Lines Matching refs:tclass
50 u16 tclass;
127 static inline int avc_hash(u32 ssid, u32 tsid, u16 tclass)
129 return (ssid ^ (tsid<<2) ^ (tclass<<4)) & (AVC_CACHE_SLOTS - 1);
418 u32 ssid, u32 tsid, u16 tclass,
430 return slow_avc_audit(state, ssid, tsid, tclass, requested,
519 static void avc_node_populate(struct avc_node *node, u32 ssid, u32 tsid, u16 tclass, struct av_decision *avd)
523 node->ae.tclass = tclass;
528 u32 ssid, u32 tsid, u16 tclass)
534 hvalue = avc_hash(ssid, tsid, tclass);
538 tclass == node->ae.tclass &&
552 * @tclass: target security class
556 * based on @tclass. If a valid AVC entry exists,
561 u32 ssid, u32 tsid, u16 tclass)
566 node = avc_search_node(avc, ssid, tsid, tclass);
602 * @tclass: target security class
607 * (@ssid, @tsid) and class @tclass.
617 u32 ssid, u32 tsid, u16 tclass,
634 avc_node_populate(node, ssid, tsid, tclass, avd);
640 hvalue = avc_hash(ssid, tsid, tclass);
647 pos->ae.tclass == tclass) {
679 perms = secclass_map[sad->tclass-1].perms;
711 const char *tclass = NULL;
730 tclass = secclass_map[sad->tclass-1].name;
731 audit_log_format(ab, " tclass=%s", tclass);
736 trace_selinux_audited(sad, scontext, tcontext, tclass);
764 u32 ssid, u32 tsid, u16 tclass,
771 if (WARN_ON(!tclass || tclass >= ARRAY_SIZE(secclass_map)))
779 sad.tclass = tclass;
826 * @ssid,@tsid,@tclass : identifier of an AVC entry
838 u32 tsid, u16 tclass, u32 seqno,
870 hvalue = avc_hash(ssid, tsid, tclass);
880 tclass == pos->ae.tclass &&
897 avc_node_populate(node, ssid, tsid, tclass, &orig->ae.avd);
1005 u16 tclass, struct av_decision *avd,
1010 security_compute_av(state, ssid, tsid, tclass, avd, &xp_node->xp);
1012 return avc_insert(state->avc, ssid, tsid, tclass, avd, xp_node);
1017 u16 tclass, u32 requested,
1029 xperm, ssid, tsid, tclass, avd->seqno, NULL, flags);
1041 u32 ssid, u32 tsid, u16 tclass, u32 requested,
1062 node = avc_lookup(state->avc, ssid, tsid, tclass);
1064 node = avc_compute_av(state, ssid, tsid, tclass, &avd, xp_node);
1088 security_compute_xperms_decision(state, ssid, tsid, tclass,
1092 driver, xperm, ssid, tsid, tclass, avd.seqno,
1105 rc = avc_denied(state, ssid, tsid, tclass, requested,
1110 rc2 = avc_xperms_audit(state, ssid, tsid, tclass, requested,
1121 * @tclass: target security class
1122 * @requested: requested permissions, interpreted based on @tclass
1128 * based on @tclass, and call the security server on a cache miss to obtain
1139 u16 tclass, u32 requested,
1153 node = avc_lookup(state->avc, ssid, tsid, tclass);
1155 node = avc_compute_av(state, ssid, tsid, tclass, avd, &xp_node);
1161 rc = avc_denied(state, ssid, tsid, tclass, requested, 0, 0,
1172 * @tclass: target security class
1173 * @requested: requested permissions, interpreted based on @tclass
1178 * based on @tclass, and call the security server on a cache miss to obtain
1184 int avc_has_perm(struct selinux_state *state, u32 ssid, u32 tsid, u16 tclass,
1190 rc = avc_has_perm_noaudit(state, ssid, tsid, tclass, requested, 0,
1193 rc2 = avc_audit(state, ssid, tsid, tclass, requested, &avd, rc,
1201 u32 ssid, u32 tsid, u16 tclass, u32 requested,
1208 rc = avc_has_perm_noaudit(state, ssid, tsid, tclass, requested,
1212 rc2 = avc_audit(state, ssid, tsid, tclass, requested, &avd, rc,