Function report |
Source Code:security\smack\smack_lsm.c |
Create Date:2022-07-28 19:24:34 |
| Last Modify:2020-03-12 14:18:49 | Copyright©Brick |
| home page | Tree |
| Annotation kernel can get tool activity | Download SCCT | Chinese |
Name:smack_audit_rule_match - Audit given object ?*@secid: security id for identifying the object to test*@field: audit rule flags given from user-space*@op: required testing operator*@vrule: smack internal rule presentation* The core Audit hook
Proto:static int smack_audit_rule_match(unsigned int secid, unsigned int field, unsigned int op, void *vrule)
Type:int
Parameter:
| Type | Parameter | Name |
|---|---|---|
| unsigned int | secid | |
| unsigned int | field | |
| unsigned int | op | |
| void * | vrule |
| 4405 | If Value for the false possibility is greater at compile time(!rule) Then |
| 4410 | If field != security label user && field != AUDIT_OBJ_USER Then Return 0 |
| 4413 | skp = smack_from_secid(secid) |
| 4420 | If op == Audit_equal Then Return rule == smk_known |
| 4422 | If op == Audit_not_equal Then Return rule != smk_known |
| 4425 | Return 0 |
| Source code conversion tool public plug-in interface | X |
|---|---|
| Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion |