/security/selinux/include/ |
H A D | avc.h | 55 u16 tclass; member in struct:selinux_audit_data 104 int slow_avc_audit(u32 ssid, u32 tsid, u16 tclass, 113 * @tclass: target security class 130 u16 tclass, u32 requested, 139 return slow_avc_audit(ssid, tsid, tclass, 147 u16 tclass, u32 requested, 152 u16 tclass, u32 requested, 155 int avc_has_operation(u32 ssid, u32 tsid, u16 tclass, u32 requested, 129 avc_audit(u32 ssid, u32 tsid, u16 tclass, u32 requested, struct av_decision *avd, int result, struct common_audit_data *a) argument
|
/security/selinux/ss/ |
H A D | mls.c | 507 u16 tclass, 525 rtr.target_class = tclass; 530 if (tclass && tclass <= policydb.p_classes.nprim) { 531 cladatum = policydb.class_val_to_struct[tclass - 1]; 553 if ((tclass == policydb.process_class) || (sock == true)) 505 mls_compute_sid(struct context *scontext, struct context *tcontext, u16 tclass, u32 specified, struct context *newcontext, bool sock) argument
|
H A D | policydb.h | 90 u32 tclass; /* process class, or new object class */ member in struct:role_trans 98 u16 tclass; /* class of new object */ member in struct:filename_trans 367 extern u32 string_to_av_perm(struct policydb *p, u16 tclass, const char *name);
|
H A D | policydb.c | 214 hash = ft->stype ^ ft->ttype ^ ft->tclass; 236 v = ft1->tclass - ft2->tclass; 1814 u32 string_to_av_perm(struct policydb *p, u16 tclass, const char *name) argument 1820 if (!tclass || tclass > p->p_classes.nprim) 1823 cladatum = p->class_val_to_struct[tclass-1]; 1960 ft->tclass = le32_to_cpu(buf[2]); 2409 tr->tclass = le32_to_cpu(buf[0]); 2411 tr->tclass [all...] |
H A D | services.c | 97 u16 tclass, 196 static u16 unmap_class(u16 tclass) argument 198 if (tclass < current_mapping_size) 199 return current_mapping[tclass].value; 201 return tclass; 219 static void map_decision(u16 tclass, struct av_decision *avd, argument 222 if (tclass < current_mapping_size) { 223 unsigned i, n = current_mapping[tclass].num_perms; 227 if (avd->allowed & current_mapping[tclass].perms[i]) 229 if (allow_unknown && !current_mapping[tclass] 462 security_dump_masked_av(struct context *scontext, struct context *tcontext, u16 tclass, u32 permissions, const char *reason) argument 540 type_attribute_bounds_av(struct context *scontext, struct context *tcontext, u16 tclass, struct av_decision *avd) argument 647 context_struct_compute_av(struct context *scontext, struct context *tcontext, u16 tclass, struct av_decision *avd, struct operation *ops) argument 751 security_validtrans_handle_fail(struct context *ocontext, struct context *ncontext, struct context *tcontext, u16 tclass) argument 787 u16 tclass; local 989 u16 tclass; local 1079 u16 tclass; local 1122 security_compute_av_user(u32 ssid, u32 tsid, u16 tclass, struct av_decision *avd) argument 1500 compute_sid_handle_invalid_context( struct context *scontext, struct context *tcontext, u16 tclass, struct context *newcontext) argument 1530 filename_compute_type(struct policydb *p, struct context *newcontext, u32 stype, u32 ttype, u16 tclass, const char *objname) argument 1569 u16 tclass; local 1740 security_transition_sid(u32 ssid, u32 tsid, u16 tclass, const struct qstr *qstr, u32 *out_sid) argument 1747 security_transition_sid_user(u32 ssid, u32 tsid, u16 tclass, const char *objname, u32 *out_sid) argument 1767 security_member_sid(u32 ssid, u32 tsid, u16 tclass, u32 *out_sid) argument 1789 security_change_sid(u32 ssid, u32 tsid, u16 tclass, u32 *out_sid) argument [all...] |
