Searched refs:rulestr (Results 1 – 7 of 7) sorted by relevance
/linux-4.1.27/security/selinux/include/ |
D | audit.h | 32 int selinux_audit_rule_init(u32 field, u32 op, char *rulestr, void **rule);
|
/linux-4.1.27/security/integrity/ima/ |
D | ima.h | 234 static inline int security_filter_rule_init(u32 field, u32 op, char *rulestr, in security_filter_rule_init() argument
|
/linux-4.1.27/security/selinux/ss/ |
D | services.c | 2853 int selinux_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule) in selinux_audit_rule_init() argument 2883 if (strchr(rulestr, '-')) in selinux_audit_rule_init() 2905 userdatum = hashtab_search(policydb.p_users.table, rulestr); in selinux_audit_rule_init() 2913 roledatum = hashtab_search(policydb.p_roles.table, rulestr); in selinux_audit_rule_init() 2921 typedatum = hashtab_search(policydb.p_types.table, rulestr); in selinux_audit_rule_init() 2930 rc = mls_from_string(rulestr, &tmprule->au_ctxt, GFP_ATOMIC); in selinux_audit_rule_init()
|
/linux-4.1.27/include/linux/ |
D | security.h | 1752 int (*audit_rule_init) (u32 field, u32 op, char *rulestr, void **lsmrule); 3137 int security_audit_rule_init(u32 field, u32 op, char *rulestr, void **lsmrule); 3145 static inline int security_audit_rule_init(u32 field, u32 op, char *rulestr, in security_audit_rule_init() argument
|
/linux-4.1.27/security/ |
D | security.c | 1470 int security_audit_rule_init(u32 field, u32 op, char *rulestr, void **lsmrule) in security_audit_rule_init() argument 1472 return security_ops->audit_rule_init(field, op, rulestr, lsmrule); in security_audit_rule_init()
|
D | capability.c | 919 static int cap_audit_rule_init(u32 field, u32 op, char *rulestr, void **lsmrule) in cap_audit_rule_init() argument
|
/linux-4.1.27/security/smack/ |
D | smack_lsm.c | 4093 static int smack_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule) in smack_audit_rule_init() argument 4105 skp = smk_import_entry(rulestr, 0); in smack_audit_rule_init()
|