/security/selinux/include/ |
D | audit.h | 29 int selinux_audit_rule_init(u32 field, u32 op, char *rulestr, void **rule); 50 int selinux_audit_rule_match(u32 sid, u32 field, u32 op, void *rule);
|
/security/apparmor/ |
D | audit.c | 176 int aa_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule) in aa_audit_rule_init() argument 180 switch (field) { in aa_audit_rule_init() 223 int aa_audit_rule_match(u32 sid, u32 field, u32 op, void *vrule) in aa_audit_rule_match() argument 237 switch (field) { in aa_audit_rule_match()
|
/security/apparmor/include/ |
D | audit.h | 189 int aa_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule); 191 int aa_audit_rule_match(u32 sid, u32 field, u32 op, void *vrule);
|
/security/integrity/ima/ |
D | ima_fs.c | 177 const struct ima_template_field *field = in ima_measurements_show() local 180 if (is_ima_template && strcmp(field->field_id, "d") == 0) in ima_measurements_show() 182 if (is_ima_template && strcmp(field->field_id, "n") == 0) in ima_measurements_show() 184 field->field_show(m, show, &e->template_data[i]); in ima_measurements_show()
|
D | ima_api.c | 67 const struct ima_template_field *field = in ima_alloc_init_template() local 71 result = field->field_init(event_data, in ima_alloc_init_template()
|
D | ima.h | 430 static inline int ima_filter_rule_init(u32 field, u32 op, char *rulestr, in ima_filter_rule_init() argument 440 static inline int ima_filter_rule_match(u32 secid, u32 field, u32 op, in ima_filter_rule_match() argument
|
D | ima_policy.c | 1201 const char *field, const char *msg) in check_template_field() argument 1206 if (!strcmp(template->fields[i]->field_id, field)) in check_template_field()
|
/security/ |
D | commoncap.c | 830 #define __cap_gained(field, target, source) \ argument 831 !cap_issubset(target->cap_##field, source->cap_##field) 834 #define __cap_full(field, cred) \ argument 835 cap_issubset(CAP_FULL_SET, cred->cap_##field)
|
D | security.c | 2620 int security_audit_rule_init(u32 field, u32 op, char *rulestr, void **lsmrule) in security_audit_rule_init() argument 2622 return call_int_hook(audit_rule_init, 0, field, op, rulestr, lsmrule); in security_audit_rule_init() 2635 int security_audit_rule_match(u32 secid, u32 field, u32 op, void *lsmrule) in security_audit_rule_match() argument 2637 return call_int_hook(audit_rule_match, 0, secid, field, op, lsmrule); in security_audit_rule_match()
|
/security/selinux/ |
D | avc.c | 42 #define avc_cache_stats_incr(field) this_cpu_inc(avc_cache_stats.field) argument 44 #define avc_cache_stats_incr(field) do {} while (0) argument
|
/security/selinux/ss/ |
D | services.c | 3573 int selinux_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule) in selinux_audit_rule_init() argument 3590 switch (field) { in selinux_audit_rule_init() 3626 switch (field) { in selinux_audit_rule_init() 3700 int selinux_audit_rule_match(u32 sid, u32 field, u32 op, void *vrule) in selinux_audit_rule_match() argument 3736 switch (field) { in selinux_audit_rule_match() 3774 level = ((field == AUDIT_SUBJ_SEN || in selinux_audit_rule_match() 3775 field == AUDIT_OBJ_LEV_LOW) ? in selinux_audit_rule_match()
|
/security/smack/ |
D | smack_lsm.c | 4549 static int smack_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule) in smack_audit_rule_init() argument 4555 if (field != AUDIT_SUBJ_USER && field != AUDIT_OBJ_USER) in smack_audit_rule_init() 4603 static int smack_audit_rule_match(u32 secid, u32 field, u32 op, void *vrule) in smack_audit_rule_match() argument 4613 if (field != AUDIT_SUBJ_USER && field != AUDIT_OBJ_USER) in smack_audit_rule_match()
|