Home | History | Annotate | Download | only in src

Lines Matching full:ssid

20 	security_id_t ssid;
41 int (*callback) (uint32_t event, security_id_t ssid,
46 security_id_t ssid;
63 static inline int avc_hash(security_id_t ssid,
66 return ((uintptr_t) ssid ^ ((uintptr_t) tsid << 2) ^ tclass)
302 static inline struct avc_node *avc_claim_node(security_id_t ssid,
322 hvalue = avc_hash(ssid, tsid, tclass);
325 new->ae.ssid = ssid;
335 static inline struct avc_node *avc_search_node(security_id_t ssid,
344 hvalue = avc_hash(ssid, tsid, tclass);
347 (ssid != cur->ae.ssid ||
370 * @ssid: source security identifier
378 * (@ssid, @tsid), interpreting the permissions
383 static int avc_lookup(security_id_t ssid, security_id_t tsid,
391 node = avc_search_node(ssid, tsid, tclass, &probes);
408 * @ssid: source security identifier
415 * (@ssid, @tsid) and class @tclass.
425 static int avc_insert(security_id_t ssid, security_id_t tsid,
441 node = avc_claim_node(ssid, tsid, tclass);
637 * @ssid: source security identifier
641 static void avc_dump_query(security_id_t ssid, security_id_t tsid,
647 ssid->ctx, tsid->ctx);
654 void avc_audit(security_id_t ssid, security_id_t tsid,
685 avc_dump_query(ssid, tsid, tclass);
709 int avc_has_perm_noaudit(security_id_t ssid,
737 if (ae->ssid == ssid &&
751 rc = avc_lookup(ssid, tsid, tclass, requested, aeref);
753 rc = security_compute_av(ssid->ctx, tsid->ctx,
762 rc = avc_insert(ssid, tsid, tclass, &entry, aeref);
791 int avc_has_perm(security_id_t ssid, security_id_t tsid,
798 rc = avc_has_perm_noaudit(ssid, tsid, tclass, requested, aeref, &avd);
800 avc_audit(ssid, tsid, tclass, requested, &avd, rc, auditdata);
805 int avc_compute_create(security_id_t ssid, security_id_t tsid,
819 rc = avc_lookup(ssid, tsid, tclass, 0, &aeref);
822 rc = security_compute_av(ssid->ctx, tsid->ctx,
826 rc = avc_insert(ssid, tsid, tclass, &entry, &aeref);
834 rc = security_compute_create(ssid->ctx, tsid->ctx, tclass,
855 int avc_add_callback(int (*callback) (uint32_t event, security_id_t ssid,
860 uint32_t events, security_id_t ssid,
875 c->ssid = ssid;
916 static int avc_update_cache(uint32_t event, security_id_t ssid,
925 if (ssid == SECSID_WILD || tsid == SECSID_WILD) {
929 if (avc_sidcmp(ssid, node->ae.ssid) &&
938 node = avc_search_node(ssid, tsid, tclass, 0);
954 static int avc_control(uint32_t event, security_id_t ssid,
971 avc_update_cache(event, ssid, tsid, tclass, perms);
975 avc_sidcmp(c->ssid, ssid) &&
979 ret = c->callback(event, ssid, tsid, tclass,
993 avc_update_cache(event, ssid, tsid, tclass, perms);
1008 * @ssid: source security identifier or %SECSID_WILD
1014 int avc_ss_grant(security_id_t ssid, security_id_t tsid,
1019 ssid, tsid, tclass, perms, seqno, 0);
1024 * @ssid: source security identifier or %SECSID_WILD
1035 int avc_ss_try_revoke(security_id_t ssid, security_id_t tsid,
1041 ssid, tsid, tclass, perms, seqno, out_retained);
1046 * @ssid: source security identifier or %SECSID_WILD
1055 int avc_ss_revoke(security_id_t ssid, security_id_t tsid,
1060 ssid, tsid, tclass, perms, seqno, 0);
1083 * @ssid: source security identifier or %SECSID_WILD
1090 int avc_ss_set_auditallow(security_id_t ssid, security_id_t tsid,
1096 ssid, tsid, tclass, perms, seqno, 0);
1099 ssid, tsid, tclass, perms, seqno, 0);
1104 * @ssid: source security identifier or %SECSID_WILD
1111 int avc_ss_set_auditdeny(security_id_t ssid, security_id_t tsid,
1117 ssid, tsid, tclass, perms, seqno, 0);
1120 ssid, tsid, tclass, perms, seqno, 0);