policydb           67 security/selinux/ss/avtab.h struct policydb;
policydb          190 security/selinux/ss/conditional.c 	struct policydb *p;
policydb          253 security/selinux/ss/conditional.c 	struct policydb *p;
policydb          262 security/selinux/ss/conditional.c 	struct policydb *p = data->p;
policydb           48 security/selinux/ss/mls.c 		len += strlen(policydb.p_sens_val_to_name[index_sens - 1]);
policydb           58 security/selinux/ss/mls.c 					nm = policydb.p_cat_val_to_name[prev];
policydb           61 security/selinux/ss/mls.c 				nm = policydb.p_cat_val_to_name[i];
policydb           68 security/selinux/ss/mls.c 			nm = policydb.p_cat_val_to_name[prev];
policydb          106 security/selinux/ss/mls.c 		       policydb.p_sens_val_to_name[context->range.level[l].sens - 1]);
policydb          121 security/selinux/ss/mls.c 					nm = policydb.p_cat_val_to_name[prev];
policydb          129 security/selinux/ss/mls.c 				nm = policydb.p_cat_val_to_name[i];
policydb          142 security/selinux/ss/mls.c 			nm = policydb.p_cat_val_to_name[prev];
policydb          399 security/selinux/ss/mls.c 		rc = mls_context_to_sid(&policydb, ':', &tmpstr, context,
policydb          524 security/selinux/ss/mls.c 		for (rtr = policydb.range_tr; rtr; rtr = rtr->next) {
policydb          231 security/selinux/ss/policydb.c 	struct policydb *p;
policydb          244 security/selinux/ss/policydb.c 	struct policydb *p;
policydb          258 security/selinux/ss/policydb.c 	struct policydb *p;
policydb          274 security/selinux/ss/policydb.c 	struct policydb *p;
policydb          294 security/selinux/ss/policydb.c 	struct policydb *p;
policydb          310 security/selinux/ss/policydb.c 	struct policydb *p;
policydb          328 security/selinux/ss/policydb.c 	struct policydb *p;
policydb         1502 security/selinux/ss/policydb.c static int (*read_f[SYM_NUM]) (struct policydb *p, struct hashtab *h, void *fp) =
policydb         1517 security/selinux/ss/policydb.c 	struct policydb *p = datap;
policydb         1554 security/selinux/ss/policydb.c 	struct policydb *p = datap;
policydb         1591 security/selinux/ss/policydb.c 	struct policydb *p = datap;
policydb           76 security/selinux/ss/services.c struct policydb policydb;
policydb          151 security/selinux/ss/services.c 				r1 = policydb.role_val_to_struct[val1 - 1];
policydb          152 security/selinux/ss/services.c 				r2 = policydb.role_val_to_struct[val2 - 1];
policydb          295 security/selinux/ss/services.c 		= policydb.type_val_to_struct[scontext->type - 1];
policydb          297 security/selinux/ss/services.c 		= policydb.type_val_to_struct[tcontext->type - 1];
policydb          352 security/selinux/ss/services.c 			= policydb.p_type_val_to_name[source->value - 1];
policydb          354 security/selinux/ss/services.c 			= policydb.p_type_val_to_name[target->value - 1];
policydb          356 security/selinux/ss/services.c 			= policydb.p_class_val_to_name[tclass - 1];
policydb          424 security/selinux/ss/services.c 	if (unlikely(tclass > policydb.p_classes.nprim))
policydb          427 security/selinux/ss/services.c 		    !policydb.allow_unknown)
policydb          434 security/selinux/ss/services.c 	if (tclass <= kdefs->cts_len && policydb.allow_unknown)
policydb          435 security/selinux/ss/services.c 		avd->allowed = policydb.undefined_perms[tclass - 1];
policydb          440 security/selinux/ss/services.c 	if (unlikely(tclass > policydb.p_classes.nprim))
policydb          443 security/selinux/ss/services.c 	tclass_datum = policydb.class_val_to_struct[tclass - 1];
policydb          451 security/selinux/ss/services.c 	sattr = &policydb.type_attr_map[scontext->type - 1];
policydb          452 security/selinux/ss/services.c 	tattr = &policydb.type_attr_map[tcontext->type - 1];
