Lines Matching defs:sclass
1413 u16 sclass;
1424 if (isec->sclass == SECCLASS_FILE)
1425 isec->sclass = inode_mode_to_security_class(inode->i_mode);
1439 sclass = isec->sclass;
1500 sclass, NULL, &sid);
1540 rc = selinux_genfs_get_sid(dentry, sclass,
1623 u16 sclass;
1633 sclass = initns ? SECCLASS_CAPABILITY : SECCLASS_CAP_USERNS;
1636 sclass = initns ? SECCLASS_CAPABILITY2 : SECCLASS_CAP2_USERNS;
1644 rc = avc_has_perm_noaudit(sid, sid, sclass, av, 0, &avd);
1646 int rc2 = avc_audit(sid, sid, sclass, av, &avd, rc, &ad);
1670 return avc_has_perm(sid, isec->sid, isec->sclass, perms, adp);
1878 rc = avc_has_perm(sid, isec->sid, isec->sclass, av, &ad);
1907 old_isec->sclass, FILE__RENAME, &ad);
1912 old_isec->sclass, DIR__REPARENT, &ad);
1928 new_isec->sclass,
2085 return avc_has_perm(sid, isec->sid, isec->sclass, file_to_av(file),
2846 isec->sclass = SECCLASS_FILE;
2925 isec->sclass = inode_mode_to_security_class(inode->i_mode);
2975 isec->sclass = context_isec->sclass;
2978 isec->sclass = SECCLASS_ANON_INODE;
2981 isec->sclass, name, &isec->sid);
2997 isec->sclass,
3065 return avc_has_perm(sid, isec->sid, isec->sclass, FILE__READ, &ad);
3078 return slow_avc_audit(current_sid(), isec->sid, isec->sclass, perms,
3111 rc = avc_has_perm_noaudit(sid, isec->sid, isec->sclass, perms, 0,
3205 rc = avc_has_perm(sid, isec->sid, isec->sclass,
3245 rc = avc_has_perm(sid, newsid, isec->sclass,
3251 sid, isec->sclass);
3315 isec->sclass = inode_mode_to_security_class(inode->i_mode);
3474 isec->sclass = inode_mode_to_security_class(inode->i_mode);
3676 rc = avc_has_extended_perms(ssid, isec->sid, isec->sclass,
4249 isec->sclass = inode_mode_to_security_class(inode->i_mode);
4580 return avc_has_perm(current_sid(), sksec->sid, sksec->sclass, perms,
4609 u16 sclass = socket_type_to_security_class(family, type, protocol);
4614 err = socket_sockcreate_sid(tsec, sclass, &sid);
4619 isec->sclass = sclass;
4625 sksec->sclass = sclass;
4628 if (sksec->sclass == SECCLASS_SCTP_SOCKET)
4737 sksec->sclass,
4744 switch (sksec->sclass) {
4776 sksec->sclass, node_perm, &ad);
4784 if (sksec->sclass == SECCLASS_SCTP_SOCKET)
4815 if (sksec->sclass == SECCLASS_TCP_SOCKET ||
4816 sksec->sclass == SECCLASS_DCCP_SOCKET ||
4817 sksec->sclass == SECCLASS_SCTP_SOCKET) {
4847 if (sksec->sclass == SECCLASS_SCTP_SOCKET)
4857 switch (sksec->sclass) {
4873 err = avc_has_perm(sksec->sid, sid, sksec->sclass, perm, &ad);
4905 u16 sclass;
4914 sclass = isec->sclass;
4919 newisec->sclass = sclass;
4984 sksec_other->sclass,
5012 return avc_has_perm(ssec->sid, osec->sid, osec->sclass, SOCKET__SENDTO,
5143 if (sksec->sclass == SECCLASS_UNIX_STREAM_SOCKET ||
5144 sksec->sclass == SECCLASS_TCP_SOCKET ||
5145 sksec->sclass == SECCLASS_SCTP_SOCKET)
5206 sksec->sclass = SECCLASS_SOCKET;
5229 newsksec->sclass = sksec->sclass;
5254 sksec->sclass = isec->sclass;
5306 sksec->sclass, SCTP_SOCKET__ASSOCIATION,
5464 newsksec->sclass = sksec->sclass;
5473 ssksec->sclass = sksec->sclass;
5615 sksec->sclass = SECCLASS_TUN_SOCKET;
5913 u16 sclass = sksec->sclass;
5928 rc = selinux_nlmsg_lookup(sclass, nlh->nlmsg_type, &perm);
5936 " message: protocol=%hu nlmsg_type=%hu sclass=%s"
5939 secclass_map[sclass - 1].name,
5963 static void ipc_init_security(struct ipc_security_struct *isec, u16 sclass)
5965 isec->sclass = sclass;
5981 return avc_has_perm(sid, isec->sid, isec->sclass, perms, &ad);