/linux-4.4.14/kernel/ |
D | auditsc.c | 131 static int audit_match_perm(struct audit_context *ctx, int mask) in audit_match_perm() 174 static int audit_match_filetype(struct audit_context *ctx, int val) in audit_match_filetype() 202 static void audit_set_auditable(struct audit_context *ctx) in audit_set_auditable() 210 static int put_tree_ref(struct audit_context *ctx, struct audit_chunk *chunk) in put_tree_ref() 231 static int grow_tree_refs(struct audit_context *ctx) in grow_tree_refs() 248 static void unroll_tree_refs(struct audit_context *ctx, in unroll_tree_refs() 278 static void free_tree_refs(struct audit_context *ctx) in free_tree_refs() 287 static int match_tree_refs(struct audit_context *ctx, struct audit_tree *tree) in match_tree_refs() 313 struct audit_context *ctx) in audit_compare_uid() 337 struct audit_context *ctx) in audit_compare_gid() [all …]
|
D | audit.h | 108 struct audit_context { struct 213 extern void audit_log_name(struct audit_context *context, argument 339 extern void audit_filter_inodes(struct task_struct *, struct audit_context *);
|
D | audit.c | 181 struct audit_context *ctx; /* NULL or associated context */ 1248 static struct audit_buffer * audit_buffer_alloc(struct audit_context *ctx, in audit_buffer_alloc() 1315 static inline void audit_get_stamp(struct audit_context *ctx, in audit_get_stamp() 1358 struct audit_buffer *audit_log_start(struct audit_context *ctx, gfp_t gfp_mask, in audit_log_start() 1745 void audit_log_name(struct audit_context *context, struct audit_names *n, in audit_log_name() 1934 ab = audit_log_start(current->audit_context, GFP_KERNEL, in audit_log_link_denied() 1946 audit_log_name(current->audit_context, name, link, 0, NULL); in audit_log_link_denied() 2006 void audit_log(struct audit_context *ctx, gfp_t gfp_mask, int type, in audit_log()
|
D | audit_watch.c | 276 audit_filter_inodes(current, current->audit_context); in audit_update_watch()
|
D | fork.c | 1371 p->audit_context = NULL; in copy_process()
|
/linux-4.4.14/include/linux/ |
D | audit.h | 40 struct audit_context; 148 void *p = current->audit_context; in audit_dummy_context() 153 if (unlikely(task->audit_context)) in audit_free() 160 if (unlikely(current->audit_context)) in audit_syscall_entry() 165 if (unlikely(current->audit_context)) { in audit_syscall_exit() 228 extern int auditsc_get_stamp(struct audit_context *ctx, 386 static inline int auditsc_get_stamp(struct audit_context *ctx, in auditsc_get_stamp() 453 void audit_log(struct audit_context *ctx, gfp_t gfp_mask, int type, 456 extern struct audit_buffer *audit_log_start(struct audit_context *ctx, gfp_t gfp_mask, int type); 504 void audit_log(struct audit_context *ctx, gfp_t gfp_mask, int type, in audit_log() [all …]
|
D | selinux.h | 18 struct audit_context;
|
D | security.h | 39 struct audit_context; 1559 struct audit_context *actx); 1576 void *lsmrule, struct audit_context *actx) in security_audit_rule_match()
|
D | sched.h | 1180 struct audit_context; /* See audit.c */ 1581 struct audit_context *audit_context; member
|
D | lsm_hooks.h | 1613 struct audit_context *actx);
|
/linux-4.4.14/security/selinux/include/ |
D | audit.h | 55 struct audit_context *actx);
|
/linux-4.4.14/net/netlabel/ |
D | netlabel_user.c | 102 audit_buf = audit_log_start(current->audit_context, GFP_ATOMIC, type); in netlbl_audit_start_common()
|
/linux-4.4.14/security/integrity/ |
D | integrity_audit.c | 41 ab = audit_log_start(current->audit_context, GFP_KERNEL, audit_msgno); in integrity_audit_msg()
|
/linux-4.4.14/security/integrity/ima/ |
D | ima.h | 249 struct audit_context *actx) in security_filter_rule_match()
|
D | ima_api.c | 306 ab = audit_log_start(current->audit_context, GFP_KERNEL, in ima_audit_measurement()
|
/linux-4.4.14/security/selinux/ss/ |
D | services.c | 506 ab = audit_log_start(current->audit_context, in security_dump_masked_av() 767 audit_log(current->audit_context, GFP_ATOMIC, AUDIT_SELINUX_ERR, in security_validtrans_handle_fail() 914 audit_log(current->audit_context, in security_bounded_transition() 1528 audit_log(current->audit_context, GFP_ATOMIC, AUDIT_SELINUX_ERR, in compute_sid_handle_invalid_context() 2645 audit_log(current->audit_context, GFP_ATOMIC, in security_set_bools() 2779 audit_log(current->audit_context, in security_sid_mls_copy() 3144 struct audit_context *actx) in selinux_audit_rule_match()
|
/linux-4.4.14/security/ |
D | lsm_audit.c | 421 ab = audit_log_start(current->audit_context, GFP_ATOMIC | __GFP_NOWARN, in common_lsm_audit()
|
D | security.c | 1534 struct audit_context *actx) in security_audit_rule_match()
|
/linux-4.4.14/security/selinux/ |
D | selinuxfs.c | 176 audit_log(current->audit_context, GFP_KERNEL, AUDIT_MAC_STATUS, in sel_write_enforce() 308 audit_log(current->audit_context, GFP_KERNEL, AUDIT_MAC_STATUS, in sel_write_disable() 554 audit_log(current->audit_context, GFP_KERNEL, AUDIT_MAC_POLICY_LOAD, in sel_write_load()
|
D | avc.c | 201 audit_log(current->audit_context, GFP_KERNEL, AUDIT_KERNEL, "AVC INITIALIZED\n"); in avc_init()
|
D | hooks.c | 3026 ab = audit_log_start(current->audit_context, GFP_ATOMIC, AUDIT_SELINUX_ERR); in selinux_inode_setxattr() 5660 ab = audit_log_start(current->audit_context, GFP_ATOMIC, AUDIT_SELINUX_ERR); in selinux_setprocattr()
|
/linux-4.4.14/net/netfilter/ |
D | x_tables.c | 1067 ab = audit_log_start(current->audit_context, GFP_KERNEL, in xt_replace_table()
|
/linux-4.4.14/arch/powerpc/kernel/ |
D | asm-offsets.c | 77 DEFINE(AUDITCONTEXT, offsetof(struct task_struct, audit_context)); in main()
|
/linux-4.4.14/include/net/ |
D | xfrm.h | 700 audit_buf = audit_log_start(current->audit_context, GFP_ATOMIC, in xfrm_audit_start()
|
/linux-4.4.14/net/bridge/netfilter/ |
D | ebtables.c | 1069 ab = audit_log_start(current->audit_context, GFP_KERNEL, in do_replace_finish()
|
/linux-4.4.14/security/smack/ |
D | smack_lsm.c | 4458 struct audit_context *actx) in smack_audit_rule_match()
|
/linux-4.4.14/net/core/ |
D | dev.c | 5734 audit_log(current->audit_context, GFP_ATOMIC, in __dev_set_promiscuity()
|