Home | History | Annotate | Download | only in src

Lines Matching full:ssid

20 	security_id_t ssid;
41 int (*callback) (uint32_t event, security_id_t ssid,
46 security_id_t ssid;
63 static inline int avc_hash(security_id_t ssid,
66 return ((uintptr_t) ssid ^ ((uintptr_t) tsid << 2) ^ tclass)
302 static inline struct avc_node *avc_claim_node(security_id_t ssid,
322 hvalue = avc_hash(ssid, tsid, tclass);
325 new->ae.ssid = ssid;
335 static inline struct avc_node *avc_search_node(security_id_t ssid,
344 hvalue = avc_hash(ssid, tsid, tclass);
347 (ssid != cur->ae.ssid ||
370 * @ssid: source security identifier
378 * (@ssid, @tsid), interpreting the permissions
383 static int avc_lookup(security_id_t ssid, security_id_t tsid,
391 node = avc_search_node(ssid, tsid, tclass, &probes);
408 * @ssid: source security identifier
415 * (@ssid, @tsid) and class @tclass.
425 static int avc_insert(security_id_t ssid, security_id_t tsid,
441 node = avc_claim_node(ssid, tsid, tclass);
637 * @ssid: source security identifier
641 static void avc_dump_query(security_id_t ssid, security_id_t tsid,
647 ssid->ctx, tsid->ctx);
654 void avc_audit(security_id_t ssid, security_id_t tsid,
685 avc_dump_query(ssid, tsid, tclass);
704 int avc_has_perm_noaudit(security_id_t ssid,
732 if (ae->ssid == ssid &&
746 rc = avc_lookup(ssid, tsid, tclass, requested, aeref);
748 rc = security_compute_av(ssid->ctx, tsid->ctx,
757 rc = avc_insert(ssid, tsid, tclass, &entry, aeref);
786 int avc_has_perm(security_id_t ssid, security_id_t tsid,
793 rc = avc_has_perm_noaudit(ssid, tsid, tclass, requested, aeref, &avd);
795 avc_audit(ssid, tsid, tclass, requested, &avd, rc, auditdata);
800 int avc_compute_create(security_id_t ssid, security_id_t tsid,
814 rc = avc_lookup(ssid, tsid, tclass, 0, &aeref);
817 rc = security_compute_av(ssid->ctx, tsid->ctx,
821 rc = avc_insert(ssid, tsid, tclass, &entry, &aeref);
829 rc = security_compute_create(ssid->ctx, tsid->ctx, tclass,
850 int avc_add_callback(int (*callback) (uint32_t event, security_id_t ssid,
855 uint32_t events, security_id_t ssid,
870 c->ssid = ssid;
911 static int avc_update_cache(uint32_t event, security_id_t ssid,
920 if (ssid == SECSID_WILD || tsid == SECSID_WILD) {
924 if (avc_sidcmp(ssid, node->ae.ssid) &&
933 node = avc_search_node(ssid, tsid, tclass, 0);
949 static int avc_control(uint32_t event, security_id_t ssid,
966 avc_update_cache(event, ssid, tsid, tclass, perms);
970 avc_sidcmp(c->ssid, ssid) &&
974 ret = c->callback(event, ssid, tsid, tclass,
988 avc_update_cache(event, ssid, tsid, tclass, perms);
1003 * @ssid: source security identifier or %SECSID_WILD
1009 int avc_ss_grant(security_id_t ssid, security_id_t tsid,
1014 ssid, tsid, tclass, perms, seqno, 0);
1019 * @ssid: source security identifier or %SECSID_WILD
1030 int avc_ss_try_revoke(security_id_t ssid, security_id_t tsid,
1036 ssid, tsid, tclass, perms, seqno, out_retained);
1041 * @ssid: source security identifier or %SECSID_WILD
1050 int avc_ss_revoke(security_id_t ssid, security_id_t tsid,
1055 ssid, tsid, tclass, perms, seqno, 0);
1078 * @ssid: source security identifier or %SECSID_WILD
1085 int avc_ss_set_auditallow(security_id_t ssid, security_id_t tsid,
1091 ssid, tsid, tclass, perms, seqno, 0);
1094 ssid, tsid, tclass, perms, seqno, 0);
1099 * @ssid: source security identifier or %SECSID_WILD
1106 int avc_ss_set_auditdeny(security_id_t ssid, security_id_t tsid,
1112 ssid, tsid, tclass, perms, seqno, 0);
1115 ssid, tsid, tclass, perms, seqno, 0);