/third_party/selinux/libselinux/src/ |
H A D | avc.c | 21 security_id_t tsid; member 42 security_id_t tsid, 47 security_id_t tsid; member 63 security_id_t tsid, security_class_t tclass) in avc_hash() 65 return ((uintptr_t) ssid ^ ((uintptr_t) tsid << 2) ^ tclass) in avc_hash() 345 security_id_t tsid, in avc_claim_node() 364 hvalue = avc_hash(ssid, tsid, tclass); in avc_claim_node() 368 new->ae.tsid = tsid; in avc_claim_node() 378 security_id_t tsid, in avc_search_node() 62 avc_hash(security_id_t ssid, security_id_t tsid, security_class_t tclass) avc_hash() argument 344 avc_claim_node(security_id_t ssid, security_id_t tsid, security_class_t tclass) avc_claim_node() argument 377 avc_search_node(security_id_t ssid, security_id_t tsid, security_class_t tclass, int *probes) avc_search_node() argument 425 avc_lookup(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t requested, struct avc_entry_ref *aeref) avc_lookup() argument 467 avc_insert(security_id_t ssid, security_id_t tsid, security_class_t tclass, struct avc_entry *ae, struct avc_entry_ref *aeref) avc_insert() argument 679 avc_dump_query(security_id_t ssid, security_id_t tsid, security_class_t tclass) avc_dump_query() argument 692 avc_audit(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t requested, struct av_decision *avd, int result, void *a) avc_audit() argument 744 avc_has_perm_noaudit(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t requested, struct avc_entry_ref *aeref, struct av_decision *avd) avc_has_perm_noaudit() argument 825 avc_has_perm(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t requested, struct avc_entry_ref *aeref, void *auditdata) avc_has_perm() argument 839 avc_compute_create(security_id_t ssid, security_id_t tsid, security_class_t tclass, security_id_t *newsid) avc_compute_create() argument 889 avc_compute_member(security_id_t ssid, security_id_t tsid, security_class_t tclass, security_id_t *newsid) avc_compute_member() argument 909 avc_add_callback(int (*callback) (uint32_t event, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, access_vector_t * out_retained), uint32_t events, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms) avc_add_callback() argument 970 avc_update_cache(uint32_t event, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms) avc_update_cache() argument 1008 avc_control(uint32_t event, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, access_vector_t * out_retained) avc_control() argument 1068 avc_ss_grant(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno) avc_ss_grant() argument 1089 avc_ss_try_revoke(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, access_vector_t * out_retained) avc_ss_try_revoke() argument 1109 avc_ss_revoke(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno) avc_ss_revoke() argument 1144 avc_ss_set_auditallow(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, uint32_t enable) avc_ss_set_auditallow() argument 1165 avc_ss_set_auditdeny(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, uint32_t enable) avc_ss_set_auditdeny() argument [all...] |
