/external/selinux/libselinux/utils/ |
H A D | compute_av.c | 11 security_class_t tclass; local 15 fprintf(stderr, "usage: %s scontext tcontext tclass\n", 20 tclass = string_to_security_class(argv[3]); 21 if (!tclass) { 26 ret = security_compute_av(argv[1], argv[2], tclass, 1, &avd); 33 print_access_vector(tclass, avd.allowed); 38 print_access_vector(tclass, avd.decided); 44 print_access_vector(tclass, avd.auditallow); 50 print_access_vector(tclass, avd.auditdeny);
|
H A D | compute_create.c | 11 security_class_t tclass; local 15 fprintf(stderr, "usage: %s scontext tcontext tclass\n", 20 tclass = string_to_security_class(argv[3]); 21 if (!tclass) { 26 ret = security_compute_create(argv[1], argv[2], tclass, &buf);
|
H A D | compute_member.c | 11 security_class_t tclass; local 15 fprintf(stderr, "usage: %s scontext tcontext tclass\n", 20 tclass = string_to_security_class(argv[3]); 21 if (!tclass) { 26 ret = security_compute_member(argv[1], argv[2], tclass, &buf);
|
H A D | compute_relabel.c | 11 security_class_t tclass; local 15 fprintf(stderr, "usage: %s scontext tcontext tclass\n", 20 tclass = string_to_security_class(argv[3]); 21 if (!tclass) { 26 ret = security_compute_relabel(argv[1], argv[2], tclass, &buf);
|
/external/libselinux/src/ |
H A D | mapping.h | 16 unmap_class(security_class_t tclass); 19 unmap_perm(security_class_t tclass, access_vector_t tperm); 29 map_perm(security_class_t tclass, access_vector_t kperm); 32 map_decision(security_class_t tclass, struct av_decision *avd);
|
H A D | mapping.c | 100 unmap_class(security_class_t tclass) argument 102 if (tclass < current_mapping_size) 103 return current_mapping[tclass].value; 111 return tclass; 115 unmap_perm(security_class_t tclass, access_vector_t tperm) argument 117 if (tclass < current_mapping_size) { 121 for (i=0; i<current_mapping[tclass].num_perms; i++) 123 kperm |= current_mapping[tclass].perms[i]; 161 map_perm(security_class_t tclass, access_vector_t kperm) argument 163 if (tclass < current_mapping_siz 184 map_decision(security_class_t tclass, struct av_decision *avd) argument [all...] |
H A D | avc.c | 22 security_class_t tclass; member in struct:avc_entry 43 security_class_t tclass, access_vector_t perms, 48 security_class_t tclass; member in struct:avc_callback_node 64 security_id_t tsid, security_class_t tclass) 66 return ((uintptr_t) ssid ^ ((uintptr_t) tsid << 2) ^ tclass) 304 security_class_t tclass) 322 hvalue = avc_hash(ssid, tsid, tclass); 327 new->ae.tclass = tclass; 337 security_class_t tclass, 63 avc_hash(security_id_t ssid, security_id_t tsid, security_class_t tclass) argument 302 avc_claim_node(security_id_t ssid, security_id_t tsid, security_class_t tclass) argument 335 avc_search_node(security_id_t ssid, security_id_t tsid, security_class_t tclass, int *probes) argument 383 avc_lookup(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t requested, struct avc_entry_ref *aeref) argument 425 avc_insert(security_id_t ssid, security_id_t tsid, security_class_t tclass, struct avc_entry *ae, struct avc_entry_ref *aeref) argument 607 avc_dump_av(security_class_t tclass, access_vector_t av) argument 641 avc_dump_query(security_id_t ssid, security_id_t tsid, security_class_t tclass) argument 654 avc_audit(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t requested, struct av_decision *avd, int result, void *a) argument 704 avc_has_perm_noaudit(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t requested, struct avc_entry_ref *aeref, struct av_decision *avd) argument 800 avc_compute_create(security_id_t ssid, security_id_t tsid, security_class_t tclass, security_id_t *newsid) argument 850 avc_add_callback(int (*callback) (uint32_t event, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, access_vector_t * out_retained), uint32_t events, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms) argument 911 avc_update_cache(uint32_t event, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms) argument 949 avc_control(uint32_t event, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, access_vector_t * out_retained) argument 1009 avc_ss_grant(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno) argument 1030 avc_ss_try_revoke(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, access_vector_t * out_retained) argument 1050 avc_ss_revoke(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno) argument 1085 avc_ss_set_auditallow(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, uint32_t enable) argument 1106 avc_ss_set_auditdeny(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, uint32_t enable) argument [all...] |
H A D | compute_av.c | 15 security_class_t tclass, 42 unmap_class(tclass), unmap_perm(tclass, requested)); 63 map_decision(tclass, avd); 13 security_compute_av(const char * scon, const char * tcon, security_class_t tclass, access_vector_t requested, struct av_decision *avd) argument