/security/selinux/ |
H A D | avc.c | 50 u16 tclass; member in struct:avc_entry 99 static inline int avc_hash(u32 ssid, u32 tsid, u16 tclass) argument 101 return (ssid ^ (tsid<<2) ^ (tclass<<4)) & (AVC_CACHE_SLOTS - 1); 106 * @tclass: target security class 109 static void avc_dump_av(struct audit_buffer *ab, u16 tclass, u32 av) argument 119 perms = secclass_map[tclass-1].perms; 143 * @tclass: target security class 145 static void avc_dump_query(struct audit_buffer *ab, u32 ssid, u32 tsid, u16 tclass) argument 167 BUG_ON(tclass >= ARRAY_SIZE(secclass_map)); 168 audit_log_format(ab, " tclass 478 avc_operation_audit(u32 ssid, u32 tsid, u16 tclass, u32 requested, struct av_decision *avd, struct operation_decision *od, u16 cmd, int result, struct common_audit_data *ad) argument 576 avc_node_populate(struct avc_node *node, u32 ssid, u32 tsid, u16 tclass, struct av_decision *avd) argument 584 avc_search_node(u32 ssid, u32 tsid, u16 tclass) argument 616 avc_lookup(u32 ssid, u32 tsid, u16 tclass) argument 670 avc_insert(u32 ssid, u32 tsid, u16 tclass, struct av_decision *avd, struct avc_operation_node *ops_node) argument 750 slow_avc_audit(u32 ssid, u32 tsid, u16 tclass, u32 requested, u32 audited, u32 denied, int result, struct common_audit_data *a, unsigned flags) argument 834 avc_update_node(u32 event, u32 perms, u16 cmd, u32 ssid, u32 tsid, u16 tclass, u32 seqno, struct operation_decision *od, u32 flags) argument 984 avc_compute_av(u32 ssid, u32 tsid, u16 tclass, struct av_decision *avd, struct avc_operation_node *ops_node) argument 995 avc_denied(u32 ssid, u32 tsid, u16 tclass, u32 requested, u16 cmd, unsigned flags, struct av_decision *avd) argument 1021 avc_has_operation(u32 ssid, u32 tsid, u16 tclass, u32 requested, u16 cmd, struct common_audit_data *ad) argument 1113 avc_has_perm_noaudit(u32 ssid, u32 tsid, u16 tclass, u32 requested, unsigned flags, struct av_decision *avd) argument 1157 avc_has_perm(u32 ssid, u32 tsid, u16 tclass, u32 requested, struct common_audit_data *auditdata) argument [all...] |
H A D | selinuxfs.c | 712 u16 tclass; local 731 if (sscanf(buf, "%s %s %hu", scon, tcon, &tclass) != 3) 744 security_compute_av_user(ssid, tsid, tclass, &avd); 762 u16 tclass; local 788 nargs = sscanf(buf, "%s %s %hu %s", scon, tcon, &tclass, namebuf); 832 length = security_transition_sid_user(ssid, tsid, tclass, 862 u16 tclass; local 882 if (sscanf(buf, "%s %s %hu", scon, tcon, &tclass) != 3) 895 length = security_change_sid(ssid, tsid, tclass, &newsid); 980 u16 tclass; local [all...] |
H A D | hooks.c | 1236 u16 tclass, 1261 rc = security_genfs_sid(sb->s_type->name, path, tclass, sid); 1698 u16 tclass) 1723 rc = security_transition_sid(sid, dsec->sid, tclass, 1729 rc = avc_has_perm(sid, newsid, tclass, FILE__CREATE, &ad); 1235 selinux_genfs_get_sid(struct dentry *dentry, u16 tclass, u16 flags, u32 *sid) argument 1696 may_create(struct inode *dir, struct dentry *dentry, u16 tclass) argument
|