| /security/ipe/ |
| A D | audit.c | 74 ipe_digest_audit(ab, rh); in audit_dmv_roothash() 85 ipe_digest_audit(ab, d); in audit_fsv_digest() 141 if (!ab) in ipe_audit_match() 164 audit_rule(ab, r); in ipe_audit_match() 172 audit_log_end(ab); in ipe_audit_match() 207 if (!ab) in ipe_audit_policy_activation() 226 audit_log_end(ab); in ipe_audit_policy_activation() 240 if (!ab) in ipe_audit_policy_load() 254 audit_log_end(ab); in ipe_audit_policy_load() 267 if (!ab) in ipe_audit_enforce() [all …]
|
| A D | digest.c | 113 void ipe_digest_audit(struct audit_buffer *ab, const struct digest_info *info) in ipe_digest_audit() argument 115 audit_log_untrustedstring(ab, info->alg); in ipe_digest_audit() 116 audit_log_format(ab, ":"); in ipe_digest_audit() 117 audit_log_n_hex(ab, info->digest, info->digest_len); in ipe_digest_audit()
|
| A D | digest.h | 22 void ipe_digest_audit(struct audit_buffer *ab, const struct digest_info *val);
|
| /security/ |
| A D | lsm_audit.c | 203 audit_log_format(ab, " dev="); in audit_log_lsm_data() 216 audit_log_format(ab, " dev="); in audit_log_lsm_data() 229 audit_log_format(ab, " dev="); in audit_log_lsm_data() 266 audit_log_format(ab, " dev="); in audit_log_lsm_data() 421 audit_log_lsm_data(ab, a); in dump_common_audit_data() 437 struct audit_buffer *ab; in common_lsm_audit() local 445 if (ab == NULL) in common_lsm_audit() 449 pre_audit(ab, a); in common_lsm_audit() 451 dump_common_audit_data(ab, a); in common_lsm_audit() 454 post_audit(ab, a); in common_lsm_audit() [all …]
|
| /security/integrity/ |
| A D | integrity_audit.c | 41 struct audit_buffer *ab; in integrity_audit_message() local 48 if (!ab) in integrity_audit_message() 50 audit_log_format(ab, "pid=%d uid=%u auid=%u ses=%u", in integrity_audit_message() 55 audit_log_task_context(ab); in integrity_audit_message() 56 audit_log_format(ab, " op=%s cause=%s comm=", op, cause); in integrity_audit_message() 59 audit_log_format(ab, " name="); in integrity_audit_message() 60 audit_log_untrustedstring(ab, fname); in integrity_audit_message() 63 audit_log_format(ab, " dev="); in integrity_audit_message() 64 audit_log_untrustedstring(ab, inode->i_sb->s_id); in integrity_audit_message() 65 audit_log_format(ab, " ino=%lu", inode->i_ino); in integrity_audit_message() [all …]
|
| /security/apparmor/ |
| A D | net.c | 82 audit_log_format(ab, " %s=none", str); in audit_unix_addr() 84 audit_log_format(ab, " %s=", str); in audit_unix_addr() 87 audit_log_format(ab, " %s=\"@", str); in audit_unix_addr() 91 audit_log_format(ab, "%.*s", len - 1, in audit_unix_addr() 93 audit_log_format(ab, "\""); in audit_unix_addr() 108 audit_unix_addr(ab, str, NULL, 0); in audit_unix_sk_addr() 120 audit_log_format(ab, " family=\"%s\"", in audit_net_cb() 139 audit_log_format(ab, " denied_mask="); in audit_net_cb() 146 audit_unix_addr(ab, "addr", in audit_net_cb() 152 audit_unix_addr(ab, "peer_addr", in audit_net_cb() [all …]
|
