Home
last modified time | relevance | path

Searched refs:tclass (Results 1 - 25 of 49) sorted by relevance

12

/third_party/selinux/libselinux/src/
H A Davc.c22 security_class_t tclass; member
43 security_class_t tclass, access_vector_t perms,
48 security_class_t tclass; member
63 security_id_t tsid, security_class_t tclass) in avc_hash()
65 return ((uintptr_t) ssid ^ ((uintptr_t) tsid << 2) ^ tclass) in avc_hash()
346 security_class_t tclass) in avc_claim_node()
364 hvalue = avc_hash(ssid, tsid, tclass); in avc_claim_node()
369 new->ae.tclass = tclass; in avc_claim_node()
379 security_class_t tclass, in avc_search_node()
62 avc_hash(security_id_t ssid, security_id_t tsid, security_class_t tclass) avc_hash() argument
344 avc_claim_node(security_id_t ssid, security_id_t tsid, security_class_t tclass) avc_claim_node() argument
377 avc_search_node(security_id_t ssid, security_id_t tsid, security_class_t tclass, int *probes) avc_search_node() argument
425 avc_lookup(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t requested, struct avc_entry_ref *aeref) avc_lookup() argument
467 avc_insert(security_id_t ssid, security_id_t tsid, security_class_t tclass, struct avc_entry *ae, struct avc_entry_ref *aeref) avc_insert() argument
645 avc_dump_av(security_class_t tclass, access_vector_t av) avc_dump_av() argument
679 avc_dump_query(security_id_t ssid, security_id_t tsid, security_class_t tclass) avc_dump_query() argument
692 avc_audit(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t requested, struct av_decision *avd, int result, void *a) avc_audit() argument
744 avc_has_perm_noaudit(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t requested, struct avc_entry_ref *aeref, struct av_decision *avd) avc_has_perm_noaudit() argument
825 avc_has_perm(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t requested, struct avc_entry_ref *aeref, void *auditdata) avc_has_perm() argument
839 avc_compute_create(security_id_t ssid, security_id_t tsid, security_class_t tclass, security_id_t *newsid) avc_compute_create() argument
889 avc_compute_member(security_id_t ssid, security_id_t tsid, security_class_t tclass, security_id_t *newsid) avc_compute_member() argument
909 avc_add_callback(int (*callback) (uint32_t event, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, access_vector_t * out_retained), uint32_t events, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms) avc_add_callback() argument
970 avc_update_cache(uint32_t event, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms) avc_update_cache() argument
1008 avc_control(uint32_t event, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, access_vector_t * out_retained) avc_control() argument
1068 avc_ss_grant(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno) avc_ss_grant() argument
1089 avc_ss_try_revoke(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, access_vector_t * out_retained) avc_ss_try_revoke() argument
1109 avc_ss_revoke(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno) avc_ss_revoke() argument
1144 avc_ss_set_auditallow(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, uint32_t enable) avc_ss_set_auditallow() argument
1165 avc_ss_set_auditdeny(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, uint32_t enable) avc_ss_set_auditdeny() argument
[all...]
H A Dmapping.c125 unmap_class(security_class_t tclass) in unmap_class() argument
127 if (tclass < current_mapping_size) in unmap_class()
128 return current_mapping[tclass].value; in unmap_class()
136 return tclass; in unmap_class()
140 unmap_perm(security_class_t tclass, access_vector_t tperm) in unmap_perm() argument
142 if (tclass < current_mapping_size) { in unmap_perm()
146 for (i = 0; i < current_mapping[tclass].num_perms; i++) in unmap_perm()
148 kperm |= current_mapping[tclass].perms[i]; in unmap_perm()
186 map_perm(security_class_t tclass, access_vector_t kperm) in map_perm() argument
188 if (tclass < current_mapping_siz in map_perm()
209 map_decision(security_class_t tclass, struct av_decision *avd) map_decision() argument
[all...]
