/third_party/selinux/libselinux/src/ |
H A D | avc.c | 22 security_class_t tclass; member 43 security_class_t tclass, access_vector_t perms, 48 security_class_t tclass; member 63 security_id_t tsid, security_class_t tclass) in avc_hash() 65 return ((uintptr_t) ssid ^ ((uintptr_t) tsid << 2) ^ tclass) in avc_hash() 346 security_class_t tclass) in avc_claim_node() 364 hvalue = avc_hash(ssid, tsid, tclass); in avc_claim_node() 369 new->ae.tclass = tclass; in avc_claim_node() 379 security_class_t tclass, in avc_search_node() 62 avc_hash(security_id_t ssid, security_id_t tsid, security_class_t tclass) avc_hash() argument 344 avc_claim_node(security_id_t ssid, security_id_t tsid, security_class_t tclass) avc_claim_node() argument 377 avc_search_node(security_id_t ssid, security_id_t tsid, security_class_t tclass, int *probes) avc_search_node() argument 425 avc_lookup(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t requested, struct avc_entry_ref *aeref) avc_lookup() argument 467 avc_insert(security_id_t ssid, security_id_t tsid, security_class_t tclass, struct avc_entry *ae, struct avc_entry_ref *aeref) avc_insert() argument 645 avc_dump_av(security_class_t tclass, access_vector_t av) avc_dump_av() argument 679 avc_dump_query(security_id_t ssid, security_id_t tsid, security_class_t tclass) avc_dump_query() argument 692 avc_audit(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t requested, struct av_decision *avd, int result, void *a) avc_audit() argument 744 avc_has_perm_noaudit(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t requested, struct avc_entry_ref *aeref, struct av_decision *avd) avc_has_perm_noaudit() argument 825 avc_has_perm(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t requested, struct avc_entry_ref *aeref, void *auditdata) avc_has_perm() argument 839 avc_compute_create(security_id_t ssid, security_id_t tsid, security_class_t tclass, security_id_t *newsid) avc_compute_create() argument 889 avc_compute_member(security_id_t ssid, security_id_t tsid, security_class_t tclass, security_id_t *newsid) avc_compute_member() argument 909 avc_add_callback(int (*callback) (uint32_t event, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, access_vector_t * out_retained), uint32_t events, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms) avc_add_callback() argument 970 avc_update_cache(uint32_t event, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms) avc_update_cache() argument 1008 avc_control(uint32_t event, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, access_vector_t * out_retained) avc_control() argument 1068 avc_ss_grant(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno) avc_ss_grant() argument 1089 avc_ss_try_revoke(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, access_vector_t * out_retained) avc_ss_try_revoke() argument 1109 avc_ss_revoke(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno) avc_ss_revoke() argument 1144 avc_ss_set_auditallow(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, uint32_t enable) avc_ss_set_auditallow() argument 1165 avc_ss_set_auditdeny(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, uint32_t enable) avc_ss_set_auditdeny() argument [all...] |
H A D | mapping.c | 125 unmap_class(security_class_t tclass) in unmap_class() argument 127 if (tclass < current_mapping_size) in unmap_class() 128 return current_mapping[tclass].value; in unmap_class() 136 return tclass; in unmap_class() 140 unmap_perm(security_class_t tclass, access_vector_t tperm) in unmap_perm() argument 142 if (tclass < current_mapping_size) { in unmap_perm() 146 for (i = 0; i < current_mapping[tclass].num_perms; i++) in unmap_perm() 148 kperm |= current_mapping[tclass].perms[i]; in unmap_perm() 186 map_perm(security_class_t tclass, access_vector_t kperm) in map_perm() argument 188 if (tclass < current_mapping_siz in map_perm() 209 map_decision(security_class_t tclass, struct av_decision *avd) map_decision() argument [all...] |
