/kernel/linux/linux-5.10/include/trace/events/ |
H A D | avc.h | 18 char *tcontext, 22 TP_ARGS(sad, scontext, tcontext, tclass), 30 __string(tcontext, tcontext) 39 __assign_str(tcontext, tcontext); 44 TP_printk("requested=0x%x denied=0x%x audited=0x%x result=%d scontext=%s tcontext=%s tclass=%s", 46 __get_str(scontext), __get_str(tcontext), __get_str(tclass)
|
/kernel/linux/linux-6.6/include/trace/events/ |
H A D | avc.h | 18 char *tcontext, 22 TP_ARGS(sad, scontext, tcontext, tclass), 30 __string(tcontext, tcontext) 39 __assign_str(tcontext, tcontext); 44 TP_printk("requested=0x%x denied=0x%x audited=0x%x result=%d scontext=%s tcontext=%s tclass=%s", 46 __get_str(scontext), __get_str(tcontext), __get_str(tclass)
|
/kernel/linux/linux-5.10/security/selinux/ss/ |
H A D | services.c | 94 struct context *tcontext, 264 * tcontext is the context after the transition, and xcontext is the context 270 struct context *tcontext, in constraint_expr_eval() 304 val2 = tcontext->user; in constraint_expr_eval() 308 val2 = tcontext->type; in constraint_expr_eval() 312 val2 = tcontext->role; in constraint_expr_eval() 336 l2 = &(tcontext->range.level[0]); in constraint_expr_eval() 340 l2 = &(tcontext->range.level[1]); in constraint_expr_eval() 344 l2 = &(tcontext->range.level[0]); in constraint_expr_eval() 348 l2 = &(tcontext in constraint_expr_eval() 268 constraint_expr_eval(struct policydb *policydb, struct context *scontext, struct context *tcontext, struct context *xcontext, struct constraint_expr *cexpr) constraint_expr_eval() argument 459 security_dump_masked_av(struct policydb *policydb, struct context *scontext, struct context *tcontext, u16 tclass, u32 permissions, const char *reason) security_dump_masked_av() argument 538 type_attribute_bounds_av(struct policydb *policydb, struct context *scontext, struct context *tcontext, u16 tclass, struct av_decision *avd) type_attribute_bounds_av() argument 619 context_struct_compute_av(struct policydb *policydb, struct context *scontext, struct context *tcontext, u16 tclass, struct av_decision *avd, struct extended_perms *xperms) context_struct_compute_av() argument 1025 struct context *scontext, *tcontext; security_compute_xperms_decision() local 1121 struct context *scontext = NULL, *tcontext = NULL; security_compute_av() local 1178 struct context *scontext = NULL, *tcontext = NULL; security_compute_av_user() local 1729 struct context *scontext, *tcontext, newcontext; security_compute_sid() local [all...] |
H A D | mls.c | 490 struct context *tcontext, in mls_compute_sid() 508 rtr.target_type = tcontext->type; in mls_compute_sid() 528 return mls_context_cpy_low(newcontext, tcontext); in mls_compute_sid() 530 return mls_context_cpy_high(newcontext, tcontext); in mls_compute_sid() 532 return mls_context_cpy(newcontext, tcontext); in mls_compute_sid() 535 scontext, tcontext); in mls_compute_sid() 488 mls_compute_sid(struct policydb *p, struct context *scontext, struct context *tcontext, u16 tclass, u32 specified, struct context *newcontext, bool sock) mls_compute_sid() argument
|
H A D | mls.h | 57 struct context *tcontext,
|
/kernel/linux/linux-6.6/security/selinux/ss/ |
H A D | services.c | 90 struct context *tcontext, 260 * tcontext is the context after the transition, and xcontext is the context 266 struct context *tcontext, in constraint_expr_eval() 300 val2 = tcontext->user; in constraint_expr_eval() 304 val2 = tcontext->type; in constraint_expr_eval() 308 val2 = tcontext->role; in constraint_expr_eval() 332 l2 = &(tcontext->range.level[0]); in constraint_expr_eval() 336 l2 = &(tcontext->range.level[1]); in constraint_expr_eval() 340 l2 = &(tcontext->range.level[0]); in constraint_expr_eval() 344 l2 = &(tcontext in constraint_expr_eval() 264 constraint_expr_eval(struct policydb *policydb, struct context *scontext, struct context *tcontext, struct context *xcontext, struct constraint_expr *cexpr) constraint_expr_eval() argument 455 security_dump_masked_av(struct policydb *policydb, struct context *scontext, struct context *tcontext, u16 tclass, u32 permissions, const char *reason) security_dump_masked_av() argument 532 type_attribute_bounds_av(struct policydb *policydb, struct context *scontext, struct context *tcontext, u16 tclass, struct av_decision *avd) type_attribute_bounds_av() argument 611 context_struct_compute_av(struct policydb *policydb, struct context *scontext, struct context *tcontext, u16 tclass, struct av_decision *avd, struct extended_perms *xperms) context_struct_compute_av() argument 1010 struct context *scontext, *tcontext; security_compute_xperms_decision() local 1105 struct context *scontext = NULL, *tcontext = NULL; security_compute_av() local 1161 struct context *scontext = NULL, *tcontext = NULL; security_compute_av_user() local 1706 struct context *scontext, *tcontext, newcontext; security_compute_sid() local [all...] |
H A D | mls.c | 491 struct context *tcontext, in mls_compute_sid() 509 rtr.target_type = tcontext->type; in mls_compute_sid() 529 return mls_context_cpy_low(newcontext, tcontext); in mls_compute_sid() 531 return mls_context_cpy_high(newcontext, tcontext); in mls_compute_sid() 533 return mls_context_cpy(newcontext, tcontext); in mls_compute_sid() 536 scontext, tcontext); in mls_compute_sid() 489 mls_compute_sid(struct policydb *p, struct context *scontext, struct context *tcontext, u16 tclass, u32 specified, struct context *newcontext, bool sock) mls_compute_sid() argument
|
H A D | mls.h | 57 struct context *tcontext,
|
/kernel/linux/linux-5.10/security/selinux/ |
H A D | avc.c | 710 char *tcontext = NULL; in avc_audit_post_callback() local 723 rc = security_sid_to_context(sad->state, sad->tsid, &tcontext, in avc_audit_post_callback() 728 audit_log_format(ab, " tcontext=%s", tcontext); in avc_audit_post_callback() 736 trace_selinux_audited(sad, scontext, tcontext, tclass); in avc_audit_post_callback() 737 kfree(tcontext); in avc_audit_post_callback()
|
/kernel/linux/linux-6.6/security/selinux/ |
H A D | avc.c | 699 char *tcontext = NULL; in avc_audit_post_callback() local 712 rc = security_sid_to_context(sad->tsid, &tcontext, in avc_audit_post_callback() 717 audit_log_format(ab, " tcontext=%s", tcontext); in avc_audit_post_callback() 725 trace_selinux_audited(sad, scontext, tcontext, tclass); in avc_audit_post_callback() 726 kfree(tcontext); in avc_audit_post_callback()
|