H A D | avc_internal.h | 165 int avc_ss_grant(security_id_t ssid, security_id_t tsid, 168 int avc_ss_try_revoke(security_id_t ssid, security_id_t tsid, 172 int avc_ss_revoke(security_id_t ssid, security_id_t tsid, 176 int avc_ss_set_auditallow(security_id_t ssid, security_id_t tsid, 179 int avc_ss_set_auditdeny(security_id_t ssid, security_id_t tsid,
|
H A D | audit2why.c | 45 sepol_security_id_t tsid; member 112 rc = sepol_compute_av_reason(avc->ssid, avc->tsid, avc->tclass, in check_booleans() 325 sepol_security_id_t ssid, tsid; in analyze() local 348 rc = sepol_context_to_sid(tcon, strlen(tcon) + 1, &tsid); in analyze() 382 rc = sepol_compute_av_reason_buffer(ssid, tsid, tclass, av, &avd, &reason, &reason_buf, 0); in analyze() 391 avc->tsid = tsid; in analyze()
|
/kernel/linux/linux-5.10/security/selinux/ |
H A D | avc.c | 49 u32 tsid; member 127 static inline int avc_hash(u32 ssid, u32 tsid, u16 tclass) in avc_hash() argument 129 return (ssid ^ (tsid<<2) ^ (tclass<<4)) & (AVC_CACHE_SLOTS - 1); in avc_hash() 418 u32 ssid, u32 tsid, u16 tclass, in avc_xperms_audit() 430 return slow_avc_audit(state, ssid, tsid, tclass, requested, in avc_xperms_audit() 519 static void avc_node_populate(struct avc_node *node, u32 ssid, u32 tsid, u16 tclass, struct av_decision *avd) in avc_node_populate() argument 522 node->ae.tsid = tsid; in avc_node_populate() 528 u32 ssid, u32 tsid, u16 tclass) in avc_search_node() 534 hvalue = avc_hash(ssid, tsid, tclas in avc_search_node() 417 avc_xperms_audit(struct selinux_state *state, u32 ssid, u32 tsid, u16 tclass, u32 requested, struct av_decision *avd, struct extended_perms_decision *xpd, u8 perm, int result, struct common_audit_data *ad) avc_xperms_audit() argument 527 avc_search_node(struct selinux_avc *avc, u32 ssid, u32 tsid, u16 tclass) avc_search_node() argument 560 avc_lookup(struct selinux_avc *avc, u32 ssid, u32 tsid, u16 tclass) avc_lookup() argument 616 avc_insert(struct selinux_avc *avc, u32 ssid, u32 tsid, u16 tclass, struct av_decision *avd, struct avc_xperms_node *xp_node) avc_insert() argument 763 slow_avc_audit(struct selinux_state *state, u32 ssid, u32 tsid, u16 tclass, u32 requested, u32 audited, u32 denied, int result, struct common_audit_data *a) slow_avc_audit() argument 836 avc_update_node(struct selinux_avc *avc, u32 event, u32 perms, u8 driver, u8 xperm, u32 ssid, u32 tsid, u16 tclass, u32 seqno, struct extended_perms_decision *xpd, u32 flags) avc_update_node() argument 1003 avc_compute_av(struct selinux_state *state, u32 ssid, u32 tsid, u16 tclass, struct av_decision *avd, struct avc_xperms_node *xp_node) avc_compute_av() argument 1015 avc_denied(struct selinux_state *state, u32 ssid, u32 tsid, u16 tclass, u32 requested, u8 driver, u8 xperm, unsigned int flags, struct av_decision *avd) avc_denied() argument 1040 avc_has_extended_perms(struct selinux_state *state, u32 ssid, u32 tsid, u16 tclass, u32 requested, u8 driver, u8 xperm, struct common_audit_data *ad) avc_has_extended_perms() argument 1137 avc_has_perm_noaudit(struct selinux_state *state, u32 ssid, u32 tsid, u16 tclass, u32 requested, unsigned int flags, struct av_decision *avd) avc_has_perm_noaudit() argument 1184 avc_has_perm(struct selinux_state *state, u32 ssid, u32 tsid, u16 tclass, u32 requested, struct common_audit_data *auditdata) avc_has_perm() argument 1200 avc_has_perm_flags(struct selinux_state *state, u32 ssid, u32 tsid, u16 tclass, u32 requested, struct common_audit_data *auditdata, int flags) avc_has_perm_flags() argument [all...] |