policydb          457 security/selinux/ss/services.c 			for (node = avtab_search_node(&policydb.te_avtab, &avkey);
policydb          469 security/selinux/ss/services.c 			cond_compute_av(&policydb.te_cond_avtab, &avkey, avd);
policydb          496 security/selinux/ss/services.c 		for (ra = policydb.role_allow; ra; ra = ra->next) {
policydb          551 security/selinux/ss/services.c 	rc = ebitmap_get_bit(&policydb.permissive_map, type);
policydb          574 security/selinux/ss/services.c 		  o, n, t, policydb.p_class_val_to_name[tclass-1]);
policydb          611 security/selinux/ss/services.c 	if (!tclass || tclass > policydb.p_classes.nprim) {
policydb          617 security/selinux/ss/services.c 	tclass_datum = policydb.class_val_to_struct[tclass - 1];
policydb          699 security/selinux/ss/services.c 		type = policydb.type_val_to_struct[index - 1];
policydb          800 security/selinux/ss/services.c 	*scontext_len += strlen(policydb.p_user_val_to_name[context->user - 1]) + 1;
policydb          801 security/selinux/ss/services.c 	*scontext_len += strlen(policydb.p_role_val_to_name[context->role - 1]) + 1;
policydb          802 security/selinux/ss/services.c 	*scontext_len += strlen(policydb.p_type_val_to_name[context->type - 1]) + 1;
policydb          815 security/selinux/ss/services.c 		policydb.p_user_val_to_name[context->user - 1],
policydb          816 security/selinux/ss/services.c 		policydb.p_role_val_to_name[context->role - 1],
policydb          817 security/selinux/ss/services.c 		policydb.p_type_val_to_name[context->type - 1]);
policydb          818 security/selinux/ss/services.c 	scontextp += strlen(policydb.p_user_val_to_name[context->user - 1]) +
policydb          819 security/selinux/ss/services.c 		     1 + strlen(policydb.p_role_val_to_name[context->role - 1]) +
policydb          820 security/selinux/ss/services.c 		     1 + strlen(policydb.p_type_val_to_name[context->type - 1]);
policydb         1032 security/selinux/ss/services.c 	rc = string_to_context_struct(&policydb, &sidtab,
policydb         1119 security/selinux/ss/services.c 		  n, s, t, policydb.p_class_val_to_name[tclass-1]);
policydb         1205 security/selinux/ss/services.c 	avdatum = avtab_search(&policydb.te_avtab, &avkey);
policydb         1209 security/selinux/ss/services.c 		node = avtab_search_node(&policydb.te_cond_avtab, &avkey);
policydb         1228 security/selinux/ss/services.c 			for (roletr = policydb.role_tr; roletr;
policydb         1250 security/selinux/ss/services.c 	if (!policydb_context_isvalid(&policydb, &newcontext)) {
policydb         1498 security/selinux/ss/services.c 	struct policydb *oldp;
policydb         1499 security/selinux/ss/services.c 	struct policydb *newp;
policydb         1614 security/selinux/ss/services.c 	selinux_policycap_netpeer = ebitmap_get_bit(&policydb.policycaps,
policydb         1616 security/selinux/ss/services.c 	selinux_policycap_openperm = ebitmap_get_bit(&policydb.policycaps,
policydb         1635 security/selinux/ss/services.c 	struct policydb oldpolicydb, newpolicydb;
policydb         1644 security/selinux/ss/services.c 		if (policydb_read(&policydb, fp)) {
policydb         1648 security/selinux/ss/services.c 		if (policydb_load_isids(&policydb, &sidtab)) {
policydb         1649 security/selinux/ss/services.c 			policydb_destroy(&policydb);
policydb         1654 security/selinux/ss/services.c 		if (validate_classes(&policydb)) {
policydb         1658 security/selinux/ss/services.c 			policydb_destroy(&policydb);
policydb         1663 security/selinux/ss/services.c 		policydb_loaded_version = policydb.policyvers;
policydb         1711 security/selinux/ss/services.c 	args.oldp = &policydb;
policydb         1718 security/selinux/ss/services.c 	memcpy(&oldpolicydb, &policydb, sizeof policydb);
