Searched defs:ab (Results 1 - 14 of 14) sorted by relevance

/security/apparmor/
H A Daudit.c106 * @ab: audit buffer to fill (NOT NULL)
111 static void audit_pre(struct audit_buffer *ab, void *ca) argument
116 audit_log_format(ab, "apparmor=");
117 audit_log_string(ab, aa_audit_type[sa->aad->type]);
121 audit_log_format(ab, " operation=");
122 audit_log_string(ab, op_table[sa->aad->op]);
126 audit_log_format(ab, " info=");
127 audit_log_string(ab, sa->aad->info);
129 audit_log_format(ab, " error=%d", sa->aad->error);
135 audit_log_format(ab, " namespac
[all...]
H A Dipc.c25 static void audit_cb(struct audit_buffer *ab, void *va) argument
28 audit_log_format(ab, " target=");
29 audit_log_untrustedstring(ab, sa->aad->target);
H A Dcapability.c44 * @ab - audit buffer (NOT NULL)
47 static void audit_cb(struct audit_buffer *ab, void *va) argument
50 audit_log_format(ab, " capname=");
51 audit_log_untrustedstring(ab, capability_names[sa->u.cap]);
H A Dresource.c33 static void audit_cb(struct audit_buffer *ab, void *va) argument
37 audit_log_format(ab, " rlimit=%s value=%lu",
H A Dfile.c30 static void audit_file_mask(struct audit_buffer *ab, u32 mask) argument
57 audit_log_string(ab, str);
62 * @ab: audit_buffer (NOT NULL)
65 static void file_audit_cb(struct audit_buffer *ab, void *va) argument
71 audit_log_format(ab, " requested_mask=");
72 audit_file_mask(ab, sa->aad->fs.request);
75 audit_log_format(ab, " denied_mask=");
76 audit_file_mask(ab, sa->aad->fs.denied);
79 audit_log_format(ab, " fsuid=%d",
81 audit_log_format(ab, " oui
[all...]
H A Dpolicy_unpack.c70 static void audit_cb(struct audit_buffer *ab, void *va) argument
75 audit_log_format(ab, " name=");
76 audit_log_untrustedstring(ab, name->base.hname);
79 audit_log_format(ab, " offset=%ld", sa->aad->iface.pos);
/security/integrity/
H A Dintegrity_audit.c35 struct audit_buffer *ab; local
41 ab = audit_log_start(current->audit_context, GFP_KERNEL, audit_msgno);
42 audit_log_format(ab, "pid=%d uid=%u auid=%u ses=%u",
47 audit_log_task_context(ab);
48 audit_log_format(ab, " op=");
49 audit_log_string(ab, op);
50 audit_log_format(ab, " cause=");
51 audit_log_string(ab, cause);
52 audit_log_format(ab, " comm=");
53 audit_log_untrustedstring(ab, get_task_com
[all...]
/security/
H A Dlsm_audit.c187 static inline void print_ipv6_addr(struct audit_buffer *ab, argument
192 audit_log_format(ab, " %s=%pI6c", name1, addr);
194 audit_log_format(ab, " %s=%d", name2, ntohs(port));
197 static inline void print_ipv4_addr(struct audit_buffer *ab, __be32 addr, argument
201 audit_log_format(ab, " %s=%pI4", name1, &addr);
203 audit_log_format(ab, " %s=%d", name2, ntohs(port));
211 static void dump_common_audit_data(struct audit_buffer *ab, argument
223 audit_log_format(ab, " pid=%d comm=", task_pid_nr(tsk));
224 audit_log_untrustedstring(ab, tsk->comm);
230 audit_log_format(ab, " ke
413 struct audit_buffer *ab; local
[all...]
/security/integrity/ima/
H A Dima_api.c294 struct audit_buffer *ab; local
307 ab = audit_log_start(current->audit_context, GFP_KERNEL,
309 if (!ab)
312 audit_log_format(ab, "file=");
313 audit_log_untrustedstring(ab, filename);
314 audit_log_format(ab, " hash=");
316 audit_log_untrustedstring(ab, algo_hash);
318 audit_log_task_info(ab, current);
319 audit_log_end(ab);
H A Dima_policy.c433 static void ima_log_string(struct audit_buffer *ab, char *key, char *value) argument
435 audit_log_format(ab, "%s=", key);
436 audit_log_untrustedstring(ab, value);
437 audit_log_format(ab, " ");
442 struct audit_buffer *ab; local
446 ab = audit_log_start(NULL, GFP_KERNEL, AUDIT_INTEGRITY_RULE);
463 ima_log_string(ab, "action", "measure");
471 ima_log_string(ab, "action", "dont_measure");
479 ima_log_string(ab, "action", "appraise");
487 ima_log_string(ab, "actio
[all...]
/security/smack/
H A Dsmack_access.c306 * @ab : the audit_buffer
310 static void smack_log_callback(struct audit_buffer *ab, void *a) argument
314 audit_log_format(ab, "lsm=SMACK fn=%s action=%s",
317 audit_log_format(ab, " subject=");
318 audit_log_untrustedstring(ab, sad->subject);
319 audit_log_format(ab, " object=");
320 audit_log_untrustedstring(ab, sad->object);
322 audit_log_format(ab, " labels_differ");
324 audit_log_format(ab, " requested=%s", sad->request);
/security/selinux/
H A Davc.c109 static void avc_dump_av(struct audit_buffer *ab, u16 tclass, u32 av) argument
115 audit_log_format(ab, " null");
121 audit_log_format(ab, " {");
126 audit_log_format(ab, " %s", perms[i]);
134 audit_log_format(ab, " 0x%x", av);
136 audit_log_format(ab, " }");
145 static void avc_dump_query(struct audit_buffer *ab, u32 ssid, u32 tsid, u16 tclass) argument
153 audit_log_format(ab, "ssid=%d", ssid);
155 audit_log_format(ab, "scontext=%s", scontext);
161 audit_log_format(ab, " tsi
720 avc_audit_pre_callback(struct audit_buffer *ab, void *a) argument
736 avc_audit_post_callback(struct audit_buffer *ab, void *a) argument
[all...]
H A Dhooks.c3019 struct audit_buffer *ab; local
3035 ab = audit_log_start(current->audit_context, GFP_ATOMIC, AUDIT_SELINUX_ERR);
3036 audit_log_format(ab, "op=setxattr invalid_context=");
3037 audit_log_n_untrustedstring(ab, value, audit_size);
3038 audit_log_end(ab);
5694 struct audit_buffer *ab; local
5703 ab = audit_log_start(current->audit_context, GFP_ATOMIC, AUDIT_SELINUX_ERR);
5704 audit_log_format(ab, "op=fscreate invalid_context=");
5705 audit_log_n_untrustedstring(ab, value, audit_size);
5706 audit_log_end(ab);
[all...]
/security/selinux/ss/
H A Dservices.c470 struct audit_buffer *ab; local
506 ab = audit_log_start(current->audit_context,
508 if (!ab)
511 audit_log_format(ab, "op=security_compute_av reason=%s "
521 audit_log_format(ab, "%s%s",
527 audit_log_end(ab);

Completed in 108 milliseconds