Lines Matching refs:tclass

91 				      u16 tclass,
176 static u16 unmap_class(struct selinux_map *map, u16 tclass)
178 if (tclass < map->size)
179 return map->mapping[tclass].value;
181 return tclass;
200 u16 tclass, struct av_decision *avd,
203 if (tclass < map->size) {
204 struct selinux_mapping *mapping = &map->mapping[tclass];
458 u16 tclass,
476 tclass_name = sym_name(policydb, SYM_CLASSES, tclass - 1);
477 tclass_dat = policydb->class_val_to_struct[tclass - 1];
506 "scontext=%s tcontext=%s tclass=%s perms=",
535 u16 tclass,
567 tclass,
581 tclass, masked, "bounds");
614 u16 tclass,
635 if (unlikely(!tclass || tclass > policydb->p_classes.nprim)) {
637 pr_warn("SELinux: Invalid class %hu\n", tclass);
641 tclass_datum = policydb->class_val_to_struct[tclass - 1];
647 avkey.target_class = tclass;
695 if (tclass == policydb->process_class &&
713 tclass, avd);
720 u16 tclass)
735 " oldcontext=%s newcontext=%s taskcontext=%s tclass=%s",
736 o, n, t, sym_name(p, SYM_CLASSES, tclass-1));
758 u16 tclass;
772 tclass = unmap_class(&policy->map, orig_tclass);
774 tclass = orig_tclass;
776 if (!tclass || tclass > policydb->p_classes.nprim) {
780 tclass_datum = policydb->class_val_to_struct[tclass - 1];
818 tclass);
830 u16 tclass)
833 tclass, true);
1009 u16 tclass;
1045 tclass = unmap_class(&policy->map, orig_tclass);
1046 if (unlikely(orig_tclass && !tclass)) {
1053 if (unlikely(!tclass || tclass > policydb->p_classes.nprim)) {
1054 pr_warn_ratelimited("SELinux: Invalid class %hu\n", tclass);
1058 avkey.target_class = tclass;
1093 * SID pair (@ssid, @tsid) for the permissions in @tclass.
1104 u16 tclass;
1135 tclass = unmap_class(&policy->map, orig_tclass);
1136 if (unlikely(orig_tclass && !tclass)) {
1141 context_struct_compute_av(policydb, scontext, tcontext, tclass, avd,
1155 u16 tclass,
1190 if (unlikely(!tclass)) {
1196 context_struct_compute_av(policydb, scontext, tcontext, tclass, avd,
1641 u16 tclass,
1663 audit_log_format(ab, " scontext=%s tcontext=%s tclass=%s",
1664 s, t, sym_name(policydb, SYM_CLASSES, tclass-1));
1677 u32 stype, u32 ttype, u16 tclass,
1692 ft.tclass = tclass;
1721 u16 tclass;
1746 tclass = unmap_class(&policy->map, orig_tclass);
1749 tclass = orig_tclass;
1751 tclass));
1775 if (tclass && tclass <= policydb->p_classes.nprim)
1776 cladatum = policydb->class_val_to_struct[tclass - 1];
1802 if ((tclass == policydb->process_class) || sock)
1814 if ((tclass == policydb->process_class) || sock) {
1826 avkey.target_class = tclass;
1849 tcontext->type, tclass, objname);
1858 .tclass = tclass,
1868 rc = mls_compute_sid(policydb, scontext, tcontext, tclass, specified,
1876 tentry, tclass,
1899 * @tclass: target security class
1904 * class @tclass based on a SID pair (@ssid, @tsid).
1909 int security_transition_sid(u32 ssid, u32 tsid, u16 tclass,
1912 return security_compute_sid(ssid, tsid, tclass,
1917 int security_transition_sid_user(u32 ssid, u32 tsid, u16 tclass,
1920 return security_compute_sid(ssid, tsid, tclass,
1929 * @tclass: target security class
1933 * object of class @tclass based on a SID pair (@ssid, @tsid).
1940 u16 tclass,
1943 return security_compute_sid(ssid, tsid, tclass,
1952 * @tclass: target security class
1955 * Compute a SID to use for relabeling an object of class @tclass
1963 u16 tclass,
1966 return security_compute_sid(ssid, tsid, tclass, AVTAB_CHANGE, NULL,