| /security/selinux/ |
| A D | avc.c | 50 u16 tclass; member 517 node->ae.tclass = tclass; in avc_node_populate() 527 hvalue = avc_hash(ssid, tsid, tclass); in avc_search_node() 531 tclass == node->ae.tclass && in avc_search_node() 635 pos->ae.tclass == tclass) { in avc_insert() 698 const char *tclass = NULL; in avc_audit_post_callback() local 717 tclass = secclass_map[sad->tclass-1].name; in avc_audit_post_callback() 761 if (WARN_ON(!tclass || tclass >= ARRAY_SIZE(secclass_map))) in slow_avc_audit() 769 sad.tclass = tclass; in slow_avc_audit() 858 tclass == pos->ae.tclass && in avc_update_node() [all …]
|
| A D | selinuxfs.c | 735 u16 tclass; in sel_write_validatetrans() local 860 u16 tclass; in sel_write_access() local 880 if (sscanf(buf, "%s %s %hu", scon, tcon, &tclass) != 3) in sel_write_access() 891 security_compute_av_user(ssid, tsid, tclass, &avd); in sel_write_access() 909 u16 tclass; in sel_write_create() local 979 length = security_transition_sid_user(ssid, tsid, tclass, in sel_write_create() 1009 u16 tclass; in sel_write_relabel() local 1031 if (sscanf(buf, "%s %s %hu", scon, tcon, &tclass) != 3) in sel_write_relabel() 1042 length = security_change_sid(ssid, tsid, tclass, &newsid); in sel_write_relabel() 1134 u16 tclass; in sel_write_member() local [all …]
|
| A D | hooks.c | 1320 u16 tclass, in selinux_genfs_get_sid() argument 1346 path, tclass, sid); in selinux_genfs_get_sid() 1789 const struct qstr *name, u16 tclass, in selinux_determine_inode_label() argument 1804 dsec->sid, tclass, in selinux_determine_inode_label() 1814 u16 tclass) in may_create() argument 1837 rc = selinux_determine_inode_label(tsec, dir, &dentry->d_name, tclass, in may_create() 1842 rc = avc_has_perm(sid, newsid, tclass, FILE__CREATE, &ad); in may_create()
|
| /security/selinux/include/ |
| A D | avc.h | 51 u16 tclass; member 101 int slow_avc_audit(u32 ssid, u32 tsid, u16 tclass, u32 requested, u32 audited, 123 static inline int avc_audit(u32 ssid, u32 tsid, u16 tclass, u32 requested, in avc_audit() argument 131 return slow_avc_audit(ssid, tsid, tclass, requested, audited, denied, in avc_audit() 137 int avc_has_perm_noaudit(u32 ssid, u32 tsid, u16 tclass, u32 requested, 140 int avc_has_perm(u32 ssid, u32 tsid, u16 tclass, u32 requested, 145 int avc_has_extended_perms(u32 ssid, u32 tsid, u16 tclass, u32 requested,
|
| A D | security.h | 266 void security_compute_av(u32 ssid, u32 tsid, u16 tclass, 270 void security_compute_xperms_decision(u32 ssid, u32 tsid, u16 tclass, u8 driver, 274 void security_compute_av_user(u32 ssid, u32 tsid, u16 tclass, 277 int security_transition_sid(u32 ssid, u32 tsid, u16 tclass, 280 int security_transition_sid_user(u32 ssid, u32 tsid, u16 tclass, 283 int security_member_sid(u32 ssid, u32 tsid, u16 tclass, u32 *out_sid); 285 int security_change_sid(u32 ssid, u32 tsid, u16 tclass, u32 *out_sid); 317 u16 tclass); 320 u16 tclass);
|
| /security/selinux/ss/ |
| A D | services.c | 182 return tclass; in unmap_class() 568 tclass, in type_attribute_bounds_av() 767 u16 tclass; in security_compute_validatetrans() local 785 if (!tclass || tclass > policydb->p_classes.nprim) { in security_compute_validatetrans() 1036 u16 tclass; in security_compute_xperms_decision() local 1132 u16 tclass; in security_compute_av() local 1689 u16 tclass, in compute_sid_handle_invalid_context() argument 1740 ft.tclass = tclass; in filename_compute_type() 1769 u16 tclass; in security_compute_sid() local 1823 if (tclass && tclass <= policydb->p_classes.nprim) in security_compute_sid() [all …]
|
| A D | mls.c | 481 struct context *tcontext, u16 tclass, u32 specified, in mls_compute_sid() argument 497 rtr.target_class = tclass; in mls_compute_sid() 502 if (tclass && tclass <= p->p_classes.nprim) { in mls_compute_sid() 503 cladatum = p->class_val_to_struct[tclass - 1]; in mls_compute_sid() 528 if ((tclass == p->process_class) || sock) in mls_compute_sid()
|
| A D | policydb.h | 85 u32 tclass; /* process class, or new object class */ member 94 u16 tclass; /* class of new object */ member 394 extern u32 string_to_av_perm(struct policydb *p, u16 tclass, const char *name);
|
| A D | policydb.c | 436 v = ft1->tclass - ft2->tclass; in filenametr_cmp() 496 (u32)key->tclass << 16 | key->tclass, 0); in role_trans_hash() 512 return key1->tclass - key2->tclass; in role_trans_cmp() 1829 if (!tclass || tclass > p->p_classes.nprim) in string_to_av_perm() 1947 key.tclass = le32_to_cpu(buf[2]); in filename_trans_read_helper_compat() 2011 u32 len, ttype, tclass, ndatum, i; in filename_trans_read_helper() local 2031 tclass = le32_to_cpu(buf[1]); in filename_trans_read_helper() 2070 ft->tclass = tclass; in filename_trans_read_helper() 2648 rtk->tclass = p->process_class; in policydb_read() 2896 buf[0] = cpu_to_le32(rtk->tclass); in role_trans_write_one() [all …]
|
| A D | mls.h | 46 struct context *tcontext, u16 tclass, u32 specified,
|