Lines Matching refs:tclass
97 u16 tclass,
196 static u16 unmap_class(u16 tclass) in unmap_class() argument
198 if (tclass < current_mapping_size) in unmap_class()
199 return current_mapping[tclass].value; in unmap_class()
201 return tclass; in unmap_class()
219 static void map_decision(u16 tclass, struct av_decision *avd, in map_decision() argument
222 if (tclass < current_mapping_size) { in map_decision()
223 unsigned i, n = current_mapping[tclass].num_perms; in map_decision()
227 if (avd->allowed & current_mapping[tclass].perms[i]) in map_decision()
229 if (allow_unknown && !current_mapping[tclass].perms[i]) in map_decision()
235 if (avd->auditallow & current_mapping[tclass].perms[i]) in map_decision()
240 if (avd->auditdeny & current_mapping[tclass].perms[i]) in map_decision()
242 if (!allow_unknown && !current_mapping[tclass].perms[i]) in map_decision()
464 u16 tclass, in security_dump_masked_av() argument
482 tclass_name = sym_name(&policydb, SYM_CLASSES, tclass - 1); in security_dump_masked_av()
483 tclass_dat = policydb.class_val_to_struct[tclass - 1]; in security_dump_masked_av()
542 u16 tclass, in type_attribute_bounds_av() argument
568 tclass, in type_attribute_bounds_av()
584 tclass, in type_attribute_bounds_av()
601 tclass, in type_attribute_bounds_av()
615 tclass, masked, "bounds"); in type_attribute_bounds_av()
650 u16 tclass, in context_struct_compute_av() argument
671 if (unlikely(!tclass || tclass > policydb.p_classes.nprim)) { in context_struct_compute_av()
673 printk(KERN_WARNING "SELinux: Invalid class %hu\n", tclass); in context_struct_compute_av()
677 tclass_datum = policydb.class_val_to_struct[tclass - 1]; in context_struct_compute_av()
683 avkey.target_class = tclass; in context_struct_compute_av()
732 if (tclass == policydb.process_class && in context_struct_compute_av()
750 tclass, avd); in context_struct_compute_av()
756 u16 tclass) in security_validtrans_handle_fail() argument
770 o, n, t, sym_name(&policydb, SYM_CLASSES, tclass-1)); in security_validtrans_handle_fail()
789 u16 tclass; in security_validate_transition() local
797 tclass = unmap_class(orig_tclass); in security_validate_transition()
799 if (!tclass || tclass > policydb.p_classes.nprim) { in security_validate_transition()
801 __func__, tclass); in security_validate_transition()
805 tclass_datum = policydb.class_val_to_struct[tclass - 1]; in security_validate_transition()
836 tcontext, tclass); in security_validate_transition()
999 u16 tclass; in security_compute_xperms_decision() local
1031 tclass = unmap_class(orig_tclass); in security_compute_xperms_decision()
1032 if (unlikely(orig_tclass && !tclass)) { in security_compute_xperms_decision()
1039 if (unlikely(!tclass || tclass > policydb.p_classes.nprim)) { in security_compute_xperms_decision()
1040 pr_warn_ratelimited("SELinux: Invalid class %hu\n", tclass); in security_compute_xperms_decision()
1044 avkey.target_class = tclass; in security_compute_xperms_decision()
1090 u16 tclass; in security_compute_av() local
1117 tclass = unmap_class(orig_tclass); in security_compute_av()
1118 if (unlikely(orig_tclass && !tclass)) { in security_compute_av()
1123 context_struct_compute_av(scontext, tcontext, tclass, avd, xperms); in security_compute_av()
1135 u16 tclass, in security_compute_av_user() argument
1163 if (unlikely(!tclass)) { in security_compute_av_user()
1169 context_struct_compute_av(scontext, tcontext, tclass, avd, NULL); in security_compute_av_user()
1516 u16 tclass, in compute_sid_handle_invalid_context() argument
1533 n, s, t, sym_name(&policydb, SYM_CLASSES, tclass-1)); in compute_sid_handle_invalid_context()
1544 u32 stype, u32 ttype, u16 tclass, in filename_compute_type() argument
1560 ft.tclass = tclass; in filename_compute_type()
1582 u16 tclass; in security_compute_sid() local
1603 tclass = unmap_class(orig_tclass); in security_compute_sid()
1606 tclass = orig_tclass; in security_compute_sid()
1607 sock = security_is_socket_class(map_class(tclass)); in security_compute_sid()
1625 if (tclass && tclass <= policydb.p_classes.nprim) in security_compute_sid()
1626 cladatum = policydb.class_val_to_struct[tclass - 1]; in security_compute_sid()
1652 if ((tclass == policydb.process_class) || (sock == true)) in security_compute_sid()
1664 if ((tclass == policydb.process_class) || (sock == true)) { in security_compute_sid()
1676 avkey.target_class = tclass; in security_compute_sid()
1699 tcontext->type, tclass, objname); in security_compute_sid()
1707 (roletr->tclass == tclass)) { in security_compute_sid()
1717 rc = mls_compute_sid(scontext, tcontext, tclass, specified, in security_compute_sid()
1726 tclass, in security_compute_sid()
1753 int security_transition_sid(u32 ssid, u32 tsid, u16 tclass, in security_transition_sid() argument
1756 return security_compute_sid(ssid, tsid, tclass, AVTAB_TRANSITION, in security_transition_sid()
1760 int security_transition_sid_user(u32 ssid, u32 tsid, u16 tclass, in security_transition_sid_user() argument
1763 return security_compute_sid(ssid, tsid, tclass, AVTAB_TRANSITION, in security_transition_sid_user()
1782 u16 tclass, in security_member_sid() argument
1785 return security_compute_sid(ssid, tsid, tclass, AVTAB_MEMBER, NULL, in security_member_sid()
1804 u16 tclass, in security_change_sid() argument
1807 return security_compute_sid(ssid, tsid, tclass, AVTAB_CHANGE, NULL, in security_change_sid()