/security/selinux/ |
D | avc.c | 50 u16 tclass; member 99 static inline int avc_hash(u32 ssid, u32 tsid, u16 tclass) in avc_hash() argument 101 return (ssid ^ (tsid<<2) ^ (tclass<<4)) & (AVC_CACHE_SLOTS - 1); in avc_hash() 109 static void avc_dump_av(struct audit_buffer *ab, u16 tclass, u32 av) in avc_dump_av() argument 119 BUG_ON(!tclass || tclass >= ARRAY_SIZE(secclass_map)); in avc_dump_av() 120 perms = secclass_map[tclass-1].perms; in avc_dump_av() 146 static void avc_dump_query(struct audit_buffer *ab, u32 ssid, u32 tsid, u16 tclass) in avc_dump_query() argument 168 BUG_ON(!tclass || tclass >= ARRAY_SIZE(secclass_map)); in avc_dump_query() 169 audit_log_format(ab, " tclass=%s", secclass_map[tclass-1].name); in avc_dump_query() 468 static inline int avc_xperms_audit(u32 ssid, u32 tsid, u16 tclass, in avc_xperms_audit() argument [all …]
|
D | selinuxfs.c | 712 u16 tclass; in sel_write_access() local 731 if (sscanf(buf, "%s %s %hu", scon, tcon, &tclass) != 3) in sel_write_access() 742 security_compute_av_user(ssid, tsid, tclass, &avd); in sel_write_access() 760 u16 tclass; in sel_write_create() local 786 nargs = sscanf(buf, "%s %s %hu %s", scon, tcon, &tclass, namebuf); in sel_write_create() 828 length = security_transition_sid_user(ssid, tsid, tclass, in sel_write_create() 858 u16 tclass; in sel_write_relabel() local 878 if (sscanf(buf, "%s %s %hu", scon, tcon, &tclass) != 3) in sel_write_relabel() 889 length = security_change_sid(ssid, tsid, tclass, &newsid); in sel_write_relabel() 974 u16 tclass; in sel_write_member() local [all …]
|
D | hooks.c | 1261 u16 tclass, in selinux_genfs_get_sid() argument 1286 rc = security_genfs_sid(sb->s_type->name, path, tclass, sid); in selinux_genfs_get_sid() 1725 u16 tclass, in selinux_determine_inode_label() argument 1739 return security_transition_sid(tsec->sid, dsec->sid, tclass, in selinux_determine_inode_label() 1749 u16 tclass) in may_create() argument 1772 rc = selinux_determine_inode_label(dir, &dentry->d_name, tclass, in may_create() 1777 rc = avc_has_perm(sid, newsid, tclass, FILE__CREATE, &ad); in may_create()
|
/security/selinux/include/ |
D | avc.h | 55 u16 tclass; member 104 int slow_avc_audit(u32 ssid, u32 tsid, u16 tclass, 130 u16 tclass, u32 requested, in avc_audit() argument 140 return slow_avc_audit(ssid, tsid, tclass, in avc_audit() 148 u16 tclass, u32 requested, 153 u16 tclass, u32 requested, 156 u16 tclass, u32 requested, 160 int avc_has_extended_perms(u32 ssid, u32 tsid, u16 tclass, u32 requested,
|
D | security.h | 141 u16 tclass, struct av_decision *avd, 144 void security_compute_xperms_decision(u32 ssid, u32 tsid, u16 tclass, 148 u16 tclass, struct av_decision *avd); 150 int security_transition_sid(u32 ssid, u32 tsid, u16 tclass, 153 int security_transition_sid_user(u32 ssid, u32 tsid, u16 tclass, 157 u16 tclass, u32 *out_sid); 160 u16 tclass, u32 *out_sid); 189 u16 tclass);
|
/security/selinux/ss/ |
D | services.c | 98 u16 tclass, 197 static u16 unmap_class(u16 tclass) in unmap_class() argument 199 if (tclass < current_mapping_size) in unmap_class() 200 return current_mapping[tclass].value; in unmap_class() 202 return tclass; in unmap_class() 220 static void map_decision(u16 tclass, struct av_decision *avd, in map_decision() argument 223 if (tclass < current_mapping_size) { in map_decision() 224 unsigned i, n = current_mapping[tclass].num_perms; in map_decision() 228 if (avd->allowed & current_mapping[tclass].perms[i]) in map_decision() 230 if (allow_unknown && !current_mapping[tclass].perms[i]) in map_decision() [all …]
|
D | mls.c | 507 u16 tclass, in mls_compute_sid() argument 525 rtr.target_class = tclass; in mls_compute_sid() 530 if (tclass && tclass <= policydb.p_classes.nprim) { in mls_compute_sid() 531 cladatum = policydb.class_val_to_struct[tclass - 1]; in mls_compute_sid() 553 if ((tclass == policydb.process_class) || (sock == true)) in mls_compute_sid()
|
D | policydb.h | 90 u32 tclass; /* process class, or new object class */ member 98 u16 tclass; /* class of new object */ member 369 extern u32 string_to_av_perm(struct policydb *p, u16 tclass, const char *name);
|
D | mls.h | 50 u16 tclass,
|
D | policydb.c | 214 hash = ft->stype ^ ft->ttype ^ ft->tclass; in filenametr_hash() 236 v = ft1->tclass - ft2->tclass; in filenametr_cmp() 1823 u32 string_to_av_perm(struct policydb *p, u16 tclass, const char *name) in string_to_av_perm() argument 1829 if (!tclass || tclass > p->p_classes.nprim) in string_to_av_perm() 1832 cladatum = p->class_val_to_struct[tclass-1]; in string_to_av_perm() 1969 ft->tclass = le32_to_cpu(buf[2]); in filename_trans_read() 2422 tr->tclass = le32_to_cpu(buf[0]); in policydb_read() 2424 tr->tclass = p->process_class; in policydb_read() 2428 !policydb_class_isvalid(p, tr->tclass) || in policydb_read() 2664 buf[0] = cpu_to_le32(tr->tclass); in role_trans_write() [all …]
|