H A Dcompute_av.c15 security_class_t tclass, in security_compute_av_flags_raw()
42 kclass = unmap_class(tclass); in security_compute_av_flags_raw()
45 kclass, unmap_perm(tclass, requested)); in security_compute_av_flags_raw()
72 * If the tclass could not be mapped to a kernel class at all, the in security_compute_av_flags_raw()
79 map_decision(tclass, avd); in security_compute_av_flags_raw()
92 security_class_t tclass, in security_compute_av_raw()
99 ret = security_compute_av_flags_raw(scon, tcon, tclass, in security_compute_av_raw()
118 security_class_t tclass, in security_compute_av_flags()
132 ret = security_compute_av_flags_raw(rscon, rtcon, tclass, in security_compute_av_flags()
144 security_class_t tclass, in security_compute_av()
13 security_compute_av_flags_raw(const char * scon, const char * tcon, security_class_t tclass, access_vector_t requested, struct av_decision *avd) security_compute_av_flags_raw() argument
90 security_compute_av_raw(const char * scon, const char * tcon, security_class_t tclass, access_vector_t requested, struct av_decision *avd) security_compute_av_raw() argument
116 security_compute_av_flags(const char * scon, const char * tcon, security_class_t tclass, access_vector_t requested, struct av_decision *avd) security_compute_av_flags() argument
142 security_compute_av(const char * scon, const char * tcon, security_class_t tclass, access_vector_t requested, struct av_decision *avd) security_compute_av() argument
[all...]
H A Dstringrep.c234 access_vector_t string_to_av_perm(security_class_t tclass, const char *s) in string_to_av_perm() argument
237 security_class_t kclass = unmap_class(tclass); in string_to_av_perm()
244 return map_perm(tclass, UINT32_C(1)<<i); in string_to_av_perm()
251 const char *security_class_to_string(security_class_t tclass) in security_class_to_string() argument
255 tclass = unmap_class(tclass); in security_class_to_string()
257 node = get_class_cache_entry_value(tclass); in security_class_to_string()
264 const char *security_av_perm_to_string(security_class_t tclass, in security_av_perm_to_string() argument
270 av = unmap_perm(tclass, av); in security_av_perm_to_string()
271 tclass in security_av_perm_to_string()
282 security_av_string(security_class_t tclass, access_vector_t av, char **res) security_av_string() argument
328 print_access_vector(security_class_t tclass, access_vector_t av) print_access_vector() argument
[all...]
H A Dcompute_create.c53 security_class_t tclass, in security_compute_create_name_raw()
80 scon, tcon, unmap_class(tclass)); in security_compute_create_name_raw()
118 security_class_t tclass, in security_compute_create_raw()
121 return security_compute_create_name_raw(scon, tcon, tclass, in security_compute_create_raw()
127 security_class_t tclass, in security_compute_create_name()
143 ret = security_compute_create_name_raw(rscon, rtcon, tclass, in security_compute_create_name()
157 security_class_t tclass, in security_compute_create()
160 return security_compute_create_name(scon, tcon, tclass, NULL, newcon); in security_compute_create()
51 security_compute_create_name_raw(const char * scon, const char * tcon, security_class_t tclass, const char *objname, char ** newcon) security_compute_create_name_raw() argument
116 security_compute_create_raw(const char * scon, const char * tcon, security_class_t tclass, char ** newcon) security_compute_create_raw() argument
125 security_compute_create_name(const char * scon, const char * tcon, security_class_t tclass, const char *objname, char ** newcon) security_compute_create_name() argument
155 security_compute_create(const char * scon, const char * tcon, security_class_t tclass, char ** newcon) security_compute_create() argument
H A Dmapping.h16 unmap_class(security_class_t tclass);
19 unmap_perm(security_class_t tclass, access_vector_t tperm);
29 map_perm(security_class_t tclass, access_vector_t kperm);
32 map_decision(security_class_t tclass, struct av_decision *avd);
H A Davc_internal.h166 security_class_t tclass, access_vector_t perms,
169 security_class_t tclass,
173 security_class_t tclass, access_vector_t perms,
177 security_class_t tclass, access_vector_t perms,
180 security_class_t tclass, access_vector_t perms,
H A Dvalidatetrans.c15 security_class_t tclass, in security_validatetrans_raw()
41 bufsz = snprintf(buf, size, "%s %s %hu %s", scon, tcon, unmap_class(tclass), newcon); in security_validatetrans_raw()
63 security_class_t tclass, in security_validatetrans()
83 ret = security_validatetrans_raw(rscon, rtcon, tclass, rnewcon); in security_validatetrans()
