Lines Matching refs:tclass
50 u16 tclass; member
127 static inline int avc_hash(u32 ssid, u32 tsid, u16 tclass) in avc_hash() argument
129 return (ssid ^ (tsid<<2) ^ (tclass<<4)) & (AVC_CACHE_SLOTS - 1); in avc_hash()
418 u32 ssid, u32 tsid, u16 tclass, in avc_xperms_audit() argument
430 return slow_avc_audit(state, ssid, tsid, tclass, requested, in avc_xperms_audit()
519 static void avc_node_populate(struct avc_node *node, u32 ssid, u32 tsid, u16 tclass, struct av_deci… in avc_node_populate() argument
523 node->ae.tclass = tclass; in avc_node_populate()
528 u32 ssid, u32 tsid, u16 tclass) in avc_search_node() argument
534 hvalue = avc_hash(ssid, tsid, tclass); in avc_search_node()
538 tclass == node->ae.tclass && in avc_search_node()
561 u32 ssid, u32 tsid, u16 tclass) in avc_lookup() argument
566 node = avc_search_node(avc, ssid, tsid, tclass); in avc_lookup()
617 u32 ssid, u32 tsid, u16 tclass, in avc_insert() argument
634 avc_node_populate(node, ssid, tsid, tclass, avd); in avc_insert()
640 hvalue = avc_hash(ssid, tsid, tclass); in avc_insert()
647 pos->ae.tclass == tclass) { in avc_insert()
679 perms = secclass_map[sad->tclass-1].perms; in avc_audit_pre_callback()
711 const char *tclass = NULL; in avc_audit_post_callback() local
730 tclass = secclass_map[sad->tclass-1].name; in avc_audit_post_callback()
731 audit_log_format(ab, " tclass=%s", tclass); in avc_audit_post_callback()
736 trace_selinux_audited(sad, scontext, tcontext, tclass); in avc_audit_post_callback()
768 u32 ssid, u32 tsid, u16 tclass, in slow_avc_audit() argument
775 if (WARN_ON(!tclass || tclass >= ARRAY_SIZE(secclass_map))) in slow_avc_audit()
783 sad.tclass = tclass; in slow_avc_audit()
842 u32 tsid, u16 tclass, u32 seqno, in avc_update_node() argument
859 hvalue = avc_hash(ssid, tsid, tclass); in avc_update_node()
869 tclass == pos->ae.tclass && in avc_update_node()
886 avc_node_populate(node, ssid, tsid, tclass, &orig->ae.avd); in avc_update_node()
994 u16 tclass, struct av_decision *avd, in avc_compute_av() argument
999 security_compute_av(state, ssid, tsid, tclass, avd, &xp_node->xp); in avc_compute_av()
1001 return avc_insert(state->avc, ssid, tsid, tclass, avd, xp_node); in avc_compute_av()
1006 u16 tclass, u32 requested, in avc_denied() argument
1018 xperm, ssid, tsid, tclass, avd->seqno, NULL, flags); in avc_denied()
1030 u32 ssid, u32 tsid, u16 tclass, u32 requested, in avc_has_extended_perms() argument
1051 node = avc_lookup(state->avc, ssid, tsid, tclass); in avc_has_extended_perms()
1053 node = avc_compute_av(state, ssid, tsid, tclass, &avd, xp_node); in avc_has_extended_perms()
1077 security_compute_xperms_decision(state, ssid, tsid, tclass, in avc_has_extended_perms()
1081 driver, xperm, ssid, tsid, tclass, avd.seqno, in avc_has_extended_perms()
1094 rc = avc_denied(state, ssid, tsid, tclass, requested, in avc_has_extended_perms()
1099 rc2 = avc_xperms_audit(state, ssid, tsid, tclass, requested, in avc_has_extended_perms()
1128 u16 tclass, u32 requested, in avc_has_perm_noaudit() argument
1142 node = avc_lookup(state->avc, ssid, tsid, tclass); in avc_has_perm_noaudit()
1144 node = avc_compute_av(state, ssid, tsid, tclass, avd, &xp_node); in avc_has_perm_noaudit()
1150 rc = avc_denied(state, ssid, tsid, tclass, requested, 0, 0, in avc_has_perm_noaudit()
1173 int avc_has_perm(struct selinux_state *state, u32 ssid, u32 tsid, u16 tclass, in avc_has_perm() argument
1179 rc = avc_has_perm_noaudit(state, ssid, tsid, tclass, requested, 0, in avc_has_perm()
1182 rc2 = avc_audit(state, ssid, tsid, tclass, requested, &avd, rc, in avc_has_perm()