Function report |
Source Code:security\smack\smack_lsm.c |
Create Date:2022-07-28 19:24:34 |
Last Modify:2020-03-12 14:18:49 | Copyright©Brick |
home page | Tree |
Annotation kernel can get tool activity | Download SCCT | Chinese |
Name:smack_audit_rule_match - Audit given object ?*@secid: security id for identifying the object to test*@field: audit rule flags given from user-space*@op: required testing operator*@vrule: smack internal rule presentation* The core Audit hook
Proto:static int smack_audit_rule_match(unsigned int secid, unsigned int field, unsigned int op, void *vrule)
Type:int
Parameter:
Type | Parameter | Name |
---|---|---|
unsigned int | secid | |
unsigned int | field | |
unsigned int | op | |
void * | vrule |
4405 | If Value for the false possibility is greater at compile time(!rule) Then |
4410 | If field != security label user && field != AUDIT_OBJ_USER Then Return 0 |
4413 | skp = smack_from_secid(secid) |
4420 | If op == Audit_equal Then Return rule == smk_known |
4422 | If op == Audit_not_equal Then Return rule != smk_known |
4425 | Return 0 |
Source code conversion tool public plug-in interface | X |
---|---|
Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion |