/linux-4.1.27/include/linux/ |
H A D | selinux.h | 18 struct audit_context;
|
H A D | audit.h | 37 struct audit_context; 144 void *p = current->audit_context; audit_dummy_context() 149 if (unlikely(task->audit_context)) audit_free() 156 if (unlikely(current->audit_context)) audit_syscall_entry() 161 if (unlikely(current->audit_context)) { audit_syscall_exit() 224 extern int auditsc_get_stamp(struct audit_context *ctx, 382 static inline int auditsc_get_stamp(struct audit_context *ctx, auditsc_get_stamp() 449 void audit_log(struct audit_context *ctx, gfp_t gfp_mask, int type, 452 extern struct audit_buffer *audit_log_start(struct audit_context *ctx, gfp_t gfp_mask, int type); 500 void audit_log(struct audit_context *ctx, gfp_t gfp_mask, int type, audit_log() 503 static inline struct audit_buffer *audit_log_start(struct audit_context *ctx, audit_log_start()
|
H A D | sched.h | 1109 struct audit_context; /* See audit.c */ prefetch_stack() 1498 struct audit_context *audit_context; member in struct:task_struct
|
H A D | security.h | 38 struct audit_context; 1755 struct audit_context *actx); 3140 struct audit_context *actx); 3157 void *lsmrule, struct audit_context *actx) security_audit_rule_match()
|
/linux-4.1.27/security/integrity/ |
H A D | integrity_audit.c | 41 ab = audit_log_start(current->audit_context, GFP_KERNEL, audit_msgno); integrity_audit_msg()
|
/linux-4.1.27/security/selinux/include/ |
H A D | audit.h | 55 struct audit_context *actx);
|
/linux-4.1.27/net/netlabel/ |
H A D | netlabel_user.c | 102 audit_buf = audit_log_start(current->audit_context, GFP_ATOMIC, type); netlbl_audit_start_common()
|
/linux-4.1.27/security/integrity/ima/ |
H A D | ima.h | 242 struct audit_context *actx) security_filter_rule_match()
|
H A D | ima_api.c | 306 ab = audit_log_start(current->audit_context, GFP_KERNEL, ima_audit_measurement()
|
/linux-4.1.27/security/ |
H A D | lsm_audit.c | 406 ab = audit_log_start(current->audit_context, GFP_ATOMIC | __GFP_NOWARN, common_lsm_audit()
|
H A D | capability.c | 930 struct audit_context *actx) cap_audit_rule_match()
|
H A D | security.c | 1486 struct audit_context *actx) security_audit_rule_match()
|
/linux-4.1.27/security/selinux/ss/ |
H A D | services.c | 505 ab = audit_log_start(current->audit_context, security_dump_masked_av() 730 audit_log(current->audit_context, GFP_ATOMIC, AUDIT_SELINUX_ERR, security_validtrans_handle_fail() 877 audit_log(current->audit_context, security_bounded_transition() 1353 audit_log(current->audit_context, GFP_ATOMIC, AUDIT_SELINUX_ERR, compute_sid_handle_invalid_context() 2476 audit_log(current->audit_context, GFP_ATOMIC, security_set_bools() 2610 audit_log(current->audit_context, security_sid_mls_copy() 2975 struct audit_context *actx) selinux_audit_rule_match()
|
/linux-4.1.27/security/selinux/ |
H A D | selinuxfs.c | 176 audit_log(current->audit_context, GFP_KERNEL, AUDIT_MAC_STATUS, sel_write_enforce() 308 audit_log(current->audit_context, GFP_KERNEL, AUDIT_MAC_STATUS, sel_write_disable() 554 audit_log(current->audit_context, GFP_KERNEL, AUDIT_MAC_POLICY_LOAD, sel_write_load()
|
H A D | avc.c | 175 audit_log(current->audit_context, GFP_KERNEL, AUDIT_KERNEL, "AVC INITIALIZED\n"); avc_init()
|
H A D | hooks.c | 3030 ab = audit_log_start(current->audit_context, GFP_ATOMIC, AUDIT_SELINUX_ERR); selinux_inode_setxattr() 5646 ab = audit_log_start(current->audit_context, GFP_ATOMIC, AUDIT_SELINUX_ERR); selinux_setprocattr()
|
/linux-4.1.27/arch/x86/kernel/ |
H A D | vm86_32.c | 334 if (unlikely(current->audit_context)) do_sys_vm86()
|
/linux-4.1.27/arch/powerpc/kernel/ |
H A D | asm-offsets.c | 77 DEFINE(AUDITCONTEXT, offsetof(struct task_struct, audit_context)); main()
|
/linux-4.1.27/net/netfilter/ |
H A D | x_tables.c | 836 ab = audit_log_start(current->audit_context, GFP_KERNEL, xt_replace_table()
|
/linux-4.1.27/include/net/ |
H A D | xfrm.h | 697 audit_buf = audit_log_start(current->audit_context, GFP_ATOMIC, xfrm_audit_start()
|
/linux-4.1.27/net/bridge/netfilter/ |
H A D | ebtables.c | 1067 ab = audit_log_start(current->audit_context, GFP_KERNEL, do_replace_finish()
|
/linux-4.1.27/security/smack/ |
H A D | smack_lsm.c | 4147 struct audit_context *actx) smack_audit_rule_match()
|
/linux-4.1.27/net/core/ |
H A D | dev.c | 5546 audit_log(current->audit_context, GFP_ATOMIC, __dev_set_promiscuity()
|