/kernel/linux/linux-6.6/drivers/base/ |
H A D | transport_class.c | 40 * @tclass: a pointer to the transport class structure to be initialised 51 int transport_class_register(struct transport_class *tclass) in transport_class_register() argument 53 return class_register(&tclass->class); in transport_class_register() 60 * @tclass: The transport class to unregister 65 void transport_class_unregister(struct transport_class *tclass) in transport_class_unregister() argument 67 class_unregister(&tclass->class); in transport_class_unregister() 94 atc->container.class = &atc->tclass.class; in anon_transport_class_register() 99 atc->tclass.setup = anon_transport_dummy_function; in anon_transport_class_register() 100 atc->tclass.remove = anon_transport_dummy_function; in anon_transport_class_register() 124 struct transport_class *tclass in transport_setup_classdev() local 158 struct transport_class *tclass = class_to_transport_class(cont->class); transport_add_class_device() local 206 struct transport_class *tclass = class_to_transport_class(cont->class); transport_configure() local 239 struct transport_class *tclass = class_to_transport_class(cont->class); transport_remove_classdev() local 276 struct transport_class *tclass = class_to_transport_class(cont->class); transport_destroy_classdev() local [all...] |
/kernel/linux/linux-5.10/drivers/base/ |
H A D | transport_class.c | 40 * @tclass: a pointer to the transport class structure to be initialised 51 int transport_class_register(struct transport_class *tclass) in transport_class_register() argument 53 return class_register(&tclass->class); in transport_class_register() 60 * @tclass: The transport class to unregister 65 void transport_class_unregister(struct transport_class *tclass) in transport_class_unregister() argument 67 class_unregister(&tclass->class); in transport_class_unregister() 94 atc->container.class = &atc->tclass.class; in anon_transport_class_register() 99 atc->tclass.setup = anon_transport_dummy_function; in anon_transport_class_register() 100 atc->tclass.remove = anon_transport_dummy_function; in anon_transport_class_register() 124 struct transport_class *tclass in transport_setup_classdev() local 191 struct transport_class *tclass = class_to_transport_class(cont->class); transport_configure() local 224 struct transport_class *tclass = class_to_transport_class(cont->class); transport_remove_classdev() local 261 struct transport_class *tclass = class_to_transport_class(cont->class); transport_destroy_classdev() local [all...] |
/kernel/linux/linux-5.10/security/selinux/ |
H A D | avc.c | 50 u16 tclass; member 127 static inline int avc_hash(u32 ssid, u32 tsid, u16 tclass) in avc_hash() argument 129 return (ssid ^ (tsid<<2) ^ (tclass<<4)) & (AVC_CACHE_SLOTS - 1); in avc_hash() 418 u32 ssid, u32 tsid, u16 tclass, in avc_xperms_audit() 430 return slow_avc_audit(state, ssid, tsid, tclass, requested, in avc_xperms_audit() 519 static void avc_node_populate(struct avc_node *node, u32 ssid, u32 tsid, u16 tclass, struct av_decision *avd) in avc_node_populate() argument 523 node->ae.tclass = tclass; in avc_node_populate() 528 u32 ssid, u32 tsid, u16 tclass) in avc_search_node() 534 hvalue = avc_hash(ssid, tsid, tclass); in avc_search_node() 417 avc_xperms_audit(struct selinux_state *state, u32 ssid, u32 tsid, u16 tclass, u32 requested, struct av_decision *avd, struct extended_perms_decision *xpd, u8 perm, int result, struct common_audit_data *ad) avc_xperms_audit() argument 527 avc_search_node(struct