13 security_validatetrans_raw(const char *scon, const char *tcon, security_class_t tclass, const char *newcon) security_validatetrans_raw() argument
61 security_validatetrans(const char *scon, const char *tcon, security_class_t tclass, const char *newcon) security_validatetrans() argument
H A Dcompute_member.c15 security_class_t tclass, in security_compute_member_raw()
40 ret = snprintf(buf, size, "%s %s %hu", scon, tcon, unmap_class(tclass)); in security_compute_member_raw()
72 security_class_t tclass, in security_compute_member()
87 ret = security_compute_member_raw(rscon, rtcon, tclass, &rnewcon); in security_compute_member()
13 security_compute_member_raw(const char * scon, const char * tcon, security_class_t tclass, char ** newcon) security_compute_member_raw() argument
70 security_compute_member(const char * scon, const char * tcon, security_class_t tclass, char ** newcon) security_compute_member() argument
H A Dcompute_relabel.c15 security_class_t tclass, in security_compute_relabel_raw()
40 ret = snprintf(buf, size, "%s %s %hu", scon, tcon, unmap_class(tclass)); in security_compute_relabel_raw()
72 security_class_t tclass, in security_compute_relabel()
87 ret = security_compute_relabel_raw(rscon, rtcon, tclass, &rnewcon); in security_compute_relabel()
13 security_compute_relabel_raw(const char * scon, const char * tcon, security_class_t tclass, char ** newcon) security_compute_relabel_raw() argument
70 security_compute_relabel(const char * scon, const char * tcon, security_class_t tclass, char ** newcon) security_compute_relabel() argument
/third_party/selinux/libselinux/include/selinux/
H A Dselinux.h197 security_class_t tclass,
202 security_class_t tclass,
208 security_class_t tclass,
213 security_class_t tclass,
221 security_class_t tclass,
225 security_class_t tclass,
229 security_class_t tclass,
234 security_class_t tclass,
242 security_class_t tclass,
246 security_class_t tclass,
[all...]
H A Davc.h255 * @tclass: target security class
256 * @requested: requested permissions, interpreted based on @tclass
262 * based on @tclass, and call the security server on a cache miss to obtain
274 security_class_t tclass,
282 * @tclass: target security class
283 * @requested: requested permissions, interpreted based on @tclass
289 * based on @tclass, and call the security server on a cache miss to obtain
297 security_class_t tclass, access_vector_t requested,
304 * @tclass: target security class
320 security_class_t tclass, access_vector_
[all...]
/third_party/selinux/libselinux/utils/
H A Dcompute_av.c12 security_class_t tclass; in main() local
16 fprintf(stderr, "usage: %s scontext tcontext tclass\n", in main()
31 tclass = string_to_security_class(argv[3]); in main()
32 if (!tclass) { in main()
37 ret = security_compute_av(argv[1], argv[2], tclass, 1, &avd); in main()
44 print_access_vector(tclass, avd.allowed); in main()
49 print_access_vector(tclass, avd.decided); in main()
55 print_access_vector(tclass, avd.auditallow); in main()
61 print_access_vector(tclass, avd.auditdeny); in main()
H A Dcompute_relabel.c12 security_class_t tclass; in main() local
16 fprintf(stderr, "usage: %s scontext tcontext tclass\n", in main()
31 tclass = string_to_security_class(argv[3]); in main()
32 if (!tclass) { in main()
37 ret = security_compute_relabel(argv[1], argv[2], tclass, &buf); in main()
H A Dcompute_create.c12 security_class_t tclass; in main() local
17 fprintf(stderr, "usage: %s scontext tcontext tclass [objname]\n", in main()
32 tclass = string_to_security_class(argv[3]); in main()
33 if (!tclass) { in main()
40 ret = security_compute_create_name(argv[1], argv[2], tclass, objname, &buf); in main()
H A Dcompute_member.c12 security_class_t tclass; in main() local
16 fprintf(stderr, "usage: %s scontext tcontext tclass\n", in main()
31 tclass = string_to_security_class(argv[3]); in main()
32 if (!tclass) { in main()
37 ret = security_compute_member(argv[1], argv[2], tclass, &buf); in main()
H A Dvalidatetrans.c11 security_class_t tclass; in main() local
15 fprintf(stderr, "usage: %s scontext tcontext tclass newcontext\n", in main()
30 tclass = string_to_security_class(argv[3]); in main()
31 if (!tclass) { in main()
41 ret = security_validatetrans(argv[1], argv[2], tclass, argv[4]); in main()
/third_party/selinux/libsepol/include/sepol/policydb/
H A Dservices.h43 sepol_security_class_t tclass, /* IN */
55 sepol_security_class_t tclass,
71 sepol_security_class_t tclass,
87 sepol_security_class_t tclass,
96 sepol_security_class_t *tclass);
99 * Return a permission av bit associated with tclass and the string
102 extern int sepol_string_to_av_perm(sepol_security_class_t tclass,
108 * tclass.
