policydb 67 security/selinux/ss/avtab.h struct policydb;
policydb 190 security/selinux/ss/conditional.c struct policydb *p;
policydb 253 security/selinux/ss/conditional.c struct policydb *p;
policydb 262 security/selinux/ss/conditional.c struct policydb *p = data->p;
policydb 48 security/selinux/ss/mls.c len += strlen(policydb.p_sens_val_to_name[index_sens - 1]);
policydb 58 security/selinux/ss/mls.c nm = policydb.p_cat_val_to_name[prev];
policydb 61 security/selinux/ss/mls.c nm = policydb.p_cat_val_to_name[i];
policydb 68 security/selinux/ss/mls.c nm = policydb.p_cat_val_to_name[prev];
policydb 106 security/selinux/ss/mls.c policydb.p_sens_val_to_name[context->range.level[l].sens - 1]);
policydb 121 security/selinux/ss/mls.c nm = policydb.p_cat_val_to_name[prev];
policydb 129 security/selinux/ss/mls.c nm = policydb.p_cat_val_to_name[i];
policydb 142 security/selinux/ss/mls.c nm = policydb.p_cat_val_to_name[prev];
policydb 399 security/selinux/ss/mls.c rc = mls_context_to_sid(&policydb, ':', &tmpstr, context,
policydb 524 security/selinux/ss/mls.c for (rtr = policydb.range_tr; rtr; rtr = rtr->next) {
policydb 231 security/selinux/ss/policydb.c struct policydb *p;
policydb 244 security/selinux/ss/policydb.c struct policydb *p;
policydb 258 security/selinux/ss/policydb.c struct policydb *p;
policydb 274 security/selinux/ss/policydb.c struct policydb *p;
policydb 294 security/selinux/ss/policydb.c struct policydb *p;
policydb 310 security/selinux/ss/policydb.c struct policydb *p;
policydb 328 security/selinux/ss/policydb.c struct policydb *p;
policydb 1502 security/selinux/ss/policydb.c static int (*read_f[SYM_NUM]) (struct policydb *p, struct hashtab *h, void *fp) =
policydb 1517 security/selinux/ss/policydb.c struct policydb *p = datap;
policydb 1554 security/selinux/ss/policydb.c struct policydb *p = datap;
policydb 1591 security/selinux/ss/policydb.c struct policydb *p = datap;
policydb 76 security/selinux/ss/services.c struct policydb policydb;
policydb 151 security/selinux/ss/services.c r1 = policydb.role_val_to_struct[val1 - 1];
policydb 152 security/selinux/ss/services.c r2 = policydb.role_val_to_struct[val2 - 1];
policydb 295 security/selinux/ss/services.c = policydb.type_val_to_struct[scontext->type - 1];
policydb 297 security/selinux/ss/services.c = policydb.type_val_to_struct[tcontext->type - 1];
policydb 352 security/selinux/ss/services.c = policydb.p_type_val_to_name[source->value - 1];
policydb 354 security/selinux/ss/services.c = policydb.p_type_val_to_name[target->value - 1];
policydb 356 security/selinux/ss/services.c = policydb.p_class_val_to_name[tclass - 1];
policydb 424 security/selinux/ss/services.c if (unlikely(tclass > policydb.p_classes.nprim))
policydb 427 security/selinux/ss/services.c !policydb.allow_unknown)
policydb 434 security/selinux/ss/services.c if (tclass <= kdefs->cts_len && policydb.allow_unknown)
policydb 435 security/selinux/ss/services.c avd->allowed = policydb.undefined_perms[tclass - 1];
policydb 440 security/selinux/ss/services.c if (unlikely(tclass > policydb.p_classes.nprim))
policydb 443 security/selinux/ss/services.c tclass_datum = policydb.class_val_to_struct[tclass - 1];
policydb 451 security/selinux/ss/services.c sattr = &policydb.type_attr_map[scontext->type - 1];
policydb 452 security/selinux/ss/services.c tattr = &policydb.type_attr_map[tcontext->type - 1];
