/kernel/linux/linux-5.10/security/selinux/include/ |
H A D | audit.h | 19 * @rulestr: the text "target" of the rule 26 int selinux_audit_rule_init(u32 field, u32 op, char *rulestr, void **rule);
|
/kernel/linux/linux-6.6/security/selinux/include/ |
H A D | audit.h | 22 * @rulestr: the text "target" of the rule 29 int selinux_audit_rule_init(u32 field, u32 op, char *rulestr, void **rule);
|
/kernel/linux/linux-5.10/security/apparmor/ |
H A D | audit.c | 176 int aa_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule) in aa_audit_rule_init() argument 195 rule->label = aa_label_parse(&root_ns->unconfined->label, rulestr, in aa_audit_rule_init()
|
/kernel/linux/linux-6.6/security/apparmor/ |
H A D | audit.c | 220 int aa_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule) in aa_audit_rule_init() argument 239 rule->label = aa_label_parse(&root_ns->unconfined->label, rulestr, in aa_audit_rule_init()
|
/kernel/linux/linux-5.10/security/apparmor/include/ |
H A D | audit.h | 189 int aa_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule);
|
/kernel/linux/linux-6.6/security/apparmor/include/ |
H A D | audit.h | 196 int aa_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule);
|
/kernel/linux/linux-5.10/security/selinux/ss/ |
H A D | services.c | 3545 int selinux_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule) in selinux_audit_rule_init() argument 3578 if (strchr(rulestr, '-')) in selinux_audit_rule_init() 3602 userdatum = symtab_search(&policydb->p_users, rulestr); in selinux_audit_rule_init() 3610 roledatum = symtab_search(&policydb->p_roles, rulestr); in selinux_audit_rule_init() 3618 typedatum = symtab_search(&policydb->p_types, rulestr); in selinux_audit_rule_init() 3627 rc = mls_from_string(policydb, rulestr, &tmprule->au_ctxt, in selinux_audit_rule_init()
|
/kernel/linux/linux-6.6/security/selinux/ss/ |
H A D | services.c | 3500 int selinux_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule) in selinux_audit_rule_init() argument 3533 if (strchr(rulestr, '-')) in selinux_audit_rule_init() 3553 userdatum = symtab_search(&policydb->p_users, rulestr); in selinux_audit_rule_init() 3562 roledatum = symtab_search(&policydb->p_roles, rulestr); in selinux_audit_rule_init() 3571 typedatum = symtab_search(&policydb->p_types, rulestr); in selinux_audit_rule_init() 3582 rc = mls_from_string(policydb, rulestr, &tmprule->au_ctxt, in selinux_audit_rule_init()
|
/kernel/linux/linux-5.10/security/integrity/ima/ |
H A D | ima.h | 422 static inline int ima_filter_rule_init(u32 field, u32 op, char *rulestr, in ima_filter_rule_init() argument
|
/kernel/linux/linux-6.6/security/integrity/ima/ |
H A D | ima.h | 432 static inline int ima_filter_rule_init(u32 field, u32 op, char *rulestr, in ima_filter_rule_init() argument
|
/kernel/linux/linux-5.10/include/linux/ |
H A D | security.h | 1856 int security_audit_rule_init(u32 field, u32 op, char *rulestr, void **lsmrule); 1863 static inline int security_audit_rule_init(u32 field, u32 op, char *rulestr, in security_audit_rule_init() argument
|
/kernel/linux/linux-5.10/security/ |
H A D | security.c | 2525 int security_audit_rule_init(u32 field, u32 op, char *rulestr, void **lsmrule) in security_audit_rule_init() argument 2527 return call_int_hook(audit_rule_init, 0, field, op, rulestr, lsmrule); in security_audit_rule_init()
|
/kernel/linux/linux-6.6/include/linux/ |
H A D | security.h | 1956 int security_audit_rule_init(u32 field, u32 op, char *rulestr, void **lsmrule); 1963 static inline int security_audit_rule_init(u32 field, u32 op, char *rulestr, in security_audit_rule_init() argument
|
/kernel/linux/linux-6.6/security/ |
H A D | security.c | 5117 * @rulestr: rule context 5125 int security_audit_rule_init(u32 field, u32 op, char *rulestr, void **lsmrule) in security_audit_rule_init() argument 5127 return call_int_hook(audit_rule_init, 0, field, op, rulestr, lsmrule); in security_audit_rule_init()
|
/kernel/linux/linux-5.10/security/smack/ |
H A D | smack_lsm.c | 4480 * @rulestr: smack label to be audited 4483 * Prepare to audit cases where (@field @op @rulestr) is true. 4486 static int smack_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule) in smack_audit_rule_init() argument 4498 skp = smk_import_entry(rulestr, 0); in smack_audit_rule_init()
|
/kernel/linux/linux-6.6/security/smack/ |
H A D | smack_lsm.c | 4617 * @rulestr: smack label to be audited 4620 * Prepare to audit cases where (@field @op @rulestr) is true. 4623 static int smack_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule) in smack_audit_rule_init() argument 4635 skp = smk_import_entry(rulestr, 0); in smack_audit_rule_init()
|