^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1) /* SPDX-License-Identifier: GPL-2.0 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3) * Access vector cache interface for the security server.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 4) *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 5) * Author : Stephen Smalley, <sds@tycho.nsa.gov>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 6) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 7) #ifndef _SELINUX_AVC_SS_H_
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 8) #define _SELINUX_AVC_SS_H_
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 9)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 10) #include "flask.h"
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 11)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 12) struct selinux_avc;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 13) int avc_ss_reset(struct selinux_avc *avc, u32 seqno);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 14)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 15) /* Class/perm mapping support */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 16) struct security_class_mapping {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 17) const char *name;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 18) const char *perms[sizeof(u32) * 8 + 1];
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 19) };
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 20)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 21) extern struct security_class_mapping secclass_map[];
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 22)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 23) #endif /* _SELINUX_AVC_SS_H_ */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 24)