Searched refs:rulestr (Results 1 – 7 of 7) sorted by relevance
/linux-4.4.14/security/selinux/include/ |
D | audit.h | 32 int selinux_audit_rule_init(u32 field, u32 op, char *rulestr, void **rule);
|
/linux-4.4.14/security/integrity/ima/ |
D | ima.h | 241 static inline int security_filter_rule_init(u32 field, u32 op, char *rulestr, in security_filter_rule_init() argument
|
/linux-4.4.14/security/selinux/ss/ |
D | services.c | 3022 int selinux_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule) in selinux_audit_rule_init() argument 3052 if (strchr(rulestr, '-')) in selinux_audit_rule_init() 3074 userdatum = hashtab_search(policydb.p_users.table, rulestr); in selinux_audit_rule_init() 3082 roledatum = hashtab_search(policydb.p_roles.table, rulestr); in selinux_audit_rule_init() 3090 typedatum = hashtab_search(policydb.p_types.table, rulestr); in selinux_audit_rule_init() 3099 rc = mls_from_string(rulestr, &tmprule->au_ctxt, GFP_ATOMIC); in selinux_audit_rule_init()
|
/linux-4.4.14/include/linux/ |
D | security.h | 1556 int security_audit_rule_init(u32 field, u32 op, char *rulestr, void **lsmrule); 1564 static inline int security_audit_rule_init(u32 field, u32 op, char *rulestr, in security_audit_rule_init() argument
|
D | lsm_hooks.h | 1609 int (*audit_rule_init)(u32 field, u32 op, char *rulestr,
|
/linux-4.4.14/security/ |
D | security.c | 1518 int security_audit_rule_init(u32 field, u32 op, char *rulestr, void **lsmrule) in security_audit_rule_init() argument 1520 return call_int_hook(audit_rule_init, 0, field, op, rulestr, lsmrule); in security_audit_rule_init()
|
/linux-4.4.14/security/smack/ |
D | smack_lsm.c | 4402 static int smack_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule) in smack_audit_rule_init() argument 4414 skp = smk_import_entry(rulestr, 0); in smack_audit_rule_init()
|