|
H A D | stringrep.c | 178 access_vector_t string_to_av_perm(security_class_t tclass, const char *s) argument 181 security_class_t kclass = unmap_class(tclass); 188 return map_perm(tclass, 1<<i); 195 const char *security_class_to_string(security_class_t tclass) argument 199 tclass = unmap_class(tclass); 201 node = get_class_cache_entry_value(tclass); 207 const char *security_av_perm_to_string(security_class_t tclass, argument 213 av = unmap_perm(tclass, av); 214 tclass 225 security_av_string(security_class_t tclass, access_vector_t av, char **res) argument [all...] |
/external/selinux/libselinux/src/ |
H A D | mapping.h | 16 unmap_class(security_class_t tclass); 19 unmap_perm(security_class_t tclass, access_vector_t tperm); 29 map_perm(security_class_t tclass, access_vector_t kperm); 32 map_decision(security_class_t tclass, struct av_decision *avd);
|
H A D | mapping.c | 100 unmap_class(security_class_t tclass) argument 102 if (tclass < current_mapping_size) 103 return current_mapping[tclass].value; 111 return tclass; 115 unmap_perm(security_class_t tclass, access_vector_t tperm) argument 117 if (tclass < current_mapping_size) { 121 for (i=0; i<current_mapping[tclass].num_perms; i++) 123 kperm |= current_mapping[tclass].perms[i]; 161 map_perm(security_class_t tclass, access_vector_t kperm) argument 163 if (tclass < current_mapping_siz 184 map_decision(security_class_t tclass, struct av_decision *avd) argument [all...] |
H A D | compute_create.c | 53 security_class_t tclass, 79 scon, tcon, unmap_class(tclass)); 112 security_class_t tclass, 115 return security_compute_create_name_raw(scon, tcon, tclass, 122 security_class_t tclass, 138 ret = security_compute_create_name_raw(rscon, rtcon, tclass, 153 security_class_t tclass, 156 return security_compute_create_name(scon, tcon, tclass, NULL, newcon); 51 security_compute_create_name_raw(const char * scon, const char * tcon, security_class_t tclass, const char *objname, char ** newcon) argument
|
H A D | compute_av.c | 15 security_class_t tclass, 42 unmap_class(tclass), unmap_perm(tclass, requested)); 63 /* If tclass invalid, kernel sets avd according to deny_unknown flag */ 64 if (tclass != 0) 65 map_decision(tclass, avd); 79 security_class_t tclass, 86 ret = security_compute_av_flags_raw(scon, tcon, tclass, 106 security_class_t tclass, 120 ret = security_compute_av_flags_raw(rscon, rtcon, tclass, 13 security_compute_av_flags_raw(const char * scon, const char * tcon, security_class_t tclass, access_vector_t requested, struct av_decision *avd) argument [all...] |
H A D | stringrep.c | 199 access_vector_t string_to_av_perm(security_class_t tclass, const char *s) argument 202 security_class_t kclass = unmap_class(tclass); 209 return map_perm(tclass, 1<<i); 216 const char *security_class_to_string(security_class_t tclass) argument 220 tclass = unmap_class(tclass); 222 node = get_class_cache_entry_value(tclass); 229 const char *security_av_perm_to_string(security_class_t tclass, argument 235 av = unmap_perm(tclass, av); 236 tclass 247 security_av_string(security_class_t tclass, access_vector_t av, char **res) argument 301 print_access_vector(security_class_t tclass, access_vector_t av) argument [all...] |
H A D | avc.c | 22 security_class_t tclass; member in struct:avc_entry 43 security_class_t tclass, access_vector_t perms, 48 security_class_t tclass; member in struct:avc_callback_node 64 security_id_t tsid, security_class_t tclass) 66 return ((uintptr_t) ssid ^ ((uintptr_t) tsid << 2) ^ tclass) 344 security_class_t tclass) 362 hvalue = avc_hash(ssid, tsid, tclass); 367 new->ae.tclass = tclass; 377 security_class_t tclass, 63 avc_hash(security_id_t ssid, security_id_t tsid, security_class_t tclass) argument 342 avc_claim_node(security_id_t ssid, security_id_t tsid, security_class_t tclass) argument 375 avc_search_node(security_id_t ssid, security_id_t tsid, security_class_t tclass, int *probes) argument 423 avc_lookup(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t requested, struct avc_entry_ref *aeref) argument 465 avc_insert(security_id_t ssid, security_id_t tsid, security_class_t tclass, struct avc_entry *ae, struct avc_entry_ref *aeref) argument 647 avc_dump_av(security_class_t tclass, access_vector_t av) argument 681 avc_dump_query(security_id_t ssid, security_id_t tsid, security_class_t tclass) argument 694 avc_audit(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t requested, struct av_decision *avd, int result, void *a) argument 744 avc_has_perm_noaudit(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t requested, struct avc_entry_ref *aeref, struct av_decision *avd) argument 840 avc_compute_create(security_id_t ssid, security_id_t tsid, security_class_t tclass, security_id_t *newsid) argument 890 avc_compute_member(security_id_t ssid, security_id_t tsid, security_class_t tclass, security_id_t *newsid) argument 910 avc_add_callback(int (*callback) (uint32_t event, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, access_vector_t * out_retained), uint32_t events, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms) argument 971 avc_update_cache(uint32_t event, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms) argument 1009 avc_control(uint32_t event, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, access_vector_t * out_retained) argument 1069 avc_ss_grant(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno) argument 1090 avc_ss_try_revoke(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, access_vector_t * out_retained) argument 1110 avc_ss_revoke(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno) argument 1145 avc_ss_set_auditallow(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, uint32_t enable) argument 1166 avc_ss_set_auditdeny(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, uint32_t enable) argument [all...] |
H A D | compute_relabel.c | 15 security_class_t tclass, 39 snprintf(buf, size, "%s %s %hu", scon, tcon, unmap_class(tclass)); 67 security_class_t tclass, 82 ret = security_compute_relabel_raw(rscon, rtcon, tclass, &rnewcon); 13 security_compute_relabel_raw(const char * scon, const char * tcon, security_class_t tclass, char ** newcon) argument
|
/external/selinux/libsepol/include/sepol/policydb/ |
H A D | services.h | 48 sepol_security_class_t tclass, /* IN */ 59 sepol_security_class_t tclass, 75 sepol_security_class_t tclass, 91 sepol_security_class_t tclass, 100 sepol_security_class_t *tclass); 103 * Return a permission av bit associated with tclass and the string 106 extern int sepol_string_to_av_perm(sepol_security_class_t tclass, 112 * class `tclass' based on a SID pair. 116 sepol_security_class_t tclass, /* IN */ 121 * polyinstantiated object of class `tclass' base [all...] |
H A D | util.h | 32 extern char *sepol_av_to_string(policydb_t * policydbp, uint32_t tclass,
|
/external/libselinux/include/selinux/ |
H A D | selinux.h | 166 security_class_t tclass, 174 security_class_t tclass, 181 security_class_t tclass, 188 security_class_t tclass, 266 extern const char *security_av_perm_to_string(security_class_t tclass, 268 extern access_vector_t string_to_av_perm(security_class_t tclass, 273 extern int security_av_string(security_class_t tclass, 279 const char *tclass,
|
H A D | avc.h | 239 * @tclass: target security class 240 * @requested: requested permissions, interpreted based on @tclass 246 * based on @tclass, and call the security server on a cache miss to obtain 258 security_class_t tclass, 266 * @tclass: target security class 267 * @requested: requested permissions, interpreted based on @tclass 273 * based on @tclass, and call the security server on a cache miss to obtain 281 security_class_t tclass, access_vector_t requested, 288 * @tclass: target security class 304 security_class_t tclass, access_vector_ [all...] |
/external/selinux/libselinux/include/selinux/ |
H A D | selinux.h | 186 security_class_t tclass, 191 security_class_t tclass, 197 security_class_t tclass, 202 security_class_t tclass, 210 security_class_t tclass, 214 security_class_t tclass, 218 security_class_t tclass, 223 security_class_t tclass, 231 security_class_t tclass, 235 security_class_t tclass, [all...] |
H A D | avc.h | 243 * @tclass: target security class 244 * @requested: requested permissions, interpreted based on @tclass 250 * based on @tclass, and call the security server on a cache miss to obtain 262 security_class_t tclass, 270 * @tclass: target security class 271 * @requested: requested permissions, interpreted based on @tclass 277 * based on @tclass, and call the security server on a cache miss to obtain 285 security_class_t tclass, access_vector_t requested, 292 * @tclass: target security class 308 security_class_t tclass, access_vector_ [all...] |
/external/selinux/prebuilts/bin/ |
H A D | sesearch.py | 73 expr.add_argument("-c", "--class", dest="tclass", 136 if args.tclass: 138 q.tclass = args.tclass 140 q.tclass = args.tclass.split(",") 169 if args.tclass: 171 q.tclass = args.tclass 173 q.tclass [all...] |
/external/selinux/policycoreutils/sepolicy/sepolicy/ |
H A D | booleans.py | 33 def get_types(src, tclass, perm): 34 allows=search([sepolicy.ALLOW],{sepolicy.SOURCE:src,sepolicy.CLASS:tclass, sepolicy.PERMS:perm})
|
H A D | communicate.py | 40 def get_types(src, tclass, perm): 41 allows=search([sepolicy.ALLOW],{sepolicy.SOURCE:src,sepolicy.CLASS:tclass, sepolicy.PERMS:perm})
|