Lines Matching refs:tclass
91 u16 tclass,
176 static u16 unmap_class(struct selinux_map *map, u16 tclass)
178 if (tclass < map->size)
179 return map->mapping[tclass].value;
181 return tclass;
200 u16 tclass, struct av_decision *avd,
203 if (tclass < map->size) {
204 struct selinux_mapping *mapping = &map->mapping[tclass];
458 u16 tclass,
476 tclass_name = sym_name(policydb, SYM_CLASSES, tclass - 1);
477 tclass_dat = policydb->class_val_to_struct[tclass - 1];
506 "scontext=%s tcontext=%s tclass=%s perms=",
535 u16 tclass,
567 tclass,
581 tclass, masked, "bounds");
614 u16 tclass,
635 if (unlikely(!tclass || tclass > policydb->p_classes.nprim)) {
637 pr_warn("SELinux: Invalid class %hu\n", tclass);
641 tclass_datum = policydb->class_val_to_struct[tclass - 1];
647 avkey.target_class = tclass;
695 if (tclass == policydb->process_class &&
713 tclass, avd);
720 u16 tclass)
735 " oldcontext=%s newcontext=%s taskcontext=%s tclass=%s",
736 o, n, t, sym_name(p, SYM_CLASSES, tclass-1));
758 u16 tclass;
772 tclass = unmap_class(&policy->map, orig_tclass);
774 tclass = orig_tclass;
776 if (!tclass || tclass > policydb->p_classes.nprim) {
780 tclass_datum = policydb->class_val_to_struct[tclass - 1];
818 tclass);
830 u16 tclass)
833 tclass, true);
1009 u16 tclass;
1045 tclass = unmap_class(&policy->map, orig_tclass);
1046 if (unlikely(orig_tclass && !tclass)) {
1053 if (unlikely(!tclass || tclass > policydb->p_classes.nprim)) {
1054 pr_warn_ratelimited("SELinux: Invalid class %hu\n", tclass);
1058 avkey.target_class = tclass;
1093 * SID pair (@ssid, @tsid) for the permissions in @tclass.
1104 u16 tclass;
1135 tclass = unmap_class(&policy->map, orig_tclass);
1136 if (unlikely(orig_tclass && !tclass)) {
1141 context_struct_compute_av(policydb, scontext, tcontext, tclass, avd,
1155 u16 tclass,
1190 if (unlikely(!tclass)) {
1196 context_struct_compute_av(policydb, scontext, tcontext, tclass, avd,
1630 u16 tclass,
1652 audit_log_format(ab, " scontext=%s tcontext=%s tclass=%s",
1653 s, t, sym_name(policydb, SYM_CLASSES, tclass-1));
1666 u32 stype, u32 ttype, u16 tclass,
1681 ft.tclass = tclass;
1710 u16 tclass;
1735 tclass = unmap_class(&policy->map, orig_tclass);
1738 tclass = orig_tclass;
1740 tclass));
1764 if (tclass && tclass <= policydb->p_classes.nprim)
1765 cladatum = policydb->class_val_to_struct[tclass - 1];
1791 if ((tclass == policydb->process_class) || sock)
1803 if ((tclass == policydb->process_class) || sock) {
1815 avkey.target_class = tclass;
1838 tcontext->type, tclass, objname);
1847 .tclass = tclass,
1857 rc = mls_compute_sid(policydb, scontext, tcontext, tclass, specified,
1865 tentry, tclass,
1888 * @tclass: target security class
1893 * class @tclass based on a SID pair (@ssid, @tsid).
1898 int security_transition_sid(u32 ssid, u32 tsid, u16 tclass,
1901 return security_compute_sid(ssid, tsid, tclass,
1906 int security_transition_sid_user(u32 ssid, u32 tsid, u16 tclass,
1909 return security_compute_sid(ssid, tsid, tclass,
1918 * @tclass: target security class
1922 * object of class @tclass based on a SID pair (@ssid, @tsid).
1929 u16 tclass,
1932 return security_compute_sid(ssid, tsid, tclass,
1941 * @tclass: target security class
1944 * Compute a SID to use for relabeling an object of class @tclass
1952 u16 tclass,
1955 return security_compute_sid(ssid, tsid, tclass, AVTAB_CHANGE, NULL,