policydb 457 security/selinux/ss/services.c for (node = avtab_search_node(&policydb.te_avtab, &avkey);
policydb 469 security/selinux/ss/services.c cond_compute_av(&policydb.te_cond_avtab, &avkey, avd);
policydb 496 security/selinux/ss/services.c for (ra = policydb.role_allow; ra; ra = ra->next) {
policydb 551 security/selinux/ss/services.c rc = ebitmap_get_bit(&policydb.permissive_map, type);
policydb 574 security/selinux/ss/services.c o, n, t, policydb.p_class_val_to_name[tclass-1]);
policydb 611 security/selinux/ss/services.c if (!tclass || tclass > policydb.p_classes.nprim) {
policydb 617 security/selinux/ss/services.c tclass_datum = policydb.class_val_to_struct[tclass - 1];
policydb 699 security/selinux/ss/services.c type = policydb.type_val_to_struct[index - 1];
policydb 800 security/selinux/ss/services.c *scontext_len += strlen(policydb.p_user_val_to_name[context->user - 1]) + 1;
policydb 801 security/selinux/ss/services.c *scontext_len += strlen(policydb.p_role_val_to_name[context->role - 1]) + 1;
policydb 802 security/selinux/ss/services.c *scontext_len += strlen(policydb.p_type_val_to_name[context->type - 1]) + 1;
policydb 815 security/selinux/ss/services.c policydb.p_user_val_to_name[context->user - 1],
policydb 816 security/selinux/ss/services.c policydb.p_role_val_to_name[context->role - 1],
policydb 817 security/selinux/ss/services.c policydb.p_type_val_to_name[context->type - 1]);
policydb 818 security/selinux/ss/services.c scontextp += strlen(policydb.p_user_val_to_name[context->user - 1]) +
policydb 819 security/selinux/ss/services.c 1 + strlen(policydb.p_role_val_to_name[context->role - 1]) +
policydb 820 security/selinux/ss/services.c 1 + strlen(policydb.p_type_val_to_name[context->type - 1]);
policydb 1032 security/selinux/ss/services.c rc = string_to_context_struct(&policydb, &sidtab,
policydb 1119 security/selinux/ss/services.c n, s, t, policydb.p_class_val_to_name[tclass-1]);
policydb 1205 security/selinux/ss/services.c avdatum = avtab_search(&policydb.te_avtab, &avkey);
policydb 1209 security/selinux/ss/services.c node = avtab_search_node(&policydb.te_cond_avtab, &avkey);
policydb 1228 security/selinux/ss/services.c for (roletr = policydb.role_tr; roletr;
policydb 1250 security/selinux/ss/services.c if (!policydb_context_isvalid(&policydb, &newcontext)) {
policydb 1498 security/selinux/ss/services.c struct policydb *oldp;
policydb 1499 security/selinux/ss/services.c struct policydb *newp;
policydb 1614 security/selinux/ss/services.c selinux_policycap_netpeer = ebitmap_get_bit(&policydb.policycaps,
policydb 1616 security/selinux/ss/services.c selinux_policycap_openperm = ebitmap_get_bit(&policydb.policycaps,
policydb 1635 security/selinux/ss/services.c struct policydb oldpolicydb, newpolicydb;
policydb 1644 security/selinux/ss/services.c if (policydb_read(&policydb, fp)) {
policydb 1648 security/selinux/ss/services.c if (policydb_load_isids(&policydb, &sidtab)) {
policydb 1649 security/selinux/ss/services.c policydb_destroy(&policydb);
policydb 1654 security/selinux/ss/services.c if (validate_classes(&policydb)) {
policydb 1658 security/selinux/ss/services.c policydb_destroy(&policydb);
policydb 1663 security/selinux/ss/services.c policydb_loaded_version = policydb.policyvers;
policydb 1711 security/selinux/ss/services.c args.oldp = &policydb;
policydb 1718 security/selinux/ss/services.c memcpy(&oldpolicydb, &policydb, sizeof policydb);
