/security/selinux/include/ |
D | audit.h | 26 int selinux_audit_rule_init(u32 field, u32 op, char *rulestr, void **rule); 47 int selinux_audit_rule_match(u32 sid, u32 field, u32 op, void *rule);
|
/security/apparmor/ |
D | audit.c | 176 int aa_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule) in aa_audit_rule_init() argument 180 switch (field) { in aa_audit_rule_init() 223 int aa_audit_rule_match(u32 sid, u32 field, u32 op, void *vrule) in aa_audit_rule_match() argument 237 switch (field) { in aa_audit_rule_match()
|
/security/apparmor/include/ |
D | audit.h | 189 int aa_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule); 191 int aa_audit_rule_match(u32 sid, u32 field, u32 op, void *vrule);
|
/security/integrity/ima/ |
D | ima_fs.c | 177 const struct ima_template_field *field = in ima_measurements_show() local 180 if (is_ima_template && strcmp(field->field_id, "d") == 0) in ima_measurements_show() 182 if (is_ima_template && strcmp(field->field_id, "n") == 0) in ima_measurements_show() 184 field->field_show(m, show, &e->template_data[i]); in ima_measurements_show()
|
D | ima_api.c | 66 const struct ima_template_field *field = in ima_alloc_init_template() local 70 result = field->field_init(event_data, in ima_alloc_init_template()
|
D | ima.h | 430 static inline int ima_filter_rule_init(u32 field, u32 op, char *rulestr, in ima_filter_rule_init() argument 440 static inline int ima_filter_rule_match(u32 secid, u32 field, u32 op, in ima_filter_rule_match() argument
|
/security/ |
D | commoncap.c | 830 #define __cap_gained(field, target, source) \ argument 831 !cap_issubset(target->cap_##field, source->cap_##field) 834 #define __cap_full(field, cred) \ argument 835 cap_issubset(CAP_FULL_SET, cred->cap_##field)
|
D | security.c | 2591 int security_audit_rule_init(u32 field, u32 op, char *rulestr, void **lsmrule) in security_audit_rule_init() argument 2593 return call_int_hook(audit_rule_init, 0, field, op, rulestr, lsmrule); in security_audit_rule_init() 2606 int security_audit_rule_match(u32 secid, u32 field, u32 op, void *lsmrule) in security_audit_rule_match() argument 2608 return call_int_hook(audit_rule_match, 0, secid, field, op, lsmrule); in security_audit_rule_match()
|
/security/selinux/ |
D | avc.c | 42 #define avc_cache_stats_incr(field) this_cpu_inc(avc_cache_stats.field) argument 44 #define avc_cache_stats_incr(field) do {} while (0) argument
|
/security/selinux/ss/ |
D | services.c | 3570 int selinux_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule) in selinux_audit_rule_init() argument 3587 switch (field) { in selinux_audit_rule_init() 3623 switch (field) { in selinux_audit_rule_init() 3697 int selinux_audit_rule_match(u32 sid, u32 field, u32 op, void *vrule) in selinux_audit_rule_match() argument 3733 switch (field) { in selinux_audit_rule_match() 3771 level = ((field == AUDIT_SUBJ_SEN || in selinux_audit_rule_match() 3772 field == AUDIT_OBJ_LEV_LOW) ? in selinux_audit_rule_match()
|
/security/smack/ |
D | smack_lsm.c | 4484 static int smack_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule) in smack_audit_rule_init() argument 4490 if (field != AUDIT_SUBJ_USER && field != AUDIT_OBJ_USER) in smack_audit_rule_init() 4538 static int smack_audit_rule_match(u32 secid, u32 field, u32 op, void *vrule) in smack_audit_rule_match() argument 4548 if (field != AUDIT_SUBJ_USER && field != AUDIT_OBJ_USER) in smack_audit_rule_match()
|