audit 1439 drivers/scsi/bfa/bfa_defs_svc.h struct bfa_audit_aen_data_s audit; audit 4203 drivers/scsi/bfa/bfa_ioc.c aen_entry->aen_data.audit.pwwn = ioc->attr->pwwn; audit 4204 drivers/scsi/bfa/bfa_ioc.c aen_entry->aen_data.audit.partition_inst = inst; audit 4205 drivers/scsi/bfa/bfa_ioc.c aen_entry->aen_data.audit.partition_type = type; audit 117 include/net/iucv/iucv.h u32 audit; audit 1087 net/iucv/iucv.c msg->audit = (*(u32 *) &parm->purge.ipaudit) >> 8; audit 1666 net/iucv/iucv.c msg.audit = imc->ipaudit; audit 800 security/apparmor/apparmorfs.c perms.allow, perms.deny, perms.audit, perms.quiet); audit 75 security/apparmor/capability.c !cap_raised(profile->caps.audit, cap))) audit 293 security/apparmor/domain.c perms->audit = perms->quiet = perms->kill = 0; audit 645 security/apparmor/domain.c goto audit; audit 667 security/apparmor/domain.c goto audit; audit 685 security/apparmor/domain.c goto audit; audit 719 security/apparmor/domain.c goto audit; audit 732 security/apparmor/domain.c audit: audit 777 security/apparmor/domain.c goto audit; audit 784 security/apparmor/domain.c goto audit; audit 795 security/apparmor/domain.c goto audit; audit 808 security/apparmor/domain.c audit: audit 941 security/apparmor/domain.c goto audit; audit 953 security/apparmor/domain.c goto audit; audit 986 security/apparmor/domain.c audit: audit 1019 security/apparmor/domain.c goto audit; audit 1036 security/apparmor/domain.c audit: audit 1374 security/apparmor/domain.c goto audit; audit 1381 security/apparmor/domain.c goto audit; audit 1410 security/apparmor/domain.c goto audit; audit 1452 security/apparmor/domain.c goto audit; audit 1465 security/apparmor/domain.c audit: audit 120 security/apparmor/file.c u32 mask = perms->audit; audit 236 security/apparmor/file.c perms.audit = map_old_perms(dfa_user_audit(dfa, state)); audit 241 security/apparmor/file.c perms.audit = map_old_perms(dfa_other_audit(dfa, state)); audit 380 security/apparmor/file.c goto audit; audit 386 security/apparmor/file.c goto audit; audit 394 security/apparmor/file.c goto audit; audit 403 security/apparmor/file.c lperms.audit = perms.audit; audit 410 security/apparmor/file.c goto audit; audit 429 security/apparmor/file.c goto audit; audit 435 security/apparmor/file.c goto audit; audit 441 security/apparmor/file.c audit: audit 30 security/apparmor/include/capability.h kernel_cap_t audit; audit 109 security/apparmor/include/file.h #define COMBINED_PERM_MASK(X) ((X).allow | (X).audit | (X).quiet | (X).kill) audit 83 security/apparmor/include/net.h u8 audit; audit 68 security/apparmor/include/perms.h u32 audit; /* set only when allow is set */ audit 139 security/apparmor/include/policy.h enum audit_mode audit; audit 301 security/apparmor/include/policy.h return profile->audit; audit 294 security/apparmor/lib.c perms->audit = ALL_PERMS_MASK; audit 300 security/apparmor/lib.c perms->audit = 0; audit 330 security/apparmor/lib.c .audit = dfa_user_audit(dfa, state), audit 338 security/apparmor/lib.c perms->audit |= map_other(dfa_other_audit(dfa, state)); audit 352 security/apparmor/lib.c accum->audit |= addend->audit & addend->allow; audit 371 security/apparmor/lib.c accum->audit |= addend->audit & accum->allow; audit 438 security/apparmor/lib.c request &= perms->audit; audit 1301 security/apparmor/lsm.c module_param_call(audit, param_set_audit, param_get_audit, audit 140 security/apparmor/mount.c u32 mask = perms->audit; audit 173 security/apparmor/mount.c if (data && (perms->audit & AA_AUDIT_DATA)) audit 218 security/apparmor/mount.c .audit = dfa_user_audit(dfa, state), audit 335 security/apparmor/mount.c goto audit; audit 340 security/apparmor/mount.c goto audit; audit 349 security/apparmor/mount.c goto audit; audit 353 security/apparmor/mount.c audit: audit 570 security/apparmor/mount.c goto audit; audit 579 security/apparmor/mount.c audit: audit 630 security/apparmor/mount.c goto audit; audit 635 security/apparmor/mount.c goto audit; audit 648 security/apparmor/mount.c audit: audit 234 security/apparmor/net.c if (profile->secmark[i].audit) audit 235 security/apparmor/net.c perms.audit = ALL_PERMS_MASK; audit 588 security/apparmor/policy_unpack.c if (!unpack_u8(e, &profile->secmark[i].audit, NULL)) audit 755 security/apparmor/policy_unpack.c profile->audit = AUDIT_ALL; audit 771 security/apparmor/policy_unpack.c if (!unpack_u32(e, &(profile->caps.audit.cap[0]), NULL)) audit 783 security/apparmor/policy_unpack.c if (!unpack_u32(e, &(profile->caps.audit.cap[1]), NULL)) audit 20 security/integrity/integrity_audit.c unsigned long audit; audit 22 security/integrity/integrity_audit.c if (!kstrtoul(str, 0, &audit)) audit 23 security/integrity/integrity_audit.c integrity_audit_info = audit ? 1 : 0; audit 3127 security/selinux/hooks.c static bool has_cap_mac_admin(bool audit) audit 3130 security/selinux/hooks.c unsigned int opts = audit ? CAP_OPT_NONE : CAP_OPT_NOAUDIT;