selinux_avc *avc, u32 ssid, u32 tsid, u16 tclass) avc_search_node() argument 560 avc_lookup(struct selinux_avc *avc, u32 ssid, u32 tsid, u16 tclass) avc_lookup() argument 616 avc_insert(struct selinux_avc *avc, u32 ssid, u32 tsid, u16 tclass, struct av_decision *avd, struct avc_xperms_node *xp_node) avc_insert() argument 711 const char *tclass = NULL; avc_audit_post_callback() local 763 slow_avc_audit(struct selinux_state *state, u32 ssid, u32 tsid, u16 tclass, u32 requested, u32 audited, u32 denied, int result, struct common_audit_data *a) slow_avc_audit() argument 836 avc_update_node(struct selinux_avc *avc, u32 event, u32 perms, u8 driver, u8 xperm, u32 ssid, u32 tsid, u16 tclass, u32 seqno, struct extended_perms_decision *xpd, u32 flags) avc_update_node() argument 1003 avc_compute_av(struct selinux_state *state, u32 ssid, u32 tsid, u16 tclass, struct av_decision *avd, struct avc_xperms_node *xp_node) avc_compute_av() argument 1015 avc_denied(struct selinux_state *state, u32 ssid, u32 tsid, u16 tclass, u32 requested, u8 driver, u8 xperm, unsigned int flags, struct av_decision *avd) avc_denied() argument 1040 avc_has_extended_perms(struct selinux_state *state, u32 ssid, u32 tsid, u16 tclass, u32 requested, u8 driver, u8 xperm, struct common_audit_data *ad) avc_has_extended_perms() argument 1137 avc_has_perm_noaudit(struct selinux_state *state, u32 ssid, u32 tsid, u16 tclass, u32 requested, unsigned int flags, struct av_decision *avd) avc_has_perm_noaudit() argument 1184 avc_has_perm(struct selinux_state *state, u32 ssid, u32 tsid, u16 tclass, u32 requested, struct common_audit_data *auditdata) avc_has_perm() argument 1200 avc_has_perm_flags(struct selinux_state *state, u32 ssid, u32 tsid, u16 tclass, u32 requested, struct common_audit_data *auditdata, int flags) avc_has_perm_flags() argument [all...] |
/kernel/linux/linux-6.6/security/selinux/ |
H A D | avc.c | 50 u16 tclass; member 125 static inline u32 avc_hash(u32 ssid, u32 tsid, u16 tclass) in avc_hash() argument 127 return (ssid ^ (tsid<<2) ^ (tclass<<4)) & (AVC_CACHE_SLOTS - 1); in avc_hash() 415 static inline int avc_xperms_audit(u32 ssid, u32 tsid, u16 tclass, in avc_xperms_audit() argument 427 return slow_avc_audit(ssid, tsid, tclass, requested, in avc_xperms_audit() 515 static void avc_node_populate(struct avc_node *node, u32 ssid, u32 tsid, u16 tclass, struct av_decision *avd) in avc_node_populate() argument 519 node->ae.tclass = tclass; in avc_node_populate() 523 static inline struct avc_node *avc_search_node(u32 ssid, u32 tsid, u16 tclass) in avc_search_node() argument 529 hvalue = avc_hash(ssid, tsid, tclass); in avc_search_node() 555 avc_lookup(u32 ssid, u32 tsid, u16 tclass) avc_lookup() argument 608 avc_insert(u32 ssid, u32 tsid, u16 tclass, struct av_decision *avd, struct avc_xperms_node *xp_node) avc_insert() argument 700 const char *tclass = NULL; avc_audit_post_callback() local 756 slow_avc_audit(u32 ssid, u32 tsid, u16 tclass, u32 requested, u32 audited, u32 denied, int result, struct common_audit_data *a) slow_avc_audit() argument 831 avc_update_node(u32 event, u32 perms, u8 driver, u8 xperm, u32 ssid, u32 tsid, u16 tclass, u32 seqno, struct extended_perms_decision *xpd, u32 flags) avc_update_node() argument 985 avc_compute_av(u32 ssid, u32 tsid, u16 tclass, struct av_decision *avd, struct avc_xperms_node *xp_node) avc_compute_av() argument 994 avc_denied(u32 ssid, u32 tsid, u16 tclass, u32 requested, u8 driver, u8 xperm, unsigned int flags, struct av_decision *avd) avc_denied() argument 1018 avc_has_extended_perms(u32 ssid, u32 tsid, u16 tclass, u32 requested, u8 driver, u8 xperm, struct common_audit_data *ad) avc_has_extended_perms() argument 1107 avc_perm_nonode(u32 ssid, u32 tsid, u16 tclass, u32 requested, unsigned int flags, struct av_decision *avd) avc_perm_nonode() argument 1142 avc_has_perm_noaudit(u32 ssid, u32 tsid, u16 tclass, u32 requested, unsigned int flags, struct av_decision *avd) avc_has_perm_noaudit() argument 1186 avc_has_perm(u32 ssid, u32 tsid, u16 tclass, u32 requested, struct common_audit_data *auditdata) avc_has_perm() argument [all...] |
/kernel/linux/linux-5.10/include/trace/events/ |
H A D | avc.h | 19 const char *tclass 22 TP_ARGS(sad, scontext, tcontext, tclass), 31 __string(tclass, tclass) 41 __assign_str(tclass, tclass); 44 TP_printk("requested=0x%x denied=0x%x audited=0x%x result=%d scontext=%s tcontext=%s tclass=%s", 46 __get_str(scontext), __get_str(tcontext), __get_str(tclass)
|
/kernel/linux/linux-6.6/include/trace/events/ |
H A D | avc.h | 19 const char *tclass 22 TP_ARGS(sad, scontext, tcontext, tclass), 31 __string(tclass, tclass) 41 __assign_str(tclass, tclass); 44 TP_printk("requested=0x%x denied=0x%x audited=0x%x result=%d scontext=%s tcontext=%s tclass=%s", 46 __get_str(scontext), __get_str(tcontext), __get_str(tclass)
|
/kernel/linux/linux-5.10/security/selinux/include/ |
H A D | avc.h | 50 u16 tclass; member 101 u32 ssid, u32 tsid, u16 tclass, 109 * @tclass: target security class 127 u16 tclass, u32 requested, in avc_audit() 140 return slow_avc_audit(state, ssid, tsid, tclass, in avc_audit() 150 u16 tclass, u32 requested, 156 u16 tclass, u32 requested, 160 u16 tclass, u32 requested, 165 u32 ssid, u32 tsid, u16 tclass, u32 requested, 125 avc_audit(struct selinux_state *state, u32 ssid, u32 tsid, u16 tclass, u32 requested, struct av_decision *avd, int result, struct common_audit_data *a, int flags) avc_audit() argument
|
H A D | security.h | 287 u16 tclass, struct av_decision *avd, 291 u32 ssid, u32 tsid, u16 tclass, 297 u16 tclass, struct av_decision *avd); 300 u32 ssid, u32 tsid, u16 tclass, 304 u32 ssid, u32 tsid, u16 tclass, 308 u16 tclass, u32 *out_sid); 311 u16 tclass, u32 *out_sid); 359 u16 tclass); 363 u16 tclass);
|
/kernel/linux/linux-6.6/security/selinux/include/ |
H A D | avc.h | 50 u16 tclass; member 99 int slow_avc_audit(u32 ssid, u32 tsid, u16 tclass, 107 * @tclass: target security class 123 u16 tclass, u32 requested, in avc_audit() 132 return slow_avc_audit(ssid, tsid, tclass, in avc_audit() 140 u16 tclass, u32 requested, 145 u16 tclass, u32 requested, 148 int avc_has_extended_perms(u32 ssid, u32 tsid, u16 tclass, u32 requested, 122 avc_audit(u32 ssid, u32 tsid, u16 tclass, u32 requested, struct av_decision *avd, int result, struct common_audit_data *a) avc_audit() argument
|
H A D | security.h | 244 u16 tclass, struct av_decision *avd, 247 void security_compute_xperms_decision(u32 ssid, u32 tsid, u16 tclass, 252 u16 tclass, struct av_decision *avd); 254 int security_transition_sid(u32 ssid, u32 tsid, u16 tclass, 257 int security_transition_sid_user(u32 ssid, u32 tsid, u16 tclass, 260 int security_member_sid(u32 ssid, u32 tsid, u16 tclass, u32 *out_sid); 262 int security_change_sid(u32 ssid, u32 tsid, u16 tclass, u32 *out_sid); 295 u16 tclass); 298 u16 tclass);
|
/kernel/linux/linux-5.10/security/selinux/ss/ |
