Home | History | Annotate | Download | only in src

Lines Matching defs:ssid

19 	security_id_t ssid;
40 int (*callback) (uint32_t event, security_id_t ssid,
45 security_id_t ssid;
62 static inline int avc_hash(security_id_t ssid,
65 return ((uintptr_t) ssid ^ ((uintptr_t) tsid << 2) ^ tclass)
290 ae->ssid = ae->tsid = ae->create_sid = NULL;
297 static inline struct avc_node *avc_claim_node(security_id_t ssid,
317 hvalue = avc_hash(ssid, tsid, tclass);
320 new->ae.ssid = ssid;
330 static inline struct avc_node *avc_search_node(security_id_t ssid,
339 hvalue = avc_hash(ssid, tsid, tclass);
342 (ssid != cur->ae.ssid ||
365 * @ssid: source security identifier
373 * (@ssid, @tsid), interpreting the permissions
378 static int avc_lookup(security_id_t ssid, security_id_t tsid,
386 node = avc_search_node(ssid, tsid, tclass, &probes);
403 * @ssid: source security identifier
410 * (@ssid, @tsid) and class @tclass.
420 static int avc_insert(security_id_t ssid, security_id_t tsid,
436 node = avc_claim_node(ssid, tsid, tclass);
634 * @ssid: source security identifier
638 static void avc_dump_query(security_id_t ssid, security_id_t tsid,
644 ssid->ctx, tsid->ctx);
651 void avc_audit(security_id_t ssid, security_id_t tsid,
682 avc_dump_query(ssid, tsid, tclass);
691 int avc_has_perm_noaudit(security_id_t ssid,
716 if (ae->ssid == ssid &&
730 rc = avc_lookup(ssid, tsid, tclass, requested, aeref);
732 ssid->ctx, tsid->ctx,
737 rc = avc_insert(ssid, tsid, tclass, &entry, aeref);
766 int avc_has_perm(security_id_t ssid, security_id_t tsid,
775 rc = avc_has_perm_noaudit(ssid, tsid, tclass, requested, aeref, &avd);
777 avc_audit(ssid, tsid, tclass, requested, &avd, rc, auditdata);
782 int avc_compute_create(security_id_t ssid, security_id_t tsid,
796 rc = avc_lookup(ssid, tsid, tclass, 0, &aeref);
799 rc = security_compute_av(ssid->ctx, tsid->ctx,
803 rc = avc_insert(ssid, tsid, tclass, &entry, &aeref);
811 rc = security_compute_create(ssid->ctx, tsid->ctx, tclass,
832 int avc_add_callback(int (*callback) (uint32_t event, security_id_t ssid,
837 uint32_t events, security_id_t ssid,
852 c->ssid = ssid;
893 static int avc_update_cache(uint32_t event, security_id_t ssid,
902 if (ssid == SECSID_WILD || tsid == SECSID_WILD) {
906 if (avc_sidcmp(ssid, node->ae.ssid) &&
915 node = avc_search_node(ssid, tsid, tclass, 0);
931 static int avc_control(uint32_t event, security_id_t ssid,
948 avc_update_cache(event, ssid, tsid, tclass, perms);
952 avc_sidcmp(c->ssid, ssid) &&
956 ret = c->callback(event, ssid, tsid, tclass,
970 avc_update_cache(event, ssid, tsid, tclass, perms);
985 * @ssid: source security identifier or %SECSID_WILD
991 int avc_ss_grant(security_id_t ssid, security_id_t tsid,
996 ssid, tsid, tclass, perms, seqno, 0);
1001 * @ssid: source security identifier or %SECSID_WILD
1012 int avc_ss_try_revoke(security_id_t ssid, security_id_t tsid,
1018 ssid, tsid, tclass, perms, seqno, out_retained);
1023 * @ssid: source security identifier or %SECSID_WILD
1032 int avc_ss_revoke(security_id_t ssid, security_id_t tsid,
1037 ssid, tsid, tclass, perms, seqno, 0);
1060 * @ssid: source security identifier or %SECSID_WILD
1067 int avc_ss_set_auditallow(security_id_t ssid, security_id_t tsid,
1073 ssid, tsid, tclass, perms, seqno, 0);
1076 ssid, tsid, tclass, perms, seqno, 0);
1081 * @ssid: source security identifier or %SECSID_WILD
1088 int avc_ss_set_auditdeny(security_id_t ssid, security_id_t tsid,
1094 ssid, tsid, tclass, perms, seqno, 0);
1097 ssid, tsid, tclass, perms, seqno, 0);