policydb         1723 security/selinux/ss/services.c 	memcpy(&policydb, &newpolicydb, sizeof policydb);
policydb         1727 security/selinux/ss/services.c 	policydb_loaded_version = policydb.policyvers;
policydb         1761 security/selinux/ss/services.c 	c = policydb.ocontexts[OCON_PORT];
policydb         1800 security/selinux/ss/services.c 	c = policydb.ocontexts[OCON_NETIF];
policydb         1870 security/selinux/ss/services.c 		c = policydb.ocontexts[OCON_NODE];
policydb         1884 security/selinux/ss/services.c 		c = policydb.ocontexts[OCON_NODE6];
policydb         1961 security/selinux/ss/services.c 	user = hashtab_search(policydb.p_users.table, username);
policydb         1975 security/selinux/ss/services.c 		role = policydb.role_val_to_struct[i];
policydb         2059 security/selinux/ss/services.c 	for (genfs = policydb.genfs; genfs; genfs = genfs->next) {
policydb         2114 security/selinux/ss/services.c 	c = policydb.ocontexts[OCON_FSUSE];
policydb         2154 security/selinux/ss/services.c 	*len = policydb.p_bools.nprim;
policydb         2170 security/selinux/ss/services.c 		(*values)[i] = policydb.bool_val_to_struct[i]->state;
policydb         2171 security/selinux/ss/services.c 		name_len = strlen(policydb.p_bool_val_to_name[i]) + 1;
policydb         2175 security/selinux/ss/services.c 		strncpy((*names)[i], policydb.p_bool_val_to_name[i], name_len);
policydb         2200 security/selinux/ss/services.c 	lenp = policydb.p_bools.nprim;
policydb         2207 security/selinux/ss/services.c 		if (!!values[i] != policydb.bool_val_to_struct[i]->state) {
policydb         2211 security/selinux/ss/services.c 				policydb.p_bool_val_to_name[i],
policydb         2213 security/selinux/ss/services.c 				policydb.bool_val_to_struct[i]->state,
policydb         2218 security/selinux/ss/services.c 			policydb.bool_val_to_struct[i]->state = 1;
policydb         2220 security/selinux/ss/services.c 			policydb.bool_val_to_struct[i]->state = 0;
policydb         2223 security/selinux/ss/services.c 	for (cur = policydb.cond_list; cur; cur = cur->next) {
policydb         2224 security/selinux/ss/services.c 		rc = evaluate_cond_node(&policydb, cur);
policydb         2248 security/selinux/ss/services.c 	len = policydb.p_bools.nprim;
policydb         2254 security/selinux/ss/services.c 	rc = policydb.bool_val_to_struct[bool]->state;
policydb         2336 security/selinux/ss/services.c 	if (!policydb_context_isvalid(&policydb, &newcon)) {
policydb         2461 security/selinux/ss/services.c 	*nclasses = policydb.p_classes.nprim;
policydb         2466 security/selinux/ss/services.c 	rc = hashtab_map(policydb.p_classes.table, get_classes_callback,
policydb         2500 security/selinux/ss/services.c 	match = hashtab_search(policydb.p_classes.table, class);
policydb         2539 security/selinux/ss/services.c 	return policydb.reject_unknown;
policydb         2544 security/selinux/ss/services.c 	return policydb.allow_unknown;
policydb         2562 security/selinux/ss/services.c 	rc = ebitmap_get_bit(&policydb.policycaps, req_cap);
policydb         2634 security/selinux/ss/services.c 		userdatum = hashtab_search(policydb.p_users.table, rulestr);
policydb         2642 security/selinux/ss/services.c 		roledatum = hashtab_search(policydb.p_roles.table, rulestr);
policydb         2650 security/selinux/ss/services.c 		typedatum = hashtab_search(policydb.p_types.table, rulestr);
policydb         2923 security/selinux/ss/services.c 		if (mls_context_isvalid(&policydb, &ctx_new) != 1)
policydb         2970 security/selinux/ss/services.c 	secattr->domain = kstrdup(policydb.p_type_val_to_name[ctx->type - 1],
policydb           12 security/selinux/ss/services.h extern struct policydb policydb;