/kernel/linux/linux-5.10/security/integrity/ima/ |
H A D | ima.h | 423 void **lsmrule) in ima_filter_rule_init() 428 static inline void ima_filter_rule_free(void *lsmrule) in ima_filter_rule_free() argument 433 void *lsmrule) in ima_filter_rule_match() 422 ima_filter_rule_init(u32 field, u32 op, char *rulestr, void **lsmrule) ima_filter_rule_init() argument 432 ima_filter_rule_match(u32 secid, u32 field, u32 op, void *lsmrule) ima_filter_rule_match() argument
|
/kernel/linux/linux-6.6/security/integrity/ima/ |
H A D | ima.h | 433 void **lsmrule) in ima_filter_rule_init() 438 static inline void ima_filter_rule_free(void *lsmrule) in ima_filter_rule_free() argument 443 void *lsmrule) in ima_filter_rule_match() 432 ima_filter_rule_init(u32 field, u32 op, char *rulestr, void **lsmrule) ima_filter_rule_init() argument 442 ima_filter_rule_match(u32 secid, u32 field, u32 op, void *lsmrule) ima_filter_rule_match() argument
|
/kernel/linux/linux-5.10/include/linux/ |
H A D | security.h | 1856 int security_audit_rule_init(u32 field, u32 op, char *rulestr, void **lsmrule); 1858 int security_audit_rule_match(u32 secid, u32 field, u32 op, void *lsmrule); 1859 void security_audit_rule_free(void *lsmrule); 1864 void **lsmrule) in security_audit_rule_init() 1875 void *lsmrule) in security_audit_rule_match() 1880 static inline void security_audit_rule_free(void *lsmrule) in security_audit_rule_free() argument 1863 security_audit_rule_init(u32 field, u32 op, char *rulestr, void **lsmrule) security_audit_rule_init() argument 1874 security_audit_rule_match(u32 secid, u32 field, u32 op, void *lsmrule) security_audit_rule_match() argument
|
/kernel/linux/linux-5.10/security/ |
H A D | security.c | 2525 int security_audit_rule_init(u32 field, u32 op, char *rulestr, void **lsmrule) in security_audit_rule_init() argument 2527 return call_int_hook(audit_rule_init, 0, field, op, rulestr, lsmrule); in security_audit_rule_init() 2535 void security_audit_rule_free(void *lsmrule) in security_audit_rule_free() argument 2537 call_void_hook(audit_rule_free, lsmrule); in security_audit_rule_free() 2540 int security_audit_rule_match(u32 secid, u32 field, u32 op, void *lsmrule) in security_audit_rule_match() argument 2542 return call_int_hook(audit_rule_match, 0, secid, field, op, lsmrule); in security_audit_rule_match()
|
/kernel/linux/linux-6.6/include/linux/ |
H A D | security.h | 1956 int security_audit_rule_init(u32 field, u32 op, char *rulestr, void **lsmrule); 1958 int security_audit_rule_match(u32 secid, u32 field, u32 op, void *lsmrule); 1959 void security_audit_rule_free(void *lsmrule); 1964 void **lsmrule) in security_audit_rule_init() 1975 void *lsmrule) in security_audit_rule_match() 1980 static inline void security_audit_rule_free(void *lsmrule) in security_audit_rule_free() argument 1963 security_audit_rule_init(u32 field, u32 op, char *rulestr, void **lsmrule) security_audit_rule_init() argument 1974 security_audit_rule_match(u32 secid, u32 field, u32 op, void *lsmrule) security_audit_rule_match() argument
|
/kernel/linux/linux-6.6/security/ |
H A D | security.c | 5118 * @lsmrule: receive buffer for audit rule struct 5122 * Return: Return 0 if @lsmrule has been successfully set, -EINVAL in case of 5125 int security_audit_rule_init(u32 field, u32 op, char *rulestr, void **lsmrule) in security_audit_rule_init() argument 5127 return call_int_hook(audit_rule_init, 0, field, op, rulestr, lsmrule); in security_audit_rule_init() 5146 * @lsmrule: audit rule struct 5151 void security_audit_rule_free(void *lsmrule) in security_audit_rule_free() argument 5153 call_void_hook(audit_rule_free, lsmrule); in security_audit_rule_free() 5161 * @lsmrule: audit rule 5169 int security_audit_rule_match(u32 secid, u32 field, u32 op, void *lsmrule) in security_audit_rule_match() argument 5171 return call_int_hook(audit_rule_match, 0, secid, field, op, lsmrule); in security_audit_rule_match() [all...] |