Searched refs:lsm_rule (Results 1 - 4 of 4) sorted by relevance
/linux-master/security/integrity/ima/ |
H A D | ima_policy.c | 573 struct ima_rule_entry *lsm_rule = rule; local 638 if (!lsm_rule->lsm[i].rule) { 639 if (!lsm_rule->lsm[i].args_p) 651 rc = ima_filter_rule_match(osid, lsm_rule->lsm[i].type, 653 lsm_rule->lsm[i].rule); 658 rc = ima_filter_rule_match(secid, lsm_rule->lsm[i].type, 660 lsm_rule->lsm[i].rule); 667 lsm_rule = ima_lsm_copy_rule(rule); 668 if (lsm_rule) { 683 ima_filter_rule_free(lsm_rule 1128 ima_lsm_rule_init(struct ima_rule_entry *entry, substring_t *args, int lsm_rule, int audit_type) argument [all...] |
/linux-master/kernel/ |
H A D | auditfilter.c | 79 security_audit_rule_free(f->lsm_rule); 532 (void **)&f->lsm_rule); 786 /* Duplicate LSM field information. The lsm_rule is opaque, so must be 800 /* our own (refreshed) copy of lsm_rule */ 802 (void **)&df->lsm_rule); 854 /* deep copy this information, updating the lsm_rule fields, because 1371 if (f->lsm_rule) { 1374 f->type, f->op, f->lsm_rule); 1433 /* This function will re-initialize the lsm_rule field of all applicable rules.
|
H A D | auditsc.c | 670 if (f->lsm_rule) { 686 f->lsm_rule); 696 if (f->lsm_rule) { 703 f->lsm_rule); 710 f->lsm_rule)) { 721 f->lsm_rule))
|
/linux-master/include/linux/ |
H A D | audit.h | 72 void *lsm_rule; member in struct:audit_field::__anon459::__anon460
|
Completed in 222 milliseconds