/security/apparmor/ |
H A D | audit.c | 106 * @ab: audit buffer to fill (NOT NULL) 111 static void audit_pre(struct audit_buffer *ab, void *ca) argument 116 audit_log_format(ab, "apparmor="); 117 audit_log_string(ab, aa_audit_type[sa->aad->type]); 121 audit_log_format(ab, " operation="); 122 audit_log_string(ab, op_table[sa->aad->op]); 126 audit_log_format(ab, " info="); 127 audit_log_string(ab, sa->aad->info); 129 audit_log_format(ab, " error=%d", sa->aad->error); 135 audit_log_format(ab, " namespac [all...] |
H A D | ipc.c | 25 static void audit_cb(struct audit_buffer *ab, void *va) argument 28 audit_log_format(ab, " target="); 29 audit_log_untrustedstring(ab, sa->aad->target);
|
H A D | capability.c | 44 * @ab - audit buffer (NOT NULL) 47 static void audit_cb(struct audit_buffer *ab, void *va) argument 50 audit_log_format(ab, " capname="); 51 audit_log_untrustedstring(ab, capability_names[sa->u.cap]);
|
H A D | resource.c | 33 static void audit_cb(struct audit_buffer *ab, void *va) argument 37 audit_log_format(ab, " rlimit=%s value=%lu",
|
H A D | file.c | 30 static void audit_file_mask(struct audit_buffer *ab, u32 mask) argument 57 audit_log_string(ab, str); 62 * @ab: audit_buffer (NOT NULL) 65 static void file_audit_cb(struct audit_buffer *ab, void *va) argument 71 audit_log_format(ab, " requested_mask="); 72 audit_file_mask(ab, sa->aad->fs.request); 75 audit_log_format(ab, " denied_mask="); 76 audit_file_mask(ab, sa->aad->fs.denied); 79 audit_log_format(ab, " fsuid=%d", 81 audit_log_format(ab, " oui [all...] |
H A D | policy_unpack.c | 70 static void audit_cb(struct audit_buffer *ab, void *va) argument 75 audit_log_format(ab, " name="); 76 audit_log_untrustedstring(ab, name->base.hname); 79 audit_log_format(ab, " offset=%ld", sa->aad->iface.pos);
|
/security/integrity/ |
H A D | integrity_audit.c | 35 struct audit_buffer *ab; local 41 ab = audit_log_start(current->audit_context, GFP_KERNEL, audit_msgno); 42 audit_log_format(ab, "pid=%d uid=%u auid=%u ses=%u", 47 audit_log_task_context(ab); 48 audit_log_format(ab, " op="); 49 audit_log_string(ab, op); 50 audit_log_format(ab, " cause="); 51 audit_log_string(ab, cause); 52 audit_log_format(ab, " comm="); 53 audit_log_untrustedstring(ab, get_task_com [all...] |
/security/ |
H A D | lsm_audit.c | 187 static inline void print_ipv6_addr(struct audit_buffer *ab, argument 192 audit_log_format(ab, " %s=%pI6c", name1, addr); 194 audit_log_format(ab, " %s=%d", name2, ntohs(port)); 197 static inline void print_ipv4_addr(struct audit_buffer *ab, __be32 addr, argument 201 audit_log_format(ab, " %s=%pI4", name1, &addr); 203 audit_log_format(ab, " %s=%d", name2, ntohs(port)); 211 static void dump_common_audit_data(struct audit_buffer *ab, argument 223 audit_log_format(ab, " pid=%d comm=", task_pid_nr(tsk)); 224 audit_log_untrustedstring(ab, tsk->comm); 230 audit_log_format(ab, " ke 413 struct audit_buffer *ab; local [all...] |
/security/integrity/ima/ |
H A D | ima_api.c | 294 struct audit_buffer *ab; local 307 ab = audit_log_start(current->audit_context, GFP_KERNEL, 309 if (!ab) 312 audit_log_format(ab, "file="); 313 audit_log_untrustedstring(ab, filename); 314 audit_log_format(ab, " hash="); 316 audit_log_untrustedstring(ab, algo_hash); 318 audit_log_task_info(ab, current); 319 audit_log_end(ab);
|
H A D | ima_policy.c | 433 static void ima_log_string(struct audit_buffer *ab, char *key, char *value) argument 435 audit_log_format(ab, "%s=", key); 436 audit_log_untrustedstring(ab, value); 437 audit_log_format(ab, " "); 442 struct audit_buffer *ab; local 446 ab = audit_log_start(NULL, GFP_KERNEL, AUDIT_INTEGRITY_RULE); 463 ima_log_string(ab, "action", "measure"); 471 ima_log_string(ab, "action", "dont_measure"); 479 ima_log_string(ab, "action", "appraise"); 487 ima_log_string(ab, "actio [all...] |
/security/smack/ |
H A D | smack_access.c | 306 * @ab : the audit_buffer 310 static void smack_log_callback(struct audit_buffer *ab, void *a) argument 314 audit_log_format(ab, "lsm=SMACK fn=%s action=%s", 317 audit_log_format(ab, " subject="); 318 audit_log_untrustedstring(ab, sad->subject); 319 audit_log_format(ab, " object="); 320 audit_log_untrustedstring(ab, sad->object); 322 audit_log_format(ab, " labels_differ"); 324 audit_log_format(ab, " requested=%s", sad->request);
|
/security/selinux/ |
H A D | avc.c | 109 static void avc_dump_av(struct audit_buffer *ab, u16 tclass, u32 av) argument 115 audit_log_format(ab, " null"); 121 audit_log_format(ab, " {"); 126 audit_log_format(ab, " %s", perms[i]); 134 audit_log_format(ab, " 0x%x", av); 136 audit_log_format(ab, " }"); 145 static void avc_dump_query(struct audit_buffer *ab, u32 ssid, u32 tsid, u16 tclass) argument 153 audit_log_format(ab, "ssid=%d", ssid); 155 audit_log_format(ab, "scontext=%s", scontext); 161 audit_log_format(ab, " tsi 720 avc_audit_pre_callback(struct audit_buffer *ab, void *a) argument 736 avc_audit_post_callback(struct audit_buffer *ab, void *a) argument [all...] |
H A D | hooks.c | 3019 struct audit_buffer *ab; local 3035 ab = audit_log_start(current->audit_context, GFP_ATOMIC, AUDIT_SELINUX_ERR); 3036 audit_log_format(ab, "op=setxattr invalid_context="); 3037 audit_log_n_untrustedstring(ab, value, audit_size); 3038 audit_log_end(ab); 5694 struct audit_buffer *ab; local 5703 ab = audit_log_start(current->audit_context, GFP_ATOMIC, AUDIT_SELINUX_ERR); 5704 audit_log_format(ab, "op=fscreate invalid_context="); 5705 audit_log_n_untrustedstring(ab, value, audit_size); 5706 audit_log_end(ab); [all...] |
/security/selinux/ss/ |
H A D | services.c | 470 struct audit_buffer *ab; local 506 ab = audit_log_start(current->audit_context, 508 if (!ab) 511 audit_log_format(ab, "op=security_compute_av reason=%s " 521 audit_log_format(ab, "%s%s", 527 audit_log_end(ab);
|