Lines Matching refs:s
1193 struct audit_status s; in audit_receive_msg() local
1194 memset(&s, 0, sizeof(s)); in audit_receive_msg()
1195 s.enabled = audit_enabled; in audit_receive_msg()
1196 s.failure = audit_failure; in audit_receive_msg()
1199 s.pid = auditd_pid_vnr(); in audit_receive_msg()
1200 s.rate_limit = audit_rate_limit; in audit_receive_msg()
1201 s.backlog_limit = audit_backlog_limit; in audit_receive_msg()
1202 s.lost = atomic_read(&audit_lost); in audit_receive_msg()
1203 s.backlog = skb_queue_len(&audit_queue); in audit_receive_msg()
1204 s.feature_bitmap = AUDIT_FEATURE_BITMAP_ALL; in audit_receive_msg()
1205 s.backlog_wait_time = audit_backlog_wait_time; in audit_receive_msg()
1206 audit_send_reply(skb, seq, AUDIT_GET, 0, 0, &s, sizeof(s)); in audit_receive_msg()
1210 struct audit_status s; in audit_receive_msg() local
1211 memset(&s, 0, sizeof(s)); in audit_receive_msg()
1213 memcpy(&s, data, min_t(size_t, sizeof(s), nlmsg_len(nlh))); in audit_receive_msg()
1214 if (s.mask & AUDIT_STATUS_ENABLED) { in audit_receive_msg()
1215 err = audit_set_enabled(s.enabled); in audit_receive_msg()
1219 if (s.mask & AUDIT_STATUS_FAILURE) { in audit_receive_msg()
1220 err = audit_set_failure(s.failure); in audit_receive_msg()
1224 if (s.mask & AUDIT_STATUS_PID) { in audit_receive_msg()
1231 pid_t new_pid = s.pid; in audit_receive_msg()
1284 if (s.mask & AUDIT_STATUS_RATE_LIMIT) { in audit_receive_msg()
1285 err = audit_set_rate_limit(s.rate_limit); in audit_receive_msg()
1289 if (s.mask & AUDIT_STATUS_BACKLOG_LIMIT) { in audit_receive_msg()
1290 err = audit_set_backlog_limit(s.backlog_limit); in audit_receive_msg()
1294 if (s.mask & AUDIT_STATUS_BACKLOG_WAIT_TIME) { in audit_receive_msg()
1295 if (sizeof(s) > (size_t)nlh->nlmsg_len) in audit_receive_msg()
1297 if (s.backlog_wait_time > 10*AUDIT_BACKLOG_WAIT_TIME) in audit_receive_msg()
1299 err = audit_set_backlog_wait_time(s.backlog_wait_time); in audit_receive_msg()
1303 if (s.mask == AUDIT_STATUS_LOST) { in audit_receive_msg()
1441 struct audit_tty_status s; in audit_receive_msg() local
1445 s.enabled = t & AUDIT_TTY_ENABLE; in audit_receive_msg()
1446 s.log_passwd = !!(t & AUDIT_TTY_LOG_PASSWD); in audit_receive_msg()
1448 audit_send_reply(skb, seq, AUDIT_TTY_GET, 0, 0, &s, sizeof(s)); in audit_receive_msg()
1452 struct audit_tty_status s, old; in audit_receive_msg() local
1456 memset(&s, 0, sizeof(s)); in audit_receive_msg()
1458 memcpy(&s, data, min_t(size_t, sizeof(s), nlmsg_len(nlh))); in audit_receive_msg()
1460 if ((s.enabled != 0 && s.enabled != 1) || in audit_receive_msg()
1461 (s.log_passwd != 0 && s.log_passwd != 1)) in audit_receive_msg()
1467 t = s.enabled | (-s.log_passwd & AUDIT_TTY_LOG_PASSWD); in audit_receive_msg()
1477 old.enabled, s.enabled, old.log_passwd, in audit_receive_msg()
1478 s.log_passwd, !err); in audit_receive_msg()