Home
last modified time | relevance | path

Searched refs:field (Results 1 – 12 of 12) sorted by relevance

/security/selinux/include/
Daudit.h29 int selinux_audit_rule_init(u32 field, u32 op, char *rulestr, void **rule);
50 int selinux_audit_rule_match(u32 sid, u32 field, u32 op, void *rule);
/security/apparmor/
Daudit.c176 int aa_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule) in aa_audit_rule_init() argument
180 switch (field) { in aa_audit_rule_init()
223 int aa_audit_rule_match(u32 sid, u32 field, u32 op, void *vrule) in aa_audit_rule_match() argument
237 switch (field) { in aa_audit_rule_match()
/security/apparmor/include/
Daudit.h189 int aa_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule);
191 int aa_audit_rule_match(u32 sid, u32 field, u32 op, void *vrule);
/security/integrity/ima/
Dima_fs.c177 const struct ima_template_field *field = in ima_measurements_show() local
180 if (is_ima_template && strcmp(field->field_id, "d") == 0) in ima_measurements_show()
182 if (is_ima_template && strcmp(field->field_id, "n") == 0) in ima_measurements_show()
184 field->field_show(m, show, &e->template_data[i]); in ima_measurements_show()
Dima_api.c67 const struct ima_template_field *field = in ima_alloc_init_template() local
71 result = field->field_init(event_data, in ima_alloc_init_template()
Dima.h430 static inline int ima_filter_rule_init(u32 field, u32 op, char *rulestr, in ima_filter_rule_init() argument
440 static inline int ima_filter_rule_match(u32 secid, u32 field, u32 op, in ima_filter_rule_match() argument
Dima_policy.c1201 const char *field, const char *msg) in check_template_field() argument
1206 if (!strcmp(template->fields[i]->field_id, field)) in check_template_field()
/security/
Dcommoncap.c830 #define __cap_gained(field, target, source) \ argument
831 !cap_issubset(target->cap_##field, source->cap_##field)
834 #define __cap_full(field, cred) \ argument
835 cap_issubset(CAP_FULL_SET, cred->cap_##field)
Dsecurity.c2620 int security_audit_rule_init(u32 field, u32 op, char *rulestr, void **lsmrule) in security_audit_rule_init() argument
2622 return call_int_hook(audit_rule_init, 0, field, op, rulestr, lsmrule); in security_audit_rule_init()
2635 int security_audit_rule_match(u32 secid, u32 field, u32 op, void *lsmrule) in security_audit_rule_match() argument
2637 return call_int_hook(audit_rule_match, 0, secid, field, op, lsmrule); in security_audit_rule_match()
/security/selinux/
Davc.c42 #define avc_cache_stats_incr(field) this_cpu_inc(avc_cache_stats.field) argument
44 #define avc_cache_stats_incr(field) do {} while (0) argument
/security/selinux/ss/
Dservices.c3573 int selinux_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule) in selinux_audit_rule_init() argument
3590 switch (field) { in selinux_audit_rule_init()
3626 switch (field) { in selinux_audit_rule_init()
3700 int selinux_audit_rule_match(u32 sid, u32 field, u32 op, void *vrule) in selinux_audit_rule_match() argument
3736 switch (field) { in selinux_audit_rule_match()
3774 level = ((field == AUDIT_SUBJ_SEN || in selinux_audit_rule_match()
3775 field == AUDIT_OBJ_LEV_LOW) ? in selinux_audit_rule_match()
/security/smack/
Dsmack_lsm.c4549 static int smack_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule) in smack_audit_rule_init() argument
4555 if (field != AUDIT_SUBJ_USER && field != AUDIT_OBJ_USER) in smack_audit_rule_init()
4603 static int smack_audit_rule_match(u32 secid, u32 field, u32 op, void *vrule) in smack_audit_rule_match() argument
4613 if (field != AUDIT_SUBJ_USER && field != AUDIT_OBJ_USER) in smack_audit_rule_match()