H A D | compute_av.c | 15 security_class_t tclass, in security_compute_av_flags_raw() 42 kclass = unmap_class(tclass); in security_compute_av_flags_raw() 45 kclass, unmap_perm(tclass, requested)); in security_compute_av_flags_raw() 72 * If the tclass could not be mapped to a kernel class at all, the in security_compute_av_flags_raw() 79 map_decision(tclass, avd); in security_compute_av_flags_raw() 92 security_class_t tclass, in security_compute_av_raw() 99 ret = security_compute_av_flags_raw(scon, tcon, tclass, in security_compute_av_raw() 118 security_class_t tclass, in security_compute_av_flags() 132 ret = security_compute_av_flags_raw(rscon, rtcon, tclass, in security_compute_av_flags() 144 security_class_t tclass, in security_compute_av() 13 security_compute_av_flags_raw(const char * scon, const char * tcon, security_class_t tclass, access_vector_t requested, struct av_decision *avd) security_compute_av_flags_raw() argument 90 security_compute_av_raw(const char * scon, const char * tcon, security_class_t tclass, access_vector_t requested, struct av_decision *avd) security_compute_av_raw() argument 116 security_compute_av_flags(const char * scon, const char * tcon, security_class_t tclass, access_vector_t requested, struct av_decision *avd) security_compute_av_flags() argument 142 security_compute_av(const char * scon, const char * tcon, security_class_t tclass, access_vector_t requested, struct av_decision *avd) security_compute_av() argument [all...] |
H A D | stringrep.c | 234 access_vector_t string_to_av_perm(security_class_t tclass, const char *s) in string_to_av_perm() argument 237 security_class_t kclass = unmap_class(tclass); in string_to_av_perm() 244 return map_perm(tclass, UINT32_C(1)<<i); in string_to_av_perm() 251 const char *security_class_to_string(security_class_t tclass) in security_class_to_string() argument 255 tclass = unmap_class(tclass); in security_class_to_string() 257 node = get_class_cache_entry_value(tclass); in security_class_to_string() 264 const char *security_av_perm_to_string(security_class_t tclass, in security_av_perm_to_string() argument 270 av = unmap_perm(tclass, av); in security_av_perm_to_string() 271 tclass in security_av_perm_to_string() 282 security_av_string(security_class_t tclass, access_vector_t av, char **res) security_av_string() argument 328 print_access_vector(security_class_t tclass, access_vector_t av) print_access_vector() argument [all...] |
H A D | compute_create.c | 53 security_class_t tclass, in security_compute_create_name_raw() 80 scon, tcon, unmap_class(tclass)); in security_compute_create_name_raw() 118 security_class_t tclass, in security_compute_create_raw() 121 return security_compute_create_name_raw(scon, tcon, tclass, in security_compute_create_raw() 127 security_class_t tclass, in security_compute_create_name() 143 ret = security_compute_create_name_raw(rscon, rtcon, tclass, in security_compute_create_name() 157 security_class_t tclass, in security_compute_create() 160 return security_compute_create_name(scon, tcon, tclass, NULL, newcon); in security_compute_create() 51 security_compute_create_name_raw(const char * scon, const char * tcon, security_class_t tclass, const char *objname, char ** newcon) security_compute_create_name_raw() argument 116 security_compute_create_raw(const char * scon, const char * tcon, security_class_t tclass, char ** newcon) security_compute_create_raw() argument 125 security_compute_create_name(const char * scon, const char * tcon, security_class_t tclass, const char *objname, char ** newcon) security_compute_create_name() argument 155 security_compute_create(const char * scon, const char * tcon, security_class_t tclass, char ** newcon) security_compute_create() argument
|
H A D | mapping.h | 16 unmap_class(security_class_t tclass); 19 unmap_perm(security_class_t tclass, access_vector_t tperm); 29 map_perm(security_class_t tclass, access_vector_t kperm); 32 map_decision(security_class_t tclass, struct av_decision *avd);