| A D | audit.c | 97 audit_log_format(ab, "apparmor=\"%s\"", in audit_pre() 102 audit_log_format(ab, " operation=\"%s\"", ad->op); in audit_pre() 105 audit_log_format(ab, " class=\"%s\"", in audit_pre() 111 audit_log_format(ab, " info=\"%s\"", ad->info); in audit_pre() 113 audit_log_format(ab, " error=%d", ad->error); in audit_pre() 123 audit_log_format(ab, " namespace="); in audit_pre() 124 audit_log_untrustedstring(ab, in audit_pre() 127 audit_log_format(ab, " profile="); in audit_pre() 130 audit_log_format(ab, " label="); in audit_pre() 137 audit_log_format(ab, " name="); in audit_pre() [all …]
|
| A D | mount.c | 30 audit_log_format(ab, "ro"); in audit_mnt_flags() 32 audit_log_format(ab, "rw"); in audit_mnt_flags() 34 audit_log_format(ab, ", nosuid"); in audit_mnt_flags() 36 audit_log_format(ab, ", nodev"); in audit_mnt_flags() 38 audit_log_format(ab, ", noexec"); in audit_mnt_flags() 40 audit_log_format(ab, ", sync"); in audit_mnt_flags() 42 audit_log_format(ab, ", remount"); in audit_mnt_flags() 44 audit_log_format(ab, ", mand"); in audit_mnt_flags() 56 audit_log_format(ab, ", move"); in audit_mnt_flags() 60 audit_log_format(ab, ", acl"); in audit_mnt_flags() [all …]
|
| A D | ipc.c | 52 static void audit_signal_cb(struct audit_buffer *ab, void *va) in audit_signal_cb() argument 58 audit_log_format(ab, " requested_mask=\"%s\"", in audit_signal_cb() 61 audit_log_format(ab, " denied_mask=\"%s\"", in audit_signal_cb() 66 audit_log_format(ab, "signal=unknown(%d)", in audit_signal_cb() 69 audit_log_format(ab, " signal=%s", sig_names[ad->signal]); in audit_signal_cb() 71 audit_log_format(ab, " signal=rtmin+%d", in audit_signal_cb() 73 audit_log_format(ab, " peer="); in audit_signal_cb() 74 aa_label_xaudit(ab, labels_ns(ad->subj_label), ad->peer, in audit_signal_cb()
|
| A D | task.c | 205 static void audit_ptrace_cb(struct audit_buffer *ab, void *va) in audit_ptrace_cb() argument 211 audit_log_format(ab, " requested_mask=\"%s\"", in audit_ptrace_cb() 215 audit_log_format(ab, " denied_mask=\"%s\"", in audit_ptrace_cb() 219 audit_log_format(ab, " peer="); in audit_ptrace_cb() 220 aa_label_xaudit(ab, labels_ns(ad->subj_label), ad->peer, in audit_ptrace_cb() 304 static void audit_ns_cb(struct audit_buffer *ab, void *va) in audit_ns_cb() argument 309 audit_log_format(ab, " requested=\"userns_create\""); in audit_ns_cb() 312 audit_log_format(ab, " denied=\"userns_create\""); in audit_ns_cb()
|
| A D | lib.c | 318 void aa_audit_perm_names(struct audit_buffer *ab, const char * const *names, in aa_audit_perm_names() argument 327 audit_log_format(ab, fmt, names[i]); in aa_audit_perm_names() 336 void aa_audit_perm_mask(struct audit_buffer *ab, u32 mask, const char *chrs, in aa_audit_perm_mask() argument 341 audit_log_format(ab, "\""); in aa_audit_perm_mask() 345 audit_log_format(ab, "%s", str); in aa_audit_perm_mask() 347 audit_log_format(ab, " "); in aa_audit_perm_mask() 350 aa_audit_perm_names(ab, names, mask & namesmask); in aa_audit_perm_mask() 351 audit_log_format(ab, "\""); in aa_audit_perm_mask()
|
| A D | resource.c | 30 static void audit_cb(struct audit_buffer *ab, void *va) in audit_cb() argument 35 audit_log_format(ab, " rlimit=%s value=%lu", in audit_cb() 38 audit_log_format(ab, " peer="); in audit_cb() 39 aa_label_xaudit(ab, labels_ns(ad->subj_label), ad->peer, in audit_cb()
