/security/selinux/ |
D | avc.c | 88 u32 tsid; member 109 int (*callback) (u32 event, u32 ssid, u32 tsid, 114 u32 tsid; member 131 static inline int avc_hash(u32 ssid, u32 tsid, u16 tclass) in avc_hash() argument 133 return (ssid ^ (tsid<<2) ^ (tclass<<4)) & (AVC_CACHE_SLOTS - 1); in avc_hash() 201 static void avc_dump_query(struct audit_buffer *ab, u32 ssid, u32 tsid, u16 tclass) in avc_dump_query() argument 215 rc = security_sid_to_context(tsid, &scontext, &scontext_len); in avc_dump_query() 217 audit_log_format(ab, " tsid=%d", tsid); in avc_dump_query() 358 static void avc_node_populate(struct avc_node *node, u32 ssid, u32 tsid, u16 tclass, struct avc_ent… in avc_node_populate() argument 361 node->ae.tsid = tsid; in avc_node_populate() [all …]
|
D | exports.c | 43 u32 tsid; in selinux_secmark_relabel_packet_permission() local 46 tsid = __tsec->sid; in selinux_secmark_relabel_packet_permission() 48 return avc_has_perm(tsid, sid, SECCLASS_PACKET, in selinux_secmark_relabel_packet_permission()
|
D | selinuxfs.c | 562 u32 ssid, tsid; in sel_write_access() local 588 length = security_context_to_sid(tcon, strlen(tcon)+1, &tsid); in sel_write_access() 592 length = security_compute_av(ssid, tsid, tclass, req, &avd); in sel_write_access() 611 u32 ssid, tsid, newsid; in sel_write_create() local 637 length = security_context_to_sid(tcon, strlen(tcon)+1, &tsid); in sel_write_create() 641 length = security_transition_sid(ssid, tsid, tclass, &newsid); in sel_write_create() 670 u32 ssid, tsid, newsid; in sel_write_relabel() local 696 length = security_context_to_sid(tcon, strlen(tcon)+1, &tsid); in sel_write_relabel() 700 length = security_change_sid(ssid, tsid, tclass, &newsid); in sel_write_relabel() 788 u32 ssid, tsid, newsid; in sel_write_member() local [all …]
|
D | netport.c | 250 static int sel_netport_avc_callback(u32 event, u32 ssid, u32 tsid, in sel_netport_avc_callback() argument
|
D | netif.c | 270 static int sel_netif_avc_callback(u32 event, u32 ssid, u32 tsid, in sel_netif_avc_callback() argument
|
D | netnode.c | 316 static int sel_netnode_avc_callback(u32 event, u32 ssid, u32 tsid, in sel_netnode_avc_callback() argument
|
D | hooks.c | 1389 u32 asid = cred_sid(actor), tsid = cred_sid(target); in cred_has_perm() local 1391 return avc_has_perm(asid, tsid, SECCLASS_PROCESS, perms, NULL); in cred_has_perm() 1423 u32 sid, tsid; in current_has_perm() local 1426 tsid = task_sid(tsk); in current_has_perm() 1427 return avc_has_perm(sid, tsid, SECCLASS_PROCESS, perms, NULL); in current_has_perm() 1926 u32 tsid, sid; in selinux_sysctl() local 1936 SECCLASS_DIR : SECCLASS_FILE, &tsid); in selinux_sysctl() 1939 tsid = SECINITSID_SYSCTL; in selinux_sysctl() 1945 error = avc_has_perm(sid, tsid, in selinux_sysctl() 1954 error = avc_has_perm(sid, tsid, in selinux_sysctl()
|
/security/selinux/include/ |
D | avc.h | 99 void avc_audit(u32 ssid, u32 tsid, 104 int avc_has_perm_noaudit(u32 ssid, u32 tsid, 109 int avc_has_perm(u32 ssid, u32 tsid, 124 int avc_add_callback(int (*callback)(u32 event, u32 ssid, u32 tsid, 127 u32 events, u32 ssid, u32 tsid,
|
D | security.h | 91 int security_compute_av(u32 ssid, u32 tsid, 95 int security_transition_sid(u32 ssid, u32 tsid, 98 int security_member_sid(u32 ssid, u32 tsid, 101 int security_change_sid(u32 ssid, u32 tsid,
|
/security/selinux/ss/ |
D | services.c | 736 u32 tsid, in security_compute_av() argument 762 tcontext = sidtab_search(&sidtab, tsid); in security_compute_av() 765 __func__, tsid); in security_compute_av() 1130 u32 tsid, in security_compute_sid() argument 1148 *out_sid = tsid; in security_compute_sid() 1165 tcontext = sidtab_search(&sidtab, tsid); in security_compute_sid() 1168 __func__, tsid); in security_compute_sid() 1281 u32 tsid, in security_transition_sid() argument 1285 return security_compute_sid(ssid, tsid, tclass, AVTAB_TRANSITION, out_sid); in security_transition_sid() 1302 u32 tsid, in security_member_sid() argument [all …]
|