H A D | selinuxfs.c | 782 u32 osid, nsid, tsid; in sel_write_validatetrans() local 833 rc = security_context_str_to_sid(state, taskcon, &tsid, GFP_KERNEL); in sel_write_validatetrans() 837 rc = security_validate_transition_user(state, osid, nsid, tsid, tclass); in sel_write_validatetrans() 910 u32 ssid, tsid; in sel_write_access() local 939 length = security_context_str_to_sid(state, tcon, &tsid, GFP_KERNEL); in sel_write_access() 943 security_compute_av_user(state, ssid, tsid, tclass, &avd); in sel_write_access() 962 u32 ssid, tsid, newsid; in sel_write_create() local 1030 length = security_context_str_to_sid(state, tcon, &tsid, GFP_KERNEL); in sel_write_create() 1034 length = security_transition_sid_user(state, ssid, tsid, tclass, in sel_write_create() 1065 u32 ssid, tsid, newsi in sel_write_relabel() local 1191 u32 ssid, tsid, newsid; sel_write_member() local [all...] |
/kernel/linux/linux-6.6/security/selinux/ |
H A D | avc.c | 49 u32 tsid; member 125 static inline u32 avc_hash(u32 ssid, u32 tsid, u16 tclass) in avc_hash() argument 127 return (ssid ^ (tsid<<2) ^ (tclass<<4)) & (AVC_CACHE_SLOTS - 1); in avc_hash() 415 static inline int avc_xperms_audit(u32 ssid, u32 tsid, u16 tclass, in avc_xperms_audit() argument 427 return slow_avc_audit(ssid, tsid, tclass, requested, in avc_xperms_audit() 515 static void avc_node_populate(struct avc_node *node, u32 ssid, u32 tsid, u16 tclass, struct av_decision *avd) in avc_node_populate() argument 518 node->ae.tsid = tsid; in avc_node_populate() 523 static inline struct avc_node *avc_search_node(u32 ssid, u32 tsid, u16 tclass) in avc_search_node() argument 529 hvalue = avc_hash(ssid, tsid, tclas in avc_search_node() 555 avc_lookup(u32 ssid, u32 tsid, u16 tclass) avc_lookup() argument 608 avc_insert(u32 ssid, u32 tsid, u16 tclass, struct av_decision *avd, struct avc_xperms_node *xp_node) avc_insert() argument 756 slow_avc_audit(u32 ssid, u32 tsid, u16 tclass, u32 requested, u32 audited, u32 denied, int result, struct common_audit_data *a) slow_avc_audit() argument 831 avc_update_node(u32 event, u32 perms, u8 driver, u8 xperm, u32 ssid, u32 tsid, u16 tclass, u32 seqno, struct extended_perms_decision *xpd, u32 flags) avc_update_node() argument 985 avc_compute_av(u32 ssid, u32 tsid, u16 tclass, struct av_decision *avd, struct avc_xperms_node *xp_node) avc_compute_av() argument 994 avc_denied(u32 ssid, u32 tsid, u16 tclass, u32 requested, u8 driver, u8 xperm, unsigned int flags, struct av_decision *avd) avc_denied() argument 1018 avc_has_extended_perms(u32 ssid, u32 tsid, u16 tclass, u32 requested, u8 driver, u8 xperm, struct common_audit_data *ad) avc_has_extended_perms() argument 1107 avc_perm_nonode(u32 ssid, u32 tsid, u16 tclass, u32 requested, unsigned int flags, struct av_decision *avd) avc_perm_nonode() argument 1142 avc_has_perm_noaudit(u32 ssid, u32 tsid, u16 tclass, u32 requested, unsigned int flags, struct av_decision *avd) avc_has_perm_noaudit() argument 1186 avc_has_perm(u32 ssid, u32 tsid, u16 tclass, u32 requested, struct common_audit_data *auditdata) avc_has_perm() argument [all...] |