|
H A D | avc_internal.h | 166 security_class_t tclass, access_vector_t perms, 169 security_class_t tclass, 173 security_class_t tclass, access_vector_t perms, 177 security_class_t tclass, access_vector_t perms, 180 security_class_t tclass, access_vector_t perms,
|
H A D | validatetrans.c | 15 security_class_t tclass, in security_validatetrans_raw() 41 bufsz = snprintf(buf, size, "%s %s %hu %s", scon, tcon, unmap_class(tclass), newcon); in security_validatetrans_raw() 63 security_class_t tclass, in security_validatetrans() 83 ret = security_validatetrans_raw(rscon, rtcon, tclass, rnewcon); in security_validatetrans() 13 security_validatetrans_raw(const char *scon, const char *tcon, security_class_t tclass, const char *newcon) security_validatetrans_raw() argument 61 security_validatetrans(const char *scon, const char *tcon, security_class_t tclass, const char *newcon) security_validatetrans() argument
|
H A D | compute_member.c | 15 security_class_t tclass, in security_compute_member_raw() 40 ret = snprintf(buf, size, "%s %s %hu", scon, tcon, unmap_class(tclass)); in security_compute_member_raw() 72 security_class_t tclass, in security_compute_member() 87 ret = security_compute_member_raw(rscon, rtcon, tclass, &rnewcon); in security_compute_member() 13 security_compute_member_raw(const char * scon, const char * tcon, security_class_t tclass, char ** newcon) security_compute_member_raw() argument 70 security_compute_member(const char * scon, const char * tcon, security_class_t tclass, char ** newcon) security_compute_member() argument
|
H A D | compute_relabel.c | 15 security_class_t tclass, in security_compute_relabel_raw() 40 ret = snprintf(buf, size, "%s %s %hu", scon, tcon, unmap_class(tclass)); in security_compute_relabel_raw() 72 security_class_t tclass, in security_compute_relabel() 87 ret = security_compute_relabel_raw(rscon, rtcon, tclass, &rnewcon); in security_compute_relabel() 13 security_compute_relabel_raw(const char * scon, const char * tcon, security_class_t tclass, char ** newcon) security_compute_relabel_raw() argument 70 security_compute_relabel(const char * scon, const char * tcon, security_class_t tclass, char ** newcon) security_compute_relabel() argument
|
/third_party/selinux/libselinux/include/selinux/ |
H A D | selinux.h | 197 security_class_t tclass, 202 security_class_t tclass, 208 security_class_t tclass, 213 security_class_t tclass, 221 security_class_t tclass, 225 security_class_t tclass, 229 security_class_t tclass, 234 security_class_t tclass, 242 security_class_t tclass, 246 security_class_t tclass, [all...] |
H A D | avc.h | 255 * @tclass: target security class 256 * @requested: requested permissions, interpreted based on @tclass 262 * based on @tclass, and call the security server on a cache miss to obtain 274 security_class_t tclass, 282 * @tclass: target security class 283 * @requested: requested permissions, interpreted based on @tclass 289 * based on @tclass, and call the security server on a cache miss to obtain 297 security_class_t tclass, access_vector_t requested, 304 * @tclass: target security class 320 security_class_t tclass, access_vector_ [all...] |
/third_party/selinux/libselinux/utils/ |
H A D | compute_av.c | 12 security_class_t tclass; in main() local 16 fprintf(stderr, "usage: %s scontext tcontext tclass\n", in main() 31 tclass = string_to_security_class(argv[3]); in main() 32 if (!tclass) { in main() 37 ret = security_compute_av(argv[1], argv[2], tclass, 1, &avd); in main() 44 print_access_vector(tclass, avd.allowed); in main() 49 print_access_vector(tclass, avd.decided); in main() 55 print_access_vector(tclass, avd.auditallow); in main() 61 print_access_vector(tclass, avd.auditdeny); in main()
|
H A D | compute_relabel.c | 12 security_class_t tclass; in main() local 16 fprintf(stderr, "usage: %s scontext tcontext tclass\n", in main() 31 tclass = string_to_security_class(argv[3]); in main() 32 if (!tclass) { in main() 37 ret = security_compute_relabel(argv[1], argv[2], tclass, &buf); in main()
|
H A D | compute_create.c | 12 security_class_t tclass; in main() local 17 fprintf(stderr, "usage: %s scontext tcontext tclass [objname]\n", in main() 32 tclass = string_to_security_class(argv[3]); in main() 33 if (!tclass) { in main() 40 ret = security_compute_create_name(argv[1], argv[2], tclass, objname, &buf); in main()
|
H A D | compute_member.c | 12 security_class_t tclass; in main() local 16 fprintf(stderr, "usage: %s scontext tcontext tclass\n", in main() 31 tclass = string_to_security_class(argv[3]); in main() 32 if (!tclass) { in main() 37 ret = security_compute_member(argv[1], argv[2], tclass, &buf); in main()
|
H A D | validatetrans.c | 11 security_class_t tclass; in main() local 15 fprintf(stderr, "usage: %s scontext tcontext tclass newcontext\n", in main() 30 tclass = string_to_security_class(argv[3]); in main() 31 if (!tclass) { in main() 41 ret = security_validatetrans(argv[1], argv[2], tclass, argv[4]); in main()
|
/third_party/selinux/libsepol/include/sepol/policydb/ |
H A D | services.h | 43 sepol_security_class_t tclass, /* IN */ 55 sepol_security_class_t tclass, 71 sepol_security_class_t tclass, 87 sepol_security_class_t tclass, 96 sepol_security_class_t *tclass); 99 * Return a permission av bit associated with tclass and the string 102 extern int sepol_string_to_av_perm(sepol_security_class_t tclass, 108 * tclass. 112 extern const char *sepol_av_perm_to_string(sepol_security_class_t tclass, 117 * class `tclass' base [all...] |
/third_party/selinux/libsepol/utils/ |
H A D | sepol_compute_av.c | 14 sepol_security_class_t tclass; in main() local 19 printf("usage: %s policy scontext tcontext tclass\n", argv[0]); in main() 45 if (sepol_string_to_security_class(argv[4], &tclass) < 0) { in main() 50 rc = sepol_compute_av(ssid, tsid, tclass, 0, &avd); in main() 53 printf("allowed: %s\n", sepol_av_perm_to_string(tclass, avd.allowed)); in main() 54 printf("decided: %s\n", sepol_av_perm_to_string(tclass, avd.decided)); in main() 55 printf("auditallow: %s\n", sepol_av_perm_to_string(tclass, avd.auditallow)); in main() 56 printf("auditdeny: %s\n", sepol_av_perm_to_string(tclass, avd.auditdeny)); in main()
|
H A D | sepol_check_access.c | 14 sepol_security_class_t tclass; in main() local 49 if (sepol_string_to_security_class(argv[4], &tclass) < 0) { in main() 70 if (sepol_string_to_av_perm(tclass, perm, &av) < 0) { in main() 86 if (sepol_compute_av_reason_buffer(ssid, tsid, tclass, av, &avd, &reason, &reason_buf, 0) < 0) { in main()
|
H A D | sepol_validate_transition.c | 14 sepol_security_class_t tclass; in main() local 19 printf("usage: %s policy oldcontext newcontext tclass taskcontext\n", argv[0]); in main() 45 if (sepol_string_to_security_class(argv[4], &tclass) < 0) { in main() 55 ret = sepol_validate_transition_reason_buffer(oldsid, newsid, tasksid, tclass, &reason, SHOW_GRANTED); in main()
|
H A D | sepol_compute_relabel.c | 14 sepol_security_class_t tclass; in main() local 19 printf("usage: %s policy scontext tcontext tclass\n", argv[0]); in main() 45 if (sepol_string_to_security_class(argv[4], &tclass) < 0) { in main() 50 if (sepol_change_sid(ssid, tsid, tclass, &out_sid) < 0) { in main()
|
H A D | sepol_compute_member.c | 14 sepol_security_class_t tclass; in main() local 19 printf("usage: %s policy scontext tcontext tclass\n", argv[0]); in main() 45 if (sepol_string_to_security_class(argv[4], &tclass) < 0) { in main() 50 if (sepol_member_sid(ssid, tsid, tclass, &out_sid) < 0) { in main()
|
/third_party/selinux/checkpolicy/ |
H A D | checkpolicy.c | 385 sepol_security_class_t tclass; in main() local 765 tclass = atoi(ans); in main() 766 if (!tclass in main() 767 || tclass > policydb.p_classes.nprim) { in main() 772 policydb.class_val_to_struct[tclass - 1]; in main() 784 tclass = cladatum->s.value; in main() 792 ret = sepol_compute_av(ssid, tsid, tclass, 0, &avd); in main() 881 tclass = atoi(ans); in main() 882 if (!tclass in main() 883 || tclass > policyd in main() [all...] |
