policydb 67 security/selinux/ss/avtab.h struct policydb; policydb 190 security/selinux/ss/conditional.c struct policydb *p; policydb 253 security/selinux/ss/conditional.c struct policydb *p; policydb 262 security/selinux/ss/conditional.c struct policydb *p = data->p; policydb 48 security/selinux/ss/mls.c len += strlen(policydb.p_sens_val_to_name[index_sens - 1]); policydb 58 security/selinux/ss/mls.c nm = policydb.p_cat_val_to_name[prev]; policydb 61 security/selinux/ss/mls.c nm = policydb.p_cat_val_to_name[i]; policydb 68 security/selinux/ss/mls.c nm = policydb.p_cat_val_to_name[prev]; policydb 106 security/selinux/ss/mls.c policydb.p_sens_val_to_name[context->range.level[l].sens - 1]); policydb 121 security/selinux/ss/mls.c nm = policydb.p_cat_val_to_name[prev]; policydb 129 security/selinux/ss/mls.c nm = policydb.p_cat_val_to_name[i]; policydb 142 security/selinux/ss/mls.c nm = policydb.p_cat_val_to_name[prev]; policydb 399 security/selinux/ss/mls.c rc = mls_context_to_sid(&policydb, ':', &tmpstr, context, policydb 524 security/selinux/ss/mls.c for (rtr = policydb.range_tr; rtr; rtr = rtr->next) { policydb 231 security/selinux/ss/policydb.c struct policydb *p; policydb 244 security/selinux/ss/policydb.c struct policydb *p; policydb 258 security/selinux/ss/policydb.c struct policydb *p; policydb 274 security/selinux/ss/policydb.c struct policydb *p; policydb 294 security/selinux/ss/policydb.c struct policydb *p; policydb 310 security/selinux/ss/policydb.c struct policydb *p; policydb 328 security/selinux/ss/policydb.c struct policydb *p; policydb 1502 security/selinux/ss/policydb.c static int (*read_f[SYM_NUM]) (struct policydb *p, struct hashtab *h, void *fp) = policydb 1517 security/selinux/ss/policydb.c struct policydb *p = datap; policydb 1554 security/selinux/ss/policydb.c struct policydb *p = datap; policydb 1591 security/selinux/ss/policydb.c struct policydb *p = datap; policydb 76 security/selinux/ss/services.c struct policydb policydb; policydb 151 security/selinux/ss/services.c r1 = policydb.role_val_to_struct[val1 - 1]; policydb 152 security/selinux/ss/services.c r2 = policydb.role_val_to_struct[val2 - 1]; policydb 295 security/selinux/ss/services.c = policydb.type_val_to_struct[scontext->type - 1]; policydb 297 security/selinux/ss/services.c = policydb.type_val_to_struct[tcontext->type - 1]; policydb 352 security/selinux/ss/services.c = policydb.p_type_val_to_name[source->value - 1]; policydb 354 security/selinux/ss/services.c = policydb.p_type_val_to_name[target->value - 1]; policydb 356 security/selinux/ss/services.c = policydb.p_class_val_to_name[tclass - 1]; policydb 424 security/selinux/ss/services.c if (unlikely(tclass > policydb.p_classes.nprim)) policydb 427 security/selinux/ss/services.c !policydb.allow_unknown) policydb 434 security/selinux/ss/services.c if (tclass <= kdefs->cts_len && policydb.allow_unknown) policydb 435 security/selinux/ss/services.c avd->allowed = policydb.undefined_perms[tclass - 1]; policydb 440 security/selinux/ss/services.c if (unlikely(tclass > policydb.p_classes.nprim)) policydb 443 security/selinux/ss/services.c tclass_datum = policydb.class_val_to_struct[tclass - 1]; policydb 451 security/selinux/ss/services.c sattr = &policydb.type_attr_map[scontext->type - 1]; policydb 452 security/selinux/ss/services.c tattr = &policydb.type_attr_map[tcontext->type - 1]; policydb 457 