|
| A D | file.c | 45 static void file_audit_cb(struct audit_buffer *ab, void *va) in file_audit_cb() argument 55 audit_log_format(ab, " requested_mask=\"%s\"", str); in file_audit_cb() 60 audit_log_format(ab, " denied_mask=\"%s\"", str); in file_audit_cb() 63 audit_log_format(ab, " fsuid=%d", in file_audit_cb() 65 audit_log_format(ab, " ouid=%d", in file_audit_cb() 70 audit_log_format(ab, " target="); in file_audit_cb() 71 aa_label_xaudit(ab, labels_ns(ad->subj_label), ad->peer, in file_audit_cb() 74 audit_log_format(ab, " target="); in file_audit_cb() 75 audit_log_untrustedstring(ab, ad->fs.target); in file_audit_cb()
|
| A D | capability.c | 47 static void audit_cb(struct audit_buffer *ab, void *va) in audit_cb() argument 51 audit_log_format(ab, " capname="); in audit_cb() 52 audit_log_untrustedstring(ab, capability_names[sa->u.cap]); in audit_cb()
|
| A D | policy_unpack.c | 35 static void audit_cb(struct audit_buffer *ab, void *va) in audit_cb() argument 41 audit_log_format(ab, " ns="); in audit_cb() 42 audit_log_untrustedstring(ab, ad->iface.ns); in audit_cb() 45 audit_log_format(ab, " name="); in audit_cb() 46 audit_log_untrustedstring(ab, ad->name); in audit_cb() 49 audit_log_format(ab, " offset=%ld", ad->iface.pos); in audit_cb()
|
| A D | policy.c | 779 static void audit_cb(struct audit_buffer *ab, void *va) in audit_cb() argument 785 audit_log_format(ab, " ns="); in audit_cb() 786 audit_log_untrustedstring(ab, ad->iface.ns); in audit_cb()
|
| /security/landlock/ |
| A D | audit.c | 106 struct audit_buffer *ab; in log_domain() local 115 if (!ab) in log_domain() 120 ab, in log_domain() 125 audit_log_format(ab, " comm="); in log_domain() 127 audit_log_end(ab); in log_domain() 393 struct audit_buffer *ab; in landlock_log_denial() local 453 if (!ab) in landlock_log_denial() 459 audit_log_end(ab); in landlock_log_denial() 478 struct audit_buffer *ab; in landlock_log_drop_domain() local 496 if (!ab) in landlock_log_drop_domain() [all …]
|
| /security/integrity/evm/ |
| A D | evm_secfs.c | 184 struct audit_buffer *ab; in evm_write_xattrs() local 197 ab = audit_log_start(audit_context(), GFP_KERNEL, in evm_write_xattrs() 199 if (!ab && IS_ENABLED(CONFIG_AUDIT)) in evm_write_xattrs() 221 audit_log_format(ab, "xattr="); in evm_write_xattrs() 222 audit_log_untrustedstring(ab, xattr->name); in evm_write_xattrs() 266 audit_log_format(ab, " res=0"); in evm_write_xattrs() 267 audit_log_end(ab); in evm_write_xattrs() 270 audit_log_format(ab, " res=%d", (err < 0) ? err : 0); in evm_write_xattrs() 271 audit_log_end(ab); in evm_write_xattrs()
|
| /security/integrity/ima/ |
| A D | ima_policy.c | 1167 if (!ab) in ima_log_string_op() 1177 audit_log_format(ab, "%s>", key); in ima_log_string_op() 1185 audit_log_format(ab, "%s<", key); in ima_log_string_op() 1188 audit_log_format(ab, "%s=", key); in ima_log_string_op() 1190 audit_log_format(ab, "%s ", value); in ima_log_string_op() 1411 struct audit_buffer *ab; in ima_parse_rule() local 1474 ima_log_string(ab, "action", "audit"); in ima_parse_rule() 1482 ima_log_string(ab, "action", "hash"); in ima_parse_rule() 1887 ima_log_string(ab, "UNKNOWN", p); in ima_parse_rule() 1912 audit_log_format(ab, "res=%d", !result); in ima_parse_rule() [all …]