H A D | services.c | 95 u16 tclass, 180 static u16 unmap_class(struct selinux_map *map, u16 tclass) in unmap_class() argument 182 if (tclass < map->size) in unmap_class() 183 return map->mapping[tclass].value; in unmap_class() 185 return tclass; in unmap_class() 204 u16 tclass, struct av_decision *avd, in map_decision() 207 if (tclass < map->size) { in map_decision() 208 struct selinux_mapping *mapping = &map->mapping[tclass]; in map_decision() 462 u16 tclass, in security_dump_masked_av() 480 tclass_name = sym_name(policydb, SYM_CLASSES, tclass in security_dump_masked_av() 203 map_decision(struct selinux_map *map, u16 tclass, struct av_decision *avd, int allow_unknown) map_decision() argument 459 security_dump_masked_av(struct policydb *policydb, struct context *scontext, struct context *tcontext, u16 tclass, u32 permissions, const char *reason) security_dump_masked_av() argument 538 type_attribute_bounds_av(struct policydb *policydb, struct context *scontext, struct context *tcontext, u16 tclass, struct av_decision *avd) type_attribute_bounds_av() argument 619 context_struct_compute_av(struct policydb *policydb, struct context *scontext, struct context *tcontext, u16 tclass, struct av_decision *avd, struct extended_perms *xperms) context_struct_compute_av() argument 724 security_validtrans_handle_fail(struct selinux_state *state, struct selinux_policy *policy, struct sidtab_entry *oentry, struct sidtab_entry *nentry, struct sidtab_entry *tentry, u16 tclass) security_validtrans_handle_fail() argument 768 u16 tclass; security_compute_validatetrans() local 840 security_validate_transition_user(struct selinux_state *state, u32 oldsid, u32 newsid, u32 tasksid, u16 tclass) security_validate_transition_user() argument 1024 u16 tclass; security_compute_xperms_decision() local 1120 u16 tclass; security_compute_av() local 1169 security_compute_av_user(struct selinux_state *state, u32 ssid, u32 tsid, u16 tclass, struct av_decision *avd) security_compute_av_user() argument 1649 compute_sid_handle_invalid_context( struct selinux_state *state, struct selinux_policy *policy, struct sidtab_entry *sentry, struct sidtab_entry *tentry, u16 tclass, struct context *newcontext) compute_sid_handle_invalid_context() argument 1686 filename_compute_type(struct policydb *policydb, struct context *newcontext, u32 stype, u32 ttype, u16 tclass, const char *objname) filename_compute_type() argument 1734 u16 tclass; security_compute_sid() local 1921 security_transition_sid(struct selinux_state *state, u32 ssid, u32 tsid, u16 tclass, const struct qstr *qstr, u32 *out_sid) security_transition_sid() argument 1930 security_transition_sid_user(struct selinux_state *state, u32 ssid, u32 tsid, u16 tclass, const char *objname, u32 *out_sid) security_transition_sid_user() argument 1952 security_member_sid(struct selinux_state *state, u32 ssid, u32 tsid, u16 tclass, u32 *out_sid) security_member_sid() argument 1976 security_change_sid(struct selinux_state *state, u32 ssid, u32 tsid, u16 tclass, u32 *out_sid) security_change_sid() argument [all...] |
H A D | mls.c | 491 u16 tclass, in mls_compute_sid() 509 rtr.target_class = tclass; in mls_compute_sid() 514 if (tclass && tclass <= p->p_classes.nprim) { in mls_compute_sid() 515 cladatum = p->class_val_to_struct[tclass - 1]; in mls_compute_sid() 540 if ((tclass == p->process_class) || sock) in mls_compute_sid() 488 mls_compute_sid(struct policydb *p, struct context *scontext, struct context *tcontext, u16 tclass, u32 specified, struct context *newcontext, bool sock) mls_compute_sid() argument
|
/kernel/linux/linux-6.6/security/selinux/ss/ |
