Lines Matching refs:u32
230 u32 allowed;
231 u32 auditallow;
232 u32 auditdeny;
233 u32 seqno;
234 u32 flags;
244 u32 p[8];
266 void security_compute_av(u32 ssid, u32 tsid, u16 tclass,
270 void security_compute_xperms_decision(u32 ssid, u32 tsid, u16 tclass, u8 driver,
274 void security_compute_av_user(u32 ssid, u32 tsid, u16 tclass,
277 int security_transition_sid(u32 ssid, u32 tsid, u16 tclass,
278 const struct qstr *qstr, u32 *out_sid);
280 int security_transition_sid_user(u32 ssid, u32 tsid, u16 tclass,
281 const char *objname, u32 *out_sid);
283 int security_member_sid(u32 ssid, u32 tsid, u16 tclass, u32 *out_sid);
285 int security_change_sid(u32 ssid, u32 tsid, u16 tclass, u32 *out_sid);
287 int security_sid_to_context(u32 sid, char **scontext, u32 *scontext_len);
289 int security_sid_to_context_force(u32 sid, char **scontext, u32 *scontext_len);
291 int security_sid_to_context_inval(u32 sid, char **scontext, u32 *scontext_len);
293 int security_context_to_sid(const char *scontext, u32 scontext_len,
294 u32 *out_sid, gfp_t gfp);
296 int security_context_str_to_sid(const char *scontext, u32 *out_sid, gfp_t gfp);
298 int security_context_to_sid_default(const char *scontext, u32 scontext_len,
299 u32 *out_sid, u32 def_sid, gfp_t gfp_flags);
301 int security_context_to_sid_force(const char *scontext, u32 scontext_len,
302 u32 *sid);
304 int security_get_user_sids(u32 fromsid, const char *username, u32 **sids, u32 *nel);
306 int security_port_sid(u8 protocol, u16 port, u32 *out_sid);
308 int security_ib_pkey_sid(u64 subnet_prefix, u16 pkey_num, u32 *out_sid);
310 int security_ib_endport_sid(const char *dev_name, u8 port_num, u32 *out_sid);
312 int security_netif_sid(const char *name, u32 *if_sid);
314 int security_node_sid(u16 domain, const void *addr, u32 addrlen, u32 *out_sid);
316 int security_validate_transition(u32 oldsid, u32 newsid, u32 tasksid,
319 int security_validate_transition_user(u32 oldsid, u32 newsid, u32 tasksid,
322 int security_bounded_transition(u32 old_sid, u32 new_sid);
324 int security_sid_mls_copy(u32 sid, u32 mls_sid, u32 *new_sid);
326 int security_net_peersid_resolve(u32 nlbl_sid, u32 nlbl_type, u32 xfrm_sid,
327 u32 *peer_sid);
330 u32 *nclasses);
332 char ***perms, u32 *nperms);
348 u32 *sid);
351 const char *path, u16 sclass, u32 *sid);
355 u32 *sid);
357 int security_netlbl_sid_to_secattr(u32 sid, struct netlbl_lsm_secattr *secattr);
360 security_netlbl_secattr_to_sid(struct netlbl_lsm_secattr *secattr, u32 *sid) in security_netlbl_secattr_to_sid()
366 security_netlbl_sid_to_secattr(u32 sid, struct netlbl_lsm_secattr *secattr) in security_netlbl_sid_to_secattr()
372 const char *security_get_initial_sid_context(u32 sid);
381 u32 version; /* version number of the structure */
382 u32 sequence; /* sequence number of seqlock logic */
383 u32 enforcing; /* current setting of enforcing mode */
384 u32 policyload; /* times of policy reloaded */
385 u32 deny_unknown; /* current setting of deny_unknown */
392 extern void selinux_status_update_policyload(u32 seqno);
396 extern void selnl_notify_policyload(u32 seqno);
397 extern int selinux_nlmsg_lookup(u16 sclass, u16 nlmsg_type, u32 *perm);