|
| A D | ima_api.c | 395 struct audit_buffer *ab; in ima_audit_measurement() local 411 ab = audit_log_start(audit_context(), GFP_KERNEL, in ima_audit_measurement() 413 if (!ab) in ima_audit_measurement() 416 audit_log_format(ab, "file="); in ima_audit_measurement() 417 audit_log_untrustedstring(ab, filename); in ima_audit_measurement() 418 audit_log_format(ab, " hash=\"%s:%s\"", algo_name, hash); in ima_audit_measurement() 420 audit_log_task_info(ab); in ima_audit_measurement() 421 audit_log_end(ab); in ima_audit_measurement()
|
| /security/smack/ |
| A D | smack_access.c | 319 static void smack_log_callback(struct audit_buffer *ab, void *a) in smack_log_callback() argument 323 audit_log_format(ab, "lsm=SMACK fn=%s action=%s", in smack_log_callback() 326 audit_log_format(ab, " subject="); in smack_log_callback() 327 audit_log_untrustedstring(ab, sad->subject); in smack_log_callback() 328 audit_log_format(ab, " object="); in smack_log_callback() 329 audit_log_untrustedstring(ab, sad->object); in smack_log_callback() 331 audit_log_format(ab, " labels_differ"); in smack_log_callback() 333 audit_log_format(ab, " requested=%s", sad->request); in smack_log_callback()
|
| /security/selinux/ |
| A D | avc.c | 662 audit_log_format(ab, " null"); in avc_audit_pre_callback() 668 audit_log_format(ab, " {"); in avc_audit_pre_callback() 673 audit_log_format(ab, " %s", perms[i]); in avc_audit_pre_callback() 681 audit_log_format(ab, " 0x%x", av); in avc_audit_pre_callback() 683 audit_log_format(ab, " } for "); in avc_audit_pre_callback() 706 audit_log_format(ab, " ssid=%d", sad->ssid); in avc_audit_post_callback() 708 audit_log_format(ab, " scontext=%s", scontext); in avc_audit_post_callback() 713 audit_log_format(ab, " tsid=%d", sad->tsid); in avc_audit_post_callback() 718 audit_log_format(ab, " tclass=%s", tclass); in avc_audit_post_callback() 733 audit_log_format(ab, " srawcon="); in avc_audit_post_callback() [all …]
|
| /security/apparmor/include/ |
| A D | perms.h | 205 void aa_audit_perm_names(struct audit_buffer *ab, const char * const *names, 207 void aa_audit_perm_mask(struct audit_buffer *ab, u32 mask, const char *chrs,
|
| A D | net.h | 95 void audit_net_cb(struct audit_buffer *ab, void *va);
|
| /security/selinux/ss/ |
| A D | services.c | 465 struct audit_buffer *ab; in security_dump_masked_av() local 503 if (!ab) in security_dump_masked_av() 516 audit_log_format(ab, "%s%s", in security_dump_masked_av() 522 audit_log_end(ab); in security_dump_masked_av() 1696 struct audit_buffer *ab; in compute_sid_handle_invalid_context() local 1705 if (!ab) in compute_sid_handle_invalid_context() 1707 audit_log_format(ab, in compute_sid_handle_invalid_context() 1713 audit_log_end(ab); in compute_sid_handle_invalid_context() 3289 struct audit_buffer *ab; in security_sid_mls_copy() local 3294 audit_log_format(ab, in security_sid_mls_copy() [all …]
|