/third_party/selinux/libsepol/src/ |
H A D | services.c | 287 static char *get_class_info(sepol_security_class_t tclass, in get_class_info() argument 342 policydb->p_class_val_to_name[tclass - 1]); in get_class_info() 351 sepol_av_to_string(policydb, tclass, in get_class_info() 382 * 'tclass' should be '0' and r_buf MUST be NULL. 387 sepol_security_class_t tclass, in constraint_expr_eval_reason() 432 class_buf = get_class_info(tclass, constraint, xcontext); in constraint_expr_eval_reason() 842 sepol_security_class_t tclass, 851 sepol_security_class_t tclass, in type_attribute_bounds_av() 882 tclass, in type_attribute_bounds_av() 907 sepol_security_class_t tclass, in context_struct_compute_av() 384 constraint_expr_eval_reason(context_struct_t *scontext, context_struct_t *tcontext, context_struct_t *xcontext, sepol_security_class_t tclass, constraint_node_t *constraint, char **r_buf, unsigned int flags) constraint_expr_eval_reason() argument 849 type_attribute_bounds_av(context_struct_t *scontext, context_struct_t *tcontext, sepol_security_class_t tclass, sepol_access_vector_t requested, struct sepol_av_decision *avd, unsigned int *reason) type_attribute_bounds_av() argument 905 context_struct_compute_av(context_struct_t * scontext, context_struct_t * tcontext, sepol_security_class_t tclass, sepol_access_vector_t requested, struct sepol_av_decision *avd, unsigned int *reason, char **r_buf, unsigned int flags) context_struct_compute_av() argument 1031 sepol_validate_transition_reason_buffer(sepol_security_id_t oldsid, sepol_security_id_t newsid, sepol_security_id_t tasksid, sepol_security_class_t tclass, char **reason_buf, unsigned int flags) sepol_validate_transition_reason_buffer() argument 1089 sepol_compute_av_reason(sepol_security_id_t ssid, sepol_security_id_t tsid, sepol_security_class_t tclass, sepol_access_vector_t requested, struct sepol_av_decision *avd, unsigned int *reason) sepol_compute_av_reason() argument 1123 sepol_compute_av_reason_buffer(sepol_security_id_t ssid, sepol_security_id_t tsid, sepol_security_class_t tclass, sepol_access_vector_t requested, struct sepol_av_decision *avd, unsigned int *reason, char **reason_buf, unsigned int flags) sepol_compute_av_reason_buffer() argument 1165 sepol_compute_av(sepol_security_id_t ssid, sepol_security_id_t tsid, sepol_security_class_t tclass, sepol_access_vector_t requested, struct sepol_av_decision *avd) sepol_compute_av() argument 1180 sepol_string_to_security_class(const char *class_name, sepol_security_class_t *tclass) sepol_string_to_security_class() argument 1199 sepol_string_to_av_perm(sepol_security_class_t tclass, const char *perm_name, sepol_access_vector_t *av) sepol_string_to_av_perm() argument 1237 sepol_av_perm_to_string(sepol_security_class_t tclass, sepol_access_vector_t av) sepol_av_perm_to_string() argument 1301 compute_sid_handle_invalid_context(context_struct_t * scontext, context_struct_t * tcontext, sepol_security_class_t tclass, context_struct_t * newcontext) compute_sid_handle_invalid_context() argument 1329 sepol_compute_sid(sepol_security_id_t ssid, sepol_security_id_t tsid, sepol_security_class_t tclass, uint32_t specified, sepol_security_id_t * out_sid) sepol_compute_sid() argument 1470 sepol_transition_sid(sepol_security_id_t ssid, sepol_security_id_t tsid, sepol_security_class_t tclass, sepol_security_id_t * out_sid) sepol_transition_sid() argument 1483 sepol_member_sid(sepol_security_id_t ssid, sepol_security_id_t tsid, sepol_security_class_t tclass, sepol_security_id_t * out_sid) sepol_member_sid() argument 1495 sepol_change_sid(sepol_security_id_t ssid, sepol_security_id_t tsid, sepol_security_class_t tclass, sepol_security_id_t * out_sid) sepol_change_sid() argument [all...] |