f_val 459 kernel/auditfilter.c u32 f_val; f_val 468 kernel/auditfilter.c f_val = data->values[i]; f_val 471 kernel/auditfilter.c if ((f->type == AUDIT_LOGINUID) && (f_val == AUDIT_UID_UNSET)) { f_val 473 kernel/auditfilter.c f_val = 0; f_val 489 kernel/auditfilter.c f->uid = make_kuid(current_user_ns(), f_val); f_val 498 kernel/auditfilter.c f->gid = make_kgid(current_user_ns(), f_val); f_val 503 kernel/auditfilter.c f->val = f_val; f_val 516 kernel/auditfilter.c str = audit_unpack_string(&bufp, &remain, f_val); f_val 521 kernel/auditfilter.c entry->rule.buflen += f_val; f_val 535 kernel/auditfilter.c str = audit_unpack_string(&bufp, &remain, f_val); f_val 540 kernel/auditfilter.c err = audit_to_watch(&entry->rule, str, f_val, f->op); f_val 545 kernel/auditfilter.c entry->rule.buflen += f_val; f_val 548 kernel/auditfilter.c str = audit_unpack_string(&bufp, &remain, f_val); f_val 557 kernel/auditfilter.c entry->rule.buflen += f_val; f_val 560 kernel/auditfilter.c f->val = f_val; f_val 566 kernel/auditfilter.c if (entry->rule.filterkey || f_val > AUDIT_MAX_KEY_LEN) f_val 568 kernel/auditfilter.c str = audit_unpack_string(&bufp, &remain, f_val); f_val 573 kernel/auditfilter.c entry->rule.buflen += f_val; f_val 577 kernel/auditfilter.c if (entry->rule.exe || f_val > PATH_MAX) f_val 579 kernel/auditfilter.c str = audit_unpack_string(&bufp, &remain, f_val); f_val 584 kernel/auditfilter.c audit_mark = audit_alloc_mark(&entry->rule, str, f_val); f_val 590 kernel/auditfilter.c entry->rule.buflen += f_val; f_val 594 kernel/auditfilter.c f->val = f_val;