security/selinux/ss/services.c for (node = avtab_search_node(&policydb.te_avtab, &avkey); policydb 469 security/selinux/ss/services.c cond_compute_av(&policydb.te_cond_avtab, &avkey, avd); policydb 496 security/selinux/ss/services.c for (ra = policydb.role_allow; ra; ra = ra->next) { policydb 551 security/selinux/ss/services.c rc = ebitmap_get_bit(&policydb.permissive_map, type); policydb 574 security/selinux/ss/services.c o, n, t, policydb.p_class_val_to_name[tclass-1]); policydb 611 security/selinux/ss/services.c if (!tclass || tclass > policydb.p_classes.nprim) { policydb 617 security/selinux/ss/services.c tclass_datum = policydb.class_val_to_struct[tclass - 1]; policydb 699 security/selinux/ss/services.c type = policydb.type_val_to_struct[index - 1]; policydb 800 security/selinux/ss/services.c *scontext_len += strlen(policydb.p_user_val_to_name[context->user - 1]) + 1; policydb 801 security/selinux/ss/services.c *scontext_len += strlen(policydb.p_role_val_to_name[context->role - 1]) + 1; policydb 802 security/selinux/ss/services.c *scontext_len += strlen(policydb.p_type_val_to_name[context->type - 1]) + 1; policydb 815 security/selinux/ss/services.c policydb.p_user_val_to_name[context->user - 1], policydb 816 security/selinux/ss/services.c policydb.p_role_val_to_name[context->role - 1], policydb 817 security/selinux/ss/services.c policydb.p_type_val_to_name[context->type - 1]); policydb 818 security/selinux/ss/services.c scontextp += strlen(policydb.p_user_val_to_name[context->user - 1]) + policydb 819 security/selinux/ss/services.c 1 + strlen(policydb.p_role_val_to_name[context->role - 1]) + policydb 820 security/selinux/ss/services.c 1 + strlen(policydb.p_type_val_to_name[context->type - 1]); policydb 1032 security/selinux/ss/services.c rc = string_to_context_struct(&policydb, &sidtab, policydb 1119 security/selinux/ss/services.c n, s, t, policydb.p_class_val_to_name[tclass-1]); policydb 1205 security/selinux/ss/services.c avdatum = avtab_search(&policydb.te_avtab, &avkey); policydb 1209 security/selinux/ss/services.c node = avtab_search_node(&policydb.te_cond_avtab, &avkey); policydb 1228 security/selinux/ss/services.c for (roletr = policydb.role_tr; roletr; policydb 1250 security/selinux/ss/services.c if (!policydb_context_isvalid(&policydb, &newcontext)) { policydb 1498 security/selinux/ss/services.c struct policydb *oldp; policydb 1499 security/selinux/ss/services.c struct policydb *newp; policydb 1614 security/selinux/ss/services.c selinux_policycap_netpeer = ebitmap_get_bit(&policydb.policycaps, policydb 1616 security/selinux/ss/services.c selinux_policycap_openperm = ebitmap_get_bit(&policydb.policycaps, policydb 1635 security/selinux/ss/services.c struct policydb oldpolicydb, newpolicydb; policydb 1644 security/selinux/ss/services.c if (policydb_read(&policydb, fp)) { policydb 1648 security/selinux/ss/services.c if (policydb_load_isids(&policydb, &sidtab)) { policydb 1649 security/selinux/ss/services.c policydb_destroy(&policydb); policydb 1654 security/selinux/ss/services.c if (validate_classes(&policydb)) { policydb 1658 security/selinux/ss/services.c policydb_destroy(&policydb); policydb 1663 security/selinux/ss/services.c policydb_loaded_version = policydb.policyvers; policydb 1711 security/selinux/ss/services.c args.oldp = &policydb; policydb 1718 security/selinux/ss/services.c memcpy(&oldpolicydb, &policydb, sizeof