112 extern const char *sepol_av_perm_to_string(sepol_security_class_t tclass,
117 * class `tclass' base
[all...]
/third_party/selinux/libsepol/utils/
H A Dsepol_compute_av.c14 sepol_security_class_t tclass; in main() local
19 printf("usage: %s policy scontext tcontext tclass\n", argv[0]); in main()
45 if (sepol_string_to_security_class(argv[4], &tclass) < 0) { in main()
50 rc = sepol_compute_av(ssid, tsid, tclass, 0, &avd); in main()
53 printf("allowed: %s\n", sepol_av_perm_to_string(tclass, avd.allowed)); in main()
54 printf("decided: %s\n", sepol_av_perm_to_string(tclass, avd.decided)); in main()
55 printf("auditallow: %s\n", sepol_av_perm_to_string(tclass, avd.auditallow)); in main()
56 printf("auditdeny: %s\n", sepol_av_perm_to_string(tclass, avd.auditdeny)); in main()
H A Dsepol_check_access.c14 sepol_security_class_t tclass; in main() local
49 if (sepol_string_to_security_class(argv[4], &tclass) < 0) { in main()
70 if (sepol_string_to_av_perm(tclass, perm, &av) < 0) { in main()
86 if (sepol_compute_av_reason_buffer(ssid, tsid, tclass, av, &avd, &reason, &reason_buf, 0) < 0) { in main()
H A Dsepol_validate_transition.c14 sepol_security_class_t tclass; in main() local
19 printf("usage: %s policy oldcontext newcontext tclass taskcontext\n", argv[0]); in main()
45 if (sepol_string_to_security_class(argv[4], &tclass) < 0) { in main()
55 ret = sepol_validate_transition_reason_buffer(oldsid, newsid, tasksid, tclass, &reason, SHOW_GRANTED); in main()
H A Dsepol_compute_relabel.c14 sepol_security_class_t tclass; in main() local
19 printf("usage: %s policy scontext tcontext tclass\n", argv[0]); in main()
45 if (sepol_string_to_security_class(argv[4], &tclass) < 0) { in main()
50 if (sepol_change_sid(ssid, tsid, tclass, &out_sid) < 0) { in main()
H A Dsepol_compute_member.c14 sepol_security_class_t tclass; in main() local
19 printf("usage: %s policy scontext tcontext tclass\n", argv[0]); in main()
45 if (sepol_string_to_security_class(argv[4], &tclass) < 0) { in main()
50 if (sepol_member_sid(ssid, tsid, tclass, &out_sid) < 0) { in main()
/third_party/selinux/checkpolicy/
H A Dcheckpolicy.c385 sepol_security_class_t tclass; in main() local
765 tclass = atoi(ans); in main()
766 if (!tclass in main()
767 || tclass > policydb.p_classes.nprim) { in main()
772 policydb.class_val_to_struct[tclass - 1]; in main()
784 tclass = cladatum->s.value; in main()
792 ret = sepol_compute_av(ssid, tsid, tclass, 0, &avd); in main()
881 tclass = atoi(ans); in main()
882 if (!tclass in main()
883 || tclass > policyd in main()
[all...]