H A D | services.c | 91 u16 tclass, 176 static u16 unmap_class(struct selinux_map *map, u16 tclass) in unmap_class() argument 178 if (tclass < map->size) in unmap_class() 179 return map->mapping[tclass].value; in unmap_class() 181 return tclass; in unmap_class() 200 u16 tclass, struct av_decision *avd, in map_decision() 203 if (tclass < map->size) { in map_decision() 204 struct selinux_mapping *mapping = &map->mapping[tclass]; in map_decision() 458 u16 tclass, in security_dump_masked_av() 476 tclass_name = sym_name(policydb, SYM_CLASSES, tclass in security_dump_masked_av() 199 map_decision(struct selinux_map *map, u16 tclass, struct av_decision *avd, int allow_unknown) map_decision() argument 455 security_dump_masked_av(struct policydb *policydb, struct context *scontext, struct context *tcontext, u16 tclass, u32 permissions, const char *reason) security_dump_masked_av() argument 532 type_attribute_bounds_av(struct policydb *policydb, struct context *scontext, struct context *tcontext, u16 tclass, struct av_decision *avd) type_attribute_bounds_av() argument 611 context_struct_compute_av(struct policydb *policydb, struct context *scontext, struct context *tcontext, u16 tclass, struct av_decision *avd, struct extended_perms *xperms) context_struct_compute_av() argument 716 security_validtrans_handle_fail(struct selinux_policy *policy, struct sidtab_entry *oentry, struct sidtab_entry *nentry, struct sidtab_entry *tentry, u16 tclass) security_validtrans_handle_fail() argument 758 u16 tclass; security_compute_validatetrans() local 829 security_validate_transition_user(u32 oldsid, u32 newsid, u32 tasksid, u16 tclass) security_validate_transition_user() argument 1009 u16 tclass; security_compute_xperms_decision() local 1104 u16 tclass; security_compute_av() local 1153 security_compute_av_user(u32 ssid, u32 tsid, u16 tclass, struct av_decision *avd) security_compute_av_user() argument 1626 compute_sid_handle_invalid_context( struct selinux_policy *policy, struct sidtab_entry *sentry, struct sidtab_entry *tentry, u16 tclass, struct context *newcontext) compute_sid_handle_invalid_context() argument 1664 filename_compute_type(struct policydb *policydb, struct context *newcontext, u32 stype, u32 ttype, u16 tclass, const char *objname) filename_compute_type() argument 1710 u16 tclass; security_compute_sid() local 1898 security_transition_sid(u32 ssid, u32 tsid, u16 tclass, const struct qstr *qstr, u32 *out_sid) security_transition_sid() argument 1906 security_transition_sid_user(u32 ssid, u32 tsid, u16 tclass, const char *objname, u32 *out_sid) security_transition_sid_user() argument 1927 security_member_sid(u32 ssid, u32 tsid, u16 tclass, u32 *out_sid) security_member_sid() argument 1950 security_change_sid(u32 ssid, u32 tsid, u16 tclass, u32 *out_sid) security_change_sid() argument [all...] |
H A D | mls.c | 492 u16 tclass, in mls_compute_sid() 510 rtr.target_class = tclass; in mls_compute_sid() 515 if (tclass && tclass <= p->p_classes.nprim) { in mls_compute_sid() 516 cladatum = p->class_val_to_struct[tclass - 1]; in mls_compute_sid() 541 if ((tclass == p->process_class) || sock) in mls_compute_sid() 489 mls_compute_sid(struct policydb *p, struct context *scontext, struct context *tcontext, u16 tclass, u32 specified, struct context *newcontext, bool sock) mls_compute_sid() argument
|
/kernel/linux/common_modules/memory_security/src/ |