policydb 1723 security/selinux/ss/services.c memcpy(&policydb, &newpolicydb, sizeof policydb);
policydb 1727 security/selinux/ss/services.c policydb_loaded_version = policydb.policyvers;
policydb 1761 security/selinux/ss/services.c c = policydb.ocontexts[OCON_PORT];
policydb 1800 security/selinux/ss/services.c c = policydb.ocontexts[OCON_NETIF];
policydb 1870 security/selinux/ss/services.c c = policydb.ocontexts[OCON_NODE];
policydb 1884 security/selinux/ss/services.c c = policydb.ocontexts[OCON_NODE6];
policydb 1961 security/selinux/ss/services.c user = hashtab_search(policydb.p_users.table, username);
policydb 1975 security/selinux/ss/services.c role = policydb.role_val_to_struct[i];
policydb 2059 security/selinux/ss/services.c for (genfs = policydb.genfs; genfs; genfs = genfs->next) {
policydb 2114 security/selinux/ss/services.c c = policydb.ocontexts[OCON_FSUSE];
policydb 2154 security/selinux/ss/services.c *len = policydb.p_bools.nprim;
policydb 2170 security/selinux/ss/services.c (*values)[i] = policydb.bool_val_to_struct[i]->state;
policydb 2171 security/selinux/ss/services.c name_len = strlen(policydb.p_bool_val_to_name[i]) + 1;
policydb 2175 security/selinux/ss/services.c strncpy((*names)[i], policydb.p_bool_val_to_name[i], name_len);
policydb 2200 security/selinux/ss/services.c lenp = policydb.p_bools.nprim;
policydb 2207 security/selinux/ss/services.c if (!!values[i] != policydb.bool_val_to_struct[i]->state) {
policydb 2211 security/selinux/ss/services.c policydb.p_bool_val_to_name[i],
policydb 2213 security/selinux/ss/services.c policydb.bool_val_to_struct[i]->state,
policydb 2218 security/selinux/ss/services.c policydb.bool_val_to_struct[i]->state = 1;
policydb 2220 security/selinux/ss/services.c policydb.bool_val_to_struct[i]->state = 0;
policydb 2223 security/selinux/ss/services.c for (cur = policydb.cond_list; cur; cur = cur->next) {
policydb 2224 security/selinux/ss/services.c rc = evaluate_cond_node(&policydb, cur);
policydb 2248 security/selinux/ss/services.c len = policydb.p_bools.nprim;
policydb 2254 security/selinux/ss/services.c rc = policydb.bool_val_to_struct[bool]->state;
policydb 2336 security/selinux/ss/services.c if (!policydb_context_isvalid(&policydb, &newcon)) {
policydb 2461 security/selinux/ss/services.c *nclasses = policydb.p_classes.nprim;
policydb 2466 security/selinux/ss/services.c rc = hashtab_map(policydb.p_classes.table, get_classes_callback,
policydb 2500 security/selinux/ss/services.c match = hashtab_search(policydb.p_classes.table, class);
policydb 2539 security/selinux/ss/services.c return policydb.reject_unknown;
policydb 2544 security/selinux/ss/services.c return policydb.allow_unknown;
policydb 2562 security/selinux/ss/services.c rc = ebitmap_get_bit(&policydb.policycaps, req_cap);
policydb 2634 security/selinux/ss/services.c userdatum = hashtab_search(policydb.p_users.table, rulestr);
policydb 2642 security/selinux/ss/services.c roledatum = hashtab_search(policydb.p_roles.table, rulestr);
policydb 2650 security/selinux/ss/services.c typedatum = hashtab_search(policydb.p_types.table, rulestr);
policydb 2923 security/selinux/ss/services.c if (mls_context_isvalid(&policydb, &ctx_new) != 1)
policydb 2970 security/selinux/ss/services.c secattr->domain = kstrdup(policydb.p_type_val_to_name[ctx->type - 1],
policydb 12 security/selinux/ss/services.h extern struct policydb policydb;