Home
last modified time | relevance | path

Searched refs:field (Results 1 – 11 of 11) sorted by relevance

/security/selinux/include/
Daudit.h26 int selinux_audit_rule_init(u32 field, u32 op, char *rulestr, void **rule);
47 int selinux_audit_rule_match(u32 sid, u32 field, u32 op, void *rule);
/security/apparmor/
Daudit.c178 int aa_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule) in aa_audit_rule_init() argument
182 switch (field) { in aa_audit_rule_init()
224 int aa_audit_rule_match(u32 sid, u32 field, u32 op, void *vrule) in aa_audit_rule_match() argument
238 switch (field) { in aa_audit_rule_match()
/security/apparmor/include/
Daudit.h189 int aa_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule);
191 int aa_audit_rule_match(u32 sid, u32 field, u32 op, void *vrule);
/security/integrity/ima/
Dima_fs.c178 const struct ima_template_field *field = in ima_measurements_show() local
181 if (is_ima_template && strcmp(field->field_id, "d") == 0) in ima_measurements_show()
183 if (is_ima_template && strcmp(field->field_id, "n") == 0) in ima_measurements_show()
185 field->field_show(m, show, &e->template_data[i]); in ima_measurements_show()
Dima_api.c55 const struct ima_template_field *field = in ima_alloc_init_template() local
59 result = field->field_init(event_data, in ima_alloc_init_template()
Dima.h367 static inline int security_filter_rule_init(u32 field, u32 op, char *rulestr, in security_filter_rule_init() argument
373 static inline int security_filter_rule_match(u32 secid, u32 field, u32 op, in security_filter_rule_match() argument
/security/
Dcommoncap.c749 #define __cap_gained(field, target, source) \ argument
750 !cap_issubset(target->cap_##field, source->cap_##field)
753 #define __cap_full(field, cred) \ argument
754 cap_issubset(CAP_FULL_SET, cred->cap_##field)
Dsecurity.c2351 int security_audit_rule_init(u32 field, u32 op, char *rulestr, void **lsmrule) in security_audit_rule_init() argument
2353 return call_int_hook(audit_rule_init, 0, field, op, rulestr, lsmrule); in security_audit_rule_init()
2366 int security_audit_rule_match(u32 secid, u32 field, u32 op, void *lsmrule) in security_audit_rule_match() argument
2368 return call_int_hook(audit_rule_match, 0, secid, field, op, lsmrule); in security_audit_rule_match()
/security/selinux/
Davc.c39 #define avc_cache_stats_incr(field) this_cpu_inc(avc_cache_stats.field) argument
41 #define avc_cache_stats_incr(field) do {} while (0) argument
/security/selinux/ss/
Dservices.c3331 int selinux_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule) in selinux_audit_rule_init() argument
3347 switch (field) { in selinux_audit_rule_init()
3381 switch (field) { in selinux_audit_rule_init()
3455 int selinux_audit_rule_match(u32 sid, u32 field, u32 op, void *vrule) in selinux_audit_rule_match() argument
3485 switch (field) { in selinux_audit_rule_match()
3523 level = ((field == AUDIT_SUBJ_SEN || in selinux_audit_rule_match()
3524 field == AUDIT_OBJ_LEV_LOW) ? in selinux_audit_rule_match()
/security/smack/
Dsmack_lsm.c4351 static int smack_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule) in smack_audit_rule_init() argument
4357 if (field != AUDIT_SUBJ_USER && field != AUDIT_OBJ_USER) in smack_audit_rule_init()
4405 static int smack_audit_rule_match(u32 secid, u32 field, u32 op, void *vrule) in smack_audit_rule_match() argument
4415 if (field != AUDIT_SUBJ_USER && field != AUDIT_OBJ_USER) in smack_audit_rule_match()