H A D | hideaddr.c | 40 static int hideaddr_avc_has_perm(u16 tclass, u32 requested, struct seq_file *m) in hideaddr_avc_has_perm() argument 49 return avc_has_perm_noaudit(&selinux_state, secid, secid, tclass, requested, in hideaddr_avc_has_perm() 52 return avc_has_perm_noaudit(secid, secid, tclass, requested, in hideaddr_avc_has_perm()
|
H A D | jit_memory.c | 18 static bool jit_avc_has_perm(u16 tclass, u32 requested, struct task_struct *task) in jit_avc_has_perm() argument 30 return (avc_has_perm_noaudit(&selinux_state, secid, secid, tclass, requested, in jit_avc_has_perm() 33 return (avc_has_perm_noaudit(secid, secid, tclass, requested, in jit_avc_has_perm()
|
/kernel/linux/linux-6.6/tools/testing/selftests/net/ |
H A D | cmsg_sender.c | 51 unsigned int tclass; member 69 struct option_cmsg_u32 tclass; member 164 opt.v6.tclass.ena = true; in cs_parse_args() 165 opt.v6.tclass.val = atoi(optarg); in cs_parse_args() 168 opt.sockopt.tclass = atoi(optarg); in cs_parse_args() 250 SOL_IPV6, IPV6_TCLASS, &opt.v6.tclass); in cs_write_cmsg() 405 if (opt.sockopt.tclass && in ca_set_sockopts() 407 &opt.sockopt.tclass, sizeof(opt.sockopt.tclass))) in ca_set_sockopts()
|
/kernel/linux/linux-6.6/drivers/net/ethernet/intel/iavf/ |
H A D | iavf_ethtool.c | 1131 fsp->h_u.tcp_ip6_spec.tclass = rule->ip_data.tclass; in iavf_get_ethtool_fdir_entry() 1138 fsp->m_u.tcp_ip6_spec.tclass = rule->ip_mask.tclass; in iavf_get_ethtool_fdir_entry() 1147 fsp->h_u.ah_ip6_spec.tclass = rule->ip_data.tclass; in iavf_get_ethtool_fdir_entry() 1153 fsp->m_u.ah_ip6_spec.tclass = rule->ip_mask.tclass; in iavf_get_ethtool_fdir_entry() 1161 fsp->h_u.usr_ip6_spec.tclass = rule->ip_data.tclass; in iavf_get_ethtool_fdir_entry() [all...] |
/kernel/linux/common_modules/code_sign/ |
H A D | code_sign_ioctl.c | 182 int code_sign_avc_has_perm(u16 tclass, u32 requested) in code_sign_avc_has_perm() argument 188 rc = avc_has_perm_noaudit(&selinux_state, sid, sid, tclass, requested, in code_sign_avc_has_perm() 190 rc2 = avc_audit(&selinux_state, sid, sid, tclass, requested, &avd, rc, in code_sign_avc_has_perm() 193 rc = avc_has_perm_noaudit(sid, sid, tclass, requested, in code_sign_avc_has_perm() 195 rc2 = avc_audit(sid, sid, tclass, requested, &avd, rc, in code_sign_avc_has_perm()
|
/kernel/linux/linux-5.10/net/ipv6/ |
H A D | fib6_rules.c | 28 u8 tclass; member 35 if (r->dst.plen || r->src.plen || r->tclass) in fib6_rule_matchall() 330 if (r->tclass && r->tclass != ip6_tclass(fl6->flowlabel)) in fib6_rule_match() 380 rule6->tclass = frh->tos; in fib6_rule_configure() 413 if (frh->tos && (rule6->tclass != frh->tos)) in fib6_rule_compare() 434 frh->tos = rule6->tclass; in fib6_rule_fill()
|
/kernel/linux/linux-5.10/drivers/infiniband/hw/mlx5/ |
H A D | ah.c | 67 ah->av.tclass = grh->traffic_class; in create_ib_ah() 85 ah->av.tclass |= MLX5_ECN_ENABLED; in create_ib_ah() 141 ah->av.tclass); in mlx5_ib_query_ah()
|
/kernel/linux/linux-6.6/drivers/infiniband/hw/mlx5/ |
H A D | ah.c | 67 ah->av.tclass = grh->traffic_class; in create_ib_ah() 85 ah->av.tclass |= MLX5_ECN_ENABLED; in create_ib_ah() 141 ah->av.tclass); in mlx5_ib_query_ah()
|
/kernel/linux/linux-5.10/include/linux/ |
H A D | transport_class.h | 39 struct transport_class tclass; member 45 .tclass = { \
|
/kernel/linux/linux-6.6/include/linux/ |
H A D | transport_class.h | 39 struct transport_class tclass; member 45 .tclass = { \
|
/kernel/linux/linux-5.10/include/net/ |
H A D | inet_ecn.h | 57 inet6_sk(sk)->tclass |= INET_ECN_ECT_0; in INET_ECN_xmit() 64 inet6_sk(sk)->tclass &= ~INET_ECN_MASK; in INET_ECN_dontxmit() 72 if (INET_ECN_is_capable(inet6_sk(sk)->tclass)) \
|