policydb); policydb 1723 security/selinux/ss/services.c memcpy(&policydb, &newpolicydb, sizeof policydb); policydb 1727 security/selinux/ss/services.c policydb_loaded_version = policydb.policyvers; policydb 1761 security/selinux/ss/services.c c = policydb.ocontexts[OCON_PORT]; policydb 1800 security/selinux/ss/services.c c = policydb.ocontexts[OCON_NETIF]; policydb 1870 security/selinux/ss/services.c c = policydb.ocontexts[OCON_NODE]; policydb 1884 security/selinux/ss/services.c c = policydb.ocontexts[OCON_NODE6]; policydb 1961 security/selinux/ss/services.c user = hashtab_search(policydb.p_users.table, username); policydb 1975 security/selinux/ss/services.c role = policydb.role_val_to_struct[i]; policydb 2059 security/selinux/ss/services.c for (genfs = policydb.genfs; genfs; genfs = genfs->next) { policydb 2114 security/selinux/ss/services.c c = policydb.ocontexts[OCON_FSUSE]; policydb 2154 security/selinux/ss/services.c *len = policydb.p_bools.nprim; policydb 2170 security/selinux/ss/services.c (*values)[i] = policydb.bool_val_to_struct[i]->state; policydb 2171 security/selinux/ss/services.c name_len = strlen(policydb.p_bool_val_to_name[i]) + 1; policydb 2175 security/selinux/ss/services.c strncpy((*names)[i], policydb.p_bool_val_to_name[i], name_len); policydb 2200 security/selinux/ss/services.c lenp = policydb.p_bools.nprim; policydb 2207 security/selinux/ss/services.c if (!!values[i] != policydb.bool_val_to_struct[i]->state) { policydb 2211 security/selinux/ss/services.c policydb.p_bool_val_to_name[i], policydb 2213 security/selinux/ss/services.c policydb.bool_val_to_struct[i]->state, policydb 2218 security/selinux/ss/services.c policydb.bool_val_to_struct[i]->state = 1; policydb 2220 security/selinux/ss/services.c policydb.bool_val_to_struct[i]->state = 0; policydb 2223 security/selinux/ss/services.c for (cur = policydb.cond_list; cur; cur = cur->next) { policydb 2224 security/selinux/ss/services.c rc = evaluate_cond_node(&policydb, cur); policydb 2248 security/selinux/ss/services.c len = policydb.p_bools.nprim; policydb 2254 security/selinux/ss/services.c rc = policydb.bool_val_to_struct[bool]->state; policydb 2336 security/selinux/ss/services.c if (!policydb_context_isvalid(&policydb, &newcon)) { policydb 2461 security/selinux/ss/services.c *nclasses = policydb.p_classes.nprim; policydb 2466 security/selinux/ss/services.c rc = hashtab_map(policydb.p_classes.table, get_classes_callback, policydb 2500 security/selinux/ss/services.c match = hashtab_search(policydb.p_classes.table, class); policydb 2539 security/selinux/ss/services.c return policydb.reject_unknown; policydb 2544 security/selinux/ss/services.c return policydb.allow_unknown; policydb 2562 security/selinux/ss/services.c rc = ebitmap_get_bit(&policydb.policycaps, req_cap); policydb 2634 security/selinux/ss/services.c userdatum = hashtab_search(policydb.p_users.table, rulestr); policydb 2642 security/selinux/ss/services.c roledatum = hashtab_search(policydb.p_roles.table, rulestr); policydb 2650 security/selinux/ss/services.c typedatum = hashtab_search(policydb.p_types.table, rulestr); policydb 2923 security/selinux/ss/services.c if (mls_context_isvalid(&policydb, &ctx_new) != 1) policydb 2970 security/selinux/ss/services.c secattr->domain = kstrdup(policydb.p_type_val_to_name[ctx->type - 1], policydb 12 security/selinux/ss/services.h extern struct policydb policydb;