H A D | selinuxfs.c | 743 u32 osid, nsid, tsid; in sel_write_validatetrans() local 793 rc = security_context_str_to_sid(taskcon, &tsid, GFP_KERNEL); in sel_write_validatetrans() 797 rc = security_validate_transition_user(osid, nsid, tsid, tclass); in sel_write_validatetrans() 868 u32 ssid, tsid; in sel_write_access() local 896 length = security_context_str_to_sid(tcon, &tsid, GFP_KERNEL); in sel_write_access() 900 security_compute_av_user(ssid, tsid, tclass, &avd); in sel_write_access() 917 u32 ssid, tsid, newsid; in sel_write_create() local 984 length = security_context_str_to_sid(tcon, &tsid, GFP_KERNEL); in sel_write_create() 988 length = security_transition_sid_user(ssid, tsid, tclass, in sel_write_create() 1017 u32 ssid, tsid, newsi in sel_write_relabel() local 1137 u32 ssid, tsid, newsid; sel_write_member() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
H A D | wmm_ac.c | 78 u8 tsid = wmm_ac_get_tsid(tspec); in wmm_ac_add_ts() local 95 ret = wpa_drv_add_ts(wpa_s, tsid, addr, up, admitted_time); in wmm_ac_add_ts() 99 MAC2STR(addr), tsid, admitted_time, ret); in wmm_ac_add_ts() 111 "tsid=%d addr=" MACSTR " admitted_time=%d", in wmm_ac_add_ts() 112 tsid, MAC2STR(addr), admitted_time); in wmm_ac_add_ts() 122 u8 tsid; in wmm_ac_del_ts_idx() local 127 tsid = wmm_ac_get_tsid(tspec); in wmm_ac_del_ts_idx() 128 wpa_printf(MSG_DEBUG, "WMM AC: Del TS ac=%d tsid=%d", ac, tsid); in wmm_ac_del_ts_idx() 132 wpa_drv_del_ts(wpa_s, tsid, wpa_ in wmm_ac_del_ts_idx() 241 wmm_ac_find_tsid(struct wpa_supplicant *wpa_s, u8 tsid, enum ts_dir_idx *dir) wmm_ac_find_tsid() argument 328 wmm_ac_should_replace_ts(struct wpa_supplicant *wpa_s, u8 tsid, u8 ac, u8 dir) wmm_ac_should_replace_ts() argument 549 wpas_wmm_ac_delts(struct wpa_supplicant *wpa_s, u8 tsid) wpas_wmm_ac_delts() argument 635 u8 tsid; wmm_ac_handle_delts() local 664 u8 ac, tsid, up, dir; wmm_ac_handle_addts_resp() local 872 u8 dir, tsid; wpas_wmm_ac_status() local [all...] |
H A D | wmm_ac.h | 120 * tsid - Traffic ID 123 int tsid; member 168 int wpas_wmm_ac_delts(struct wpa_supplicant *wpa_s, u8 tsid);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
H A D | wmm_ac.c | 78 u8 tsid = wmm_ac_get_tsid(tspec); in wmm_ac_add_ts() local 95 ret = wpa_drv_add_ts(wpa_s, tsid, addr, up, admitted_time); in wmm_ac_add_ts() 99 MAC2STR_SEC(addr), tsid, admitted_time, ret); in wmm_ac_add_ts() 111 "tsid=%d addr=" MACSTR " admitted_time=%d", in wmm_ac_add_ts() 112 tsid, MAC2STR(addr), admitted_time); in wmm_ac_add_ts() 122 u8 tsid; in wmm_ac_del_ts_idx() local 127 tsid = wmm_ac_get_tsid(tspec); in wmm_ac_del_ts_idx() 128 wpa_printf(MSG_DEBUG, "WMM AC: Del TS ac=%d tsid=%d", ac, tsid); in wmm_ac_del_ts_idx() 132 wpa_drv_del_ts(wpa_s, tsid, wpa_ in wmm_ac_del_ts_idx() 241 wmm_ac_find_tsid(struct wpa_supplicant *wpa_s, u8 tsid, enum ts_dir_idx *dir) wmm_ac_find_tsid() argument 328 wmm_ac_should_replace_ts(struct wpa_supplicant *wpa_s, u8 tsid, u8 ac, u8 dir) wmm_ac_should_replace_ts() argument 549 wpas_wmm_ac_delts(struct wpa_supplicant *wpa_s, u8 tsid) wpas_wmm_ac_delts() argument 635 u8 tsid; wmm_ac_handle_delts() local 664 u8 ac, tsid, up, dir; wmm_ac_handle_addts_resp() local 872 u8 dir, tsid; wpas_wmm_ac_status() local [all...] |
