Lines Matching refs:tclass
95 u16 tclass,
180 static u16 unmap_class(struct selinux_map *map, u16 tclass)
182 if (tclass < map->size)
183 return map->mapping[tclass].value;
185 return tclass;
204 u16 tclass, struct av_decision *avd,
207 if (tclass < map->size) {
208 struct selinux_mapping *mapping = &map->mapping[tclass];
462 u16 tclass,
480 tclass_name = sym_name(policydb, SYM_CLASSES, tclass - 1);
481 tclass_dat = policydb->class_val_to_struct[tclass - 1];
510 "scontext=%s tcontext=%s tclass=%s perms=",
541 u16 tclass,
573 tclass,
587 tclass, masked, "bounds");
622 u16 tclass,
643 if (unlikely(!tclass || tclass > policydb->p_classes.nprim)) {
645 pr_warn("SELinux: Invalid class %hu\n", tclass);
649 tclass_datum = policydb->class_val_to_struct[tclass - 1];
655 avkey.target_class = tclass;
703 if (tclass == policydb->process_class &&
721 tclass, avd);
729 u16 tclass)
744 " oldcontext=%s newcontext=%s taskcontext=%s tclass=%s",
745 o, n, t, sym_name(p, SYM_CLASSES, tclass-1));
768 u16 tclass;
782 tclass = unmap_class(&policy->map, orig_tclass);
784 tclass = orig_tclass;
786 if (!tclass || tclass > policydb->p_classes.nprim) {
790 tclass_datum = policydb->class_val_to_struct[tclass - 1];
829 tclass);
842 u16 tclass)
845 tclass, true);
1024 u16 tclass;
1060 tclass = unmap_class(&policy->map, orig_tclass);
1061 if (unlikely(orig_tclass && !tclass)) {
1068 if (unlikely(!tclass || tclass > policydb->p_classes.nprim)) {
1069 pr_warn_ratelimited("SELinux: Invalid class %hu\n", tclass);
1073 avkey.target_class = tclass;
1103 * @tclass: target security class
1108 * SID pair (@ssid, @tsid) for the permissions in @tclass.
1120 u16 tclass;
1151 tclass = unmap_class(&policy->map, orig_tclass);
1152 if (unlikely(orig_tclass && !tclass)) {
1157 context_struct_compute_av(policydb, scontext, tcontext, tclass, avd,
1172 u16 tclass,
1207 if (unlikely(!tclass)) {
1213 context_struct_compute_av(policydb, scontext, tcontext, tclass, avd,
1654 u16 tclass,
1674 audit_log_format(ab, " scontext=%s tcontext=%s tclass=%s",
1675 s, t, sym_name(policydb, SYM_CLASSES, tclass-1));
1688 u32 stype, u32 ttype, u16 tclass,
1703 ft.tclass = tclass;
1734 u16 tclass;
1759 tclass = unmap_class(&policy->map, orig_tclass);
1762 tclass = orig_tclass;
1764 tclass));
1788 if (tclass && tclass <= policydb->p_classes.nprim)
1789 cladatum = policydb->class_val_to_struct[tclass - 1];
1815 if ((tclass == policydb->process_class) || sock)
1827 if ((tclass == policydb->process_class) || sock) {
1839 avkey.target_class = tclass;
1862 tcontext->type, tclass, objname);
1871 .tclass = tclass,
1881 rc = mls_compute_sid(policydb, scontext, tcontext, tclass, specified,
1889 tentry, tclass,
1912 * @tclass: target security class
1916 * class @tclass based on a SID pair (@ssid, @tsid).
1922 u32 ssid, u32 tsid, u16 tclass,
1925 return security_compute_sid(state, ssid, tsid, tclass,
1931 u32 ssid, u32 tsid, u16 tclass,
1934 return security_compute_sid(state, ssid, tsid, tclass,
1943 * @tclass: target security class
1947 * object of class @tclass based on a SID pair (@ssid, @tsid).
1955 u16 tclass,
1958 return security_compute_sid(state, ssid, tsid, tclass,
1967 * @tclass: target security class
1970 * Compute a SID to use for relabeling an object of class @tclass
1979 u16 tclass,
1983 ssid, tsid, tclass, AVTAB_CHANGE, NULL,