/third_party/selinux/libsepol/src/
H A Dservices.c287 static char *get_class_info(sepol_security_class_t tclass, in get_class_info() argument
342 policydb->p_class_val_to_name[tclass - 1]); in get_class_info()
351 sepol_av_to_string(policydb, tclass, in get_class_info()
382 * 'tclass' should be '0' and r_buf MUST be NULL.
387 sepol_security_class_t tclass, in constraint_expr_eval_reason()
432 class_buf = get_class_info(tclass, constraint, xcontext); in constraint_expr_eval_reason()
842 sepol_security_class_t tclass,
851 sepol_security_class_t tclass, in type_attribute_bounds_av()
882 tclass, in type_attribute_bounds_av()
907 sepol_security_class_t tclass, in context_struct_compute_av()
384 constraint_expr_eval_reason(context_struct_t *scontext, context_struct_t *tcontext, context_struct_t *xcontext, sepol_security_class_t tclass, constraint_node_t *constraint, char **r_buf, unsigned int flags) constraint_expr_eval_reason() argument
849 type_attribute_bounds_av(context_struct_t *scontext, context_struct_t *tcontext, sepol_security_class_t tclass, sepol_access_vector_t requested, struct sepol_av_decision *avd, unsigned int *reason) type_attribute_bounds_av() argument
905 context_struct_compute_av(context_struct_t * scontext, context_struct_t * tcontext, sepol_security_class_t tclass, sepol_access_vector_t requested, struct sepol_av_decision *avd, unsigned int *reason, char **r_buf, unsigned int flags) context_struct_compute_av() argument
1031 sepol_validate_transition_reason_buffer(sepol_security_id_t oldsid, sepol_security_id_t newsid, sepol_security_id_t tasksid, sepol_security_class_t tclass, char **reason_buf, unsigned int flags) sepol_validate_transition_reason_buffer() argument
1089 sepol_compute_av_reason(sepol_security_id_t ssid, sepol_security_id_t tsid, sepol_security_class_t tclass, sepol_access_vector_t requested, struct sepol_av_decision *avd, unsigned int *reason) sepol_compute_av_reason() argument
1123 sepol_compute_av_reason_buffer(sepol_security_id_t ssid, sepol_security_id_t tsid, sepol_security_class_t tclass, sepol_access_vector_t requested, struct sepol_av_decision *avd, unsigned int *reason, char **reason_buf, unsigned int flags) sepol_compute_av_reason_buffer() argument
1165 sepol_compute_av(sepol_security_id_t ssid, sepol_security_id_t tsid, sepol_security_class_t tclass, sepol_access_vector_t requested, struct sepol_av_decision *avd) sepol_compute_av() argument
1180 sepol_string_to_security_class(const char *class_name, sepol_security_class_t *tclass) sepol_string_to_security_class() argument
1199 sepol_string_to_av_perm(sepol_security_class_t tclass, const char *perm_name, sepol_access_vector_t *av) sepol_string_to_av_perm() argument
1237 sepol_av_perm_to_string(sepol_security_class_t tclass, sepol_access_vector_t av) sepol_av_perm_to_string() argument
1301 compute_sid_handle_invalid_context(context_struct_t * scontext, context_struct_t * tcontext, sepol_security_class_t tclass, context_struct_t * newcontext) compute_sid_handle_invalid_context() argument
1329 sepol_compute_sid(sepol_security_id_t ssid, sepol_security_id_t tsid, sepol_security_class_t tclass, uint32_t specified, sepol_security_id_t * out_sid) sepol_compute_sid() argument
1470 sepol_transition_sid(sepol_security_id_t ssid, sepol_security_id_t tsid, sepol_security_class_t tclass, sepol_security_id_t * out_sid) sepol_transition_sid() argument
1483 sepol_member_sid(sepol_security_id_t ssid, sepol_security_id_t tsid, sepol_security_class_t tclass, sepol_security_id_t * out_sid) sepol_member_sid() argument
1495 sepol_change_sid(sepol_security_id_t ssid, sepol_security_id_t tsid, sepol_security_class_t tclass, sepol_security_id_t * out_sid) sepol_change_sid() argument
[all...]

Completed in 10 milliseconds

12