H A D | wmm_ac.h | 120 * tsid - Traffic ID 123 int tsid; member 168 int wpas_wmm_ac_delts(struct wpa_supplicant *wpa_s, u8 tsid);
|
/kernel/linux/linux-5.10/security/selinux/include/ |
H A D | avc.h | 49 u32 tsid; member 101 u32 ssid, u32 tsid, u16 tclass, 108 * @tsid: target security identifier 126 u32 ssid, u32 tsid, in avc_audit() 140 return slow_avc_audit(state, ssid, tsid, tclass, in avc_audit() 149 u32 ssid, u32 tsid, 155 u32 ssid, u32 tsid, 159 u32 ssid, u32 tsid, 165 u32 ssid, u32 tsid, u16 tclass, u32 requested, 125 avc_audit(struct selinux_state *state, u32 ssid, u32 tsid, u16 tclass, u32 requested, struct av_decision *avd, int result, struct common_audit_data *a, int flags) avc_audit() argument
|
H A D | security.h | 286 u32 ssid, u32 tsid, 291 u32 ssid, u32 tsid, u16 tclass, 296 u32 ssid, u32 tsid, 300 u32 ssid, u32 tsid, u16 tclass, 304 u32 ssid, u32 tsid, u16 tclass, 307 int security_member_sid(struct selinux_state *state, u32 ssid, u32 tsid, 310 int security_change_sid(struct selinux_state *state, u32 ssid, u32 tsid,
|
/kernel/linux/linux-6.6/security/selinux/include/ |
H A D | avc.h | 49 u32 tsid; member 99 int slow_avc_audit(u32 ssid, u32 tsid, u16 tclass, 106 * @tsid: target security identifier 122 static inline int avc_audit(u32 ssid, u32 tsid, in avc_audit() argument 132 return slow_avc_audit(ssid, tsid, tclass, in avc_audit() 139 int avc_has_perm_noaudit(u32 ssid, u32 tsid, 144 int avc_has_perm(u32 ssid, u32 tsid, 148 int avc_has_extended_perms(u32 ssid, u32 tsid, u16 tclass, u32 requested,
|
H A D | security.h | 243 void security_compute_av(u32 ssid, u32 tsid, 247 void security_compute_xperms_decision(u32 ssid, u32 tsid, u16 tclass, 251 void security_compute_av_user(u32 ssid, u32 tsid, 254 int security_transition_sid(u32 ssid, u32 tsid, u16 tclass, 257 int security_transition_sid_user(u32 ssid, u32 tsid, u16 tclass, 260 int security_member_sid(u32 ssid, u32 tsid, u16 tclass, u32 *out_sid); 262 int security_change_sid(u32 ssid, u32 tsid, u16 tclass, u32 *out_sid);
|
/third_party/selinux/libselinux/include/selinux/ |
H A D | avc.h | 254 * @tsid: target security identifier 261 * for the SID pair (@ssid, @tsid), interpreting the permissions 273 security_id_t tsid, 281 * @tsid: target security identifier 288 * for the SID pair (@ssid, @tsid), interpreting the permissions 296 extern int avc_has_perm(security_id_t ssid, security_id_t tsid, 303 * @tsid: target security identifier 319 extern void avc_audit(security_id_t ssid, security_id_t tsid, 326 * @tsid: target security identifier 338 security_id_t tsid, [all...] |
/third_party/selinux/libsepol/include/sepol/policydb/ |
H A D | services.h | 42 sepol_security_id_t tsid, /* IN */ 54 sepol_security_id_t tsid, 70 sepol_security_id_t tsid, 120 sepol_security_id_t tsid, /* IN */ 130 sepol_security_id_t tsid, /* IN */ 139 sepol_security_id_t tsid, /* IN */
