Home
last modified time | relevance | path

Searched refs:rulestr (Results 1 - 16 of 16) sorted by relevance

/kernel/linux/linux-5.10/security/selinux/include/
H A Daudit.h19 * @rulestr: the text "target" of the rule
26 int selinux_audit_rule_init(u32 field, u32 op, char *rulestr, void **rule);
/kernel/linux/linux-6.6/security/selinux/include/
H A Daudit.h22 * @rulestr: the text "target" of the rule
29 int selinux_audit_rule_init(u32 field, u32 op, char *rulestr, void **rule);
/kernel/linux/linux-5.10/security/apparmor/
H A Daudit.c176 int aa_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule) in aa_audit_rule_init() argument
195 rule->label = aa_label_parse(&root_ns->unconfined->label, rulestr, in aa_audit_rule_init()
/kernel/linux/linux-6.6/security/apparmor/
H A Daudit.c220 int aa_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule) in aa_audit_rule_init() argument
239 rule->label = aa_label_parse(&root_ns->unconfined->label, rulestr, in aa_audit_rule_init()
/kernel/linux/linux-5.10/security/apparmor/include/
H A Daudit.h189 int aa_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule);
/kernel/linux/linux-6.6/security/apparmor/include/
H A Daudit.h196 int aa_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule);
/kernel/linux/linux-5.10/security/selinux/ss/
H A Dservices.c3545 int selinux_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule) in selinux_audit_rule_init() argument
3578 if (strchr(rulestr, '-')) in selinux_audit_rule_init()
3602 userdatum = symtab_search(&policydb->p_users, rulestr); in selinux_audit_rule_init()
3610 roledatum = symtab_search(&policydb->p_roles, rulestr); in selinux_audit_rule_init()
3618 typedatum = symtab_search(&policydb->p_types, rulestr); in selinux_audit_rule_init()
3627 rc = mls_from_string(policydb, rulestr, &tmprule->au_ctxt, in selinux_audit_rule_init()
/kernel/linux/linux-6.6/security/selinux/ss/
H A Dservices.c3500 int selinux_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule) in selinux_audit_rule_init() argument
3533 if (strchr(rulestr, '-')) in selinux_audit_rule_init()
3553 userdatum = symtab_search(&policydb->p_users, rulestr); in selinux_audit_rule_init()
3562 roledatum = symtab_search(&policydb->p_roles, rulestr); in selinux_audit_rule_init()
3571 typedatum = symtab_search(&policydb->p_types, rulestr); in selinux_audit_rule_init()
3582 rc = mls_from_string(policydb, rulestr, &tmprule->au_ctxt, in selinux_audit_rule_init()
/kernel/linux/linux-5.10/security/integrity/ima/
H A Dima.h422 static inline int ima_filter_rule_init(u32 field, u32 op, char *rulestr, in ima_filter_rule_init() argument
/kernel/linux/linux-6.6/security/integrity/ima/
H A Dima.h432 static inline int ima_filter_rule_init(u32 field, u32 op, char *rulestr, in ima_filter_rule_init() argument
/kernel/linux/linux-5.10/include/linux/
H A Dsecurity.h1856 int security_audit_rule_init(u32 field, u32 op, char *rulestr, void **lsmrule);
1863 static inline int security_audit_rule_init(u32 field, u32 op, char *rulestr, in security_audit_rule_init() argument
/kernel/linux/linux-5.10/security/
H A Dsecurity.c2525 int security_audit_rule_init(u32 field, u32 op, char *rulestr, void **lsmrule) in security_audit_rule_init() argument
2527 return call_int_hook(audit_rule_init, 0, field, op, rulestr, lsmrule); in security_audit_rule_init()
/kernel/linux/linux-6.6/include/linux/
H A Dsecurity.h1956 int security_audit_rule_init(u32 field, u32 op, char *rulestr, void **lsmrule);
1963 static inline int security_audit_rule_init(u32 field, u32 op, char *rulestr, in security_audit_rule_init() argument
/kernel/linux/linux-6.6/security/
H A Dsecurity.c5117 * @rulestr: rule context
5125 int security_audit_rule_init(u32 field, u32 op, char *rulestr, void **lsmrule) in security_audit_rule_init() argument
5127 return call_int_hook(audit_rule_init, 0, field, op, rulestr, lsmrule); in security_audit_rule_init()
/kernel/linux/linux-5.10/security/smack/
H A Dsmack_lsm.c4480 * @rulestr: smack label to be audited
4483 * Prepare to audit cases where (@field @op @rulestr) is true.
4486 static int smack_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule) in smack_audit_rule_init() argument
4498 skp = smk_import_entry(rulestr, 0); in smack_audit_rule_init()
/kernel/linux/linux-6.6/security/smack/
H A Dsmack_lsm.c4617 * @rulestr: smack label to be audited
4620 * Prepare to audit cases where (@field @op @rulestr) is true.
4623 static int smack_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule) in smack_audit_rule_init() argument
4635 skp = smk_import_entry(rulestr, 0); in smack_audit_rule_init()

Completed in 42 milliseconds