/security/selinux/include/ |
D | audit.h | 26 int selinux_audit_rule_init(u32 field, u32 op, char *rulestr, void **rule); 47 int selinux_audit_rule_match(u32 sid, u32 field, u32 op, void *rule);
|
/security/apparmor/ |
D | audit.c | 178 int aa_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule) in aa_audit_rule_init() argument 182 switch (field) { in aa_audit_rule_init() 224 int aa_audit_rule_match(u32 sid, u32 field, u32 op, void *vrule) in aa_audit_rule_match() argument 238 switch (field) { in aa_audit_rule_match()
|
/security/apparmor/include/ |
D | audit.h | 189 int aa_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule); 191 int aa_audit_rule_match(u32 sid, u32 field, u32 op, void *vrule);
|
/security/integrity/ima/ |
D | ima_fs.c | 178 const struct ima_template_field *field = in ima_measurements_show() local 181 if (is_ima_template && strcmp(field->field_id, "d") == 0) in ima_measurements_show() 183 if (is_ima_template && strcmp(field->field_id, "n") == 0) in ima_measurements_show() 185 field->field_show(m, show, &e->template_data[i]); in ima_measurements_show()
|
D | ima_api.c | 55 const struct ima_template_field *field = in ima_alloc_init_template() local 59 result = field->field_init(event_data, in ima_alloc_init_template()
|
D | ima.h | 367 static inline int security_filter_rule_init(u32 field, u32 op, char *rulestr, in security_filter_rule_init() argument 373 static inline int security_filter_rule_match(u32 secid, u32 field, u32 op, in security_filter_rule_match() argument
|
/security/ |
D | commoncap.c | 749 #define __cap_gained(field, target, source) \ argument 750 !cap_issubset(target->cap_##field, source->cap_##field) 753 #define __cap_full(field, cred) \ argument 754 cap_issubset(CAP_FULL_SET, cred->cap_##field)
|
D | security.c | 2351 int security_audit_rule_init(u32 field, u32 op, char *rulestr, void **lsmrule) in security_audit_rule_init() argument 2353 return call_int_hook(audit_rule_init, 0, field, op, rulestr, lsmrule); in security_audit_rule_init() 2366 int security_audit_rule_match(u32 secid, u32 field, u32 op, void *lsmrule) in security_audit_rule_match() argument 2368 return call_int_hook(audit_rule_match, 0, secid, field, op, lsmrule); in security_audit_rule_match()
|
/security/selinux/ |
D | avc.c | 39 #define avc_cache_stats_incr(field) this_cpu_inc(avc_cache_stats.field) argument 41 #define avc_cache_stats_incr(field) do {} while (0) argument
|
/security/selinux/ss/ |
D | services.c | 3331 int selinux_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule) in selinux_audit_rule_init() argument 3347 switch (field) { in selinux_audit_rule_init() 3381 switch (field) { in selinux_audit_rule_init() 3455 int selinux_audit_rule_match(u32 sid, u32 field, u32 op, void *vrule) in selinux_audit_rule_match() argument 3485 switch (field) { in selinux_audit_rule_match() 3523 level = ((field == AUDIT_SUBJ_SEN || in selinux_audit_rule_match() 3524 field == AUDIT_OBJ_LEV_LOW) ? in selinux_audit_rule_match()
|
/security/smack/ |
D | smack_lsm.c | 4351 static int smack_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule) in smack_audit_rule_init() argument 4357 if (field != AUDIT_SUBJ_USER && field != AUDIT_OBJ_USER) in smack_audit_rule_init() 4405 static int smack_audit_rule_match(u32 secid, u32 field, u32 op, void *vrule) in smack_audit_rule_match() argument 4415 if (field != AUDIT_SUBJ_USER && field != AUDIT_OBJ_USER) in smack_audit_rule_match()
|