|
/third_party/selinux/libsepol/utils/ |
H A D | sepol_compute_av.c | 13 sepol_security_id_t ssid, tsid; in main() local 40 if (sepol_context_to_sid(argv[3], strlen(argv[3]), &tsid) < 0) { in main() 50 rc = sepol_compute_av(ssid, tsid, tclass, 0, &avd); in main()
|
H A D | sepol_compute_relabel.c | 13 sepol_security_id_t ssid, tsid, out_sid; in main() local 40 if (sepol_context_to_sid(argv[3], strlen(argv[3]), &tsid) < 0) { in main() 50 if (sepol_change_sid(ssid, tsid, tclass, &out_sid) < 0) { in main()
|
H A D | sepol_compute_member.c | 13 sepol_security_id_t ssid, tsid, out_sid; in main() local 40 if (sepol_context_to_sid(argv[3], strlen(argv[3]), &tsid) < 0) { in main() 50 if (sepol_member_sid(ssid, tsid, tclass, &out_sid) < 0) { in main()
|
H A D | sepol_check_access.c | 13 sepol_security_id_t ssid, tsid; in main() local 44 if (sepol_context_to_sid(argv[3], strlen(argv[3]), &tsid) < 0) { in main() 86 if (sepol_compute_av_reason_buffer(ssid, tsid, tclass, av, &avd, &reason, &reason_buf, 0) < 0) { in main()
|
/third_party/selinux/checkpolicy/ |
H A D | checkpolicy.c | 386 sepol_security_id_t ssid, tsid, *sids, oldsid, newsid, tasksid; in main() local 760 tsid = atoi(ans); in main() 792 ret = sepol_compute_av(ssid, tsid, tclass, 0, &avd); in main() 876 tsid = atoi(ans); in main() 903 sepol_transition_sid(ssid, tsid, tclass, in main() 907 sepol_member_sid(ssid, tsid, tclass, &ssid); in main() 910 sepol_change_sid(ssid, tsid, tclass, &ssid); in main() 971 ret = sepol_fs_sid(ans, &ssid, &tsid); in main() 975 printf("fs_sid %d default_file_sid %d\n", ssid, tsid); in main() 1004 ret = sepol_netif_sid(ans, &ssid, &tsid); in main() [all...] |
/kernel/linux/linux-5.10/drivers/misc/sgi-gru/ |
H A D | grumain.c | 297 *vdata, int tsid) in gru_find_current_gts_nolock() 302 if (gts->ts_tsid == tsid) in gru_find_current_gts_nolock() 312 unsigned char tlb_preload_count, int options, int tsid) in gru_alloc_gts() 334 gts->ts_tsid = tsid; in gru_alloc_gts() 359 struct gru_vma_data *gru_alloc_vma_data(struct vm_area_struct *vma, int tsid) in gru_alloc_vma_data() argument 378 int tsid) in gru_find_thread_state() 384 gts = gru_find_current_gts_nolock(vdata, tsid); in gru_find_thread_state() 395 int tsid) in gru_alloc_thread_state() 403 vdata->vd_user_options, tsid); in gru_alloc_thread_state() 408 ngts = gru_find_current_gts_nolock(vdata, tsid); in gru_alloc_thread_state() 296 gru_find_current_gts_nolock(struct gru_vma_data *vdata, int tsid) gru_find_current_gts_nolock() argument 310 gru_alloc_gts(struct vm_area_struct *vma, int cbr_au_count, int dsr_au_count, unsigned char tlb_preload_count, int options, int tsid) gru_alloc_gts() argument 377 gru_find_thread_state(struct vm_area_struct *vma, int tsid) gru_find_thread_state() argument 394 gru_alloc_thread_state(struct vm_area_struct *vma, int tsid) gru_alloc_thread_state() argument [all...] |
/kernel/linux/linux-6.6/drivers/misc/sgi-gru/ |
H A D | grumain.c | 297 *vdata, int tsid) in gru_find_current_gts_nolock() 302 if (gts->ts_tsid == tsid) in gru_find_current_gts_nolock() 312 unsigned char tlb_preload_count, int options, int tsid) in gru_alloc_gts() 334 gts->ts_tsid = tsid; in gru_alloc_gts() 359 struct gru_vma_data *gru_alloc_vma_data(struct vm_area_struct *vma, int tsid) in gru_alloc_vma_data() argument 378 int tsid) in gru_find_thread_state() 384 gts = gru_find_current_gts_nolock(vdata, tsid); in gru_find_thread_state() 395 int tsid) in gru_alloc_thread_state() 403 vdata->vd_user_options, tsid); in gru_alloc_thread_state() 408 ngts = gru_find_current_gts_nolock(vdata, tsid); in gru_alloc_thread_state() 296 gru_find_current_gts_nolock(struct gru_vma_data *vdata, int tsid) gru_find_current_gts_nolock() argument 310 gru_alloc_gts(struct vm_area_struct *vma, int cbr_au_count, int dsr_au_count, unsigned char tlb_preload_count, int options, int tsid) gru_alloc_gts() argument 377 gru_find_thread_state(struct vm_area_struct *vma, int tsid) gru_find_thread_state() argument 394 gru_alloc_thread_state(struct vm_area_struct *vma, int tsid) gru_alloc_thread_state() argument [all...] |
/third_party/selinux/libsepol/src/ |
H A D | services.c | 1090 sepol_security_id_t tsid, in sepol_compute_av_reason() 1105 tcontext = sepol_sidtab_search(sidtab, tsid); in sepol_compute_av_reason() 1107 ERR(NULL, "unrecognized target SID %d", tsid); in sepol_compute_av_reason() 1124 sepol_security_id_t tsid, in sepol_compute_av_reason_buffer() 1141 tcontext = sepol_sidtab_search(sidtab, tsid); in sepol_compute_av_reason_buffer() 1143 ERR(NULL, "unrecognized target SID %d", tsid); in sepol_compute_av_reason_buffer() 1166 sepol_security_id_t tsid, in sepol_compute_av() 1172 return sepol_compute_av_reason(ssid, tsid, tclass, requested, avd, in sepol_compute_av() 1330 sepol_security_id_t tsid, in sepol_compute_sid() 1348 tcontext = sepol_sidtab_search(sidtab, tsid); in sepol_compute_sid() 1089 sepol_compute_av_reason(sepol_security_id_t ssid, sepol_security_id_t tsid, sepol_security_class_t tclass, sepol_access_vector_t requested, struct sepol_av_decision *avd, unsigned int *reason) sepol_compute_av_reason() argument 1123 sepol_compute_av_reason_buffer(sepol_security_id_t ssid, sepol_security_id_t tsid, sepol_security_class_t tclass, sepol_access_vector_t requested, struct sepol_av_decision *avd, unsigned int *reason, char **reason_buf, unsigned int flags) sepol_compute_av_reason_buffer() argument 1165 sepol_compute_av(sepol_security_id_t ssid, sepol_security_id_t tsid, sepol_security_class_t tclass, sepol_access_vector_t requested, struct sepol_av_decision *avd) sepol_compute_av() argument 1329 sepol_compute_sid(sepol_security_id_t ssid, sepol_security_id_t tsid, sepol_security_class_t tclass, uint32_t specified, sepol_security_id_t * out_sid) sepol_compute_sid() argument 1470 sepol_transition_sid(sepol_security_id_t ssid, sepol_security_id_t tsid, sepol_security_class_t tclass, sepol_security_id_t * out_sid) sepol_transition_sid() argument 1483 sepol_member_sid(sepol_security_id_t ssid, sepol_security_id_t tsid, sepol_security_class_t tclass, sepol_security_id_t * out_sid) sepol_member_sid() argument 1495 sepol_change_sid(sepol_security_id_t ssid, sepol_security_id_t tsid, sepol_security_class_t tclass, sepol_security_id_t * out_sid) sepol_change_sid() argument [all...] |