Symbol: policydb
security/selinux/ss/avtab.c
306
int avtab_read_item(struct avtab *a, struct policy_file *fp, struct policydb *pol,
security/selinux/ss/avtab.c
477
int avtab_read(struct avtab *a, struct policy_file *fp, struct policydb *pol)
security/selinux/ss/avtab.c
520
int avtab_write_item(struct policydb *p, const struct avtab_node *cur, struct policy_file *fp)
security/selinux/ss/avtab.c
556
int avtab_write(struct policydb *p, struct avtab *a, struct policy_file *fp)
security/selinux/ss/avtab.h
107
struct policydb;
security/selinux/ss/avtab.h
109
int avtab_read_item(struct avtab *a, struct policy_file *fp, struct policydb *pol,
security/selinux/ss/avtab.h
114
int avtab_read(struct avtab *a, struct policy_file *fp, struct policydb *pol);
security/selinux/ss/avtab.h
115
int avtab_write_item(struct policydb *p, const struct avtab_node *cur,
security/selinux/ss/avtab.h
117
int avtab_write(struct policydb *p, struct avtab *a, struct policy_file *fp);
security/selinux/ss/conditional.c
122
void evaluate_cond_nodes(struct policydb *p)
security/selinux/ss/conditional.c
130
void cond_policydb_init(struct policydb *p)
security/selinux/ss/conditional.c
147
static void cond_list_destroy(struct policydb *p)
security/selinux/ss/conditional.c
158
void cond_policydb_destroy(struct policydb *p)
security/selinux/ss/conditional.c
165
int cond_init_bool_indexes(struct policydb *p)
security/selinux/ss/conditional.c
187
struct policydb *p;
security/selinux/ss/conditional.c
209
int cond_read_bool(struct policydb *p, struct symtab *s, struct policy_file *fp)
security/selinux/ss/conditional.c
23
static int cond_evaluate_expr(struct policydb *p, struct cond_expr *expr)
security/selinux/ss/conditional.c
249
struct policydb *p;
security/selinux/ss/conditional.c
258
struct policydb *p = data->p;
security/selinux/ss/conditional.c
320
static int cond_read_av_list(struct policydb *p, struct policy_file *fp,
security/selinux/ss/conditional.c
358
static int expr_node_isvalid(struct policydb *p, struct cond_expr_node *expr)
security/selinux/ss/conditional.c
372
static int cond_read_node(struct policydb *p, struct cond_node *node, struct policy_file *fp)
security/selinux/ss/conditional.c
412
int cond_read_list(struct policydb *p, struct policy_file *fp)
security/selinux/ss/conditional.c
477
static int cond_write_av_list(struct policydb *p, struct cond_av_list *list,
security/selinux/ss/conditional.c
498
static int cond_write_node(struct policydb *p, struct cond_node *node,
security/selinux/ss/conditional.c
533
int cond_write_list(struct policydb *p, struct policy_file *fp)
security/selinux/ss/conditional.c
623
static int duplicate_policydb_cond_list(struct policydb *newp,
security/selinux/ss/conditional.c
624
const struct policydb *origp)
security/selinux/ss/conditional.c
706
static int duplicate_policydb_bools(struct policydb *newdb,
security/selinux/ss/conditional.c
707
const struct policydb *orig)
security/selinux/ss/conditional.c
732
void cond_policydb_destroy_dup(struct policydb *p)
security/selinux/ss/conditional.c
739
int cond_policydb_dup(struct policydb *new, const struct policydb *orig)
security/selinux/ss/conditional.c
91
static void evaluate_cond_node(struct policydb *p, struct cond_node *node)
security/selinux/ss/conditional.h
63
void cond_policydb_init(struct policydb *p);
security/selinux/ss/conditional.h
64
void cond_policydb_destroy(struct policydb *p);
security/selinux/ss/conditional.h
66
int cond_init_bool_indexes(struct policydb *p);
security/selinux/ss/conditional.h
71
int cond_read_bool(struct policydb *p, struct symtab *s, struct policy_file *fp);
security/selinux/ss/conditional.h
72
int cond_read_list(struct policydb *p, struct policy_file *fp);
security/selinux/ss/conditional.h
74
int cond_write_list(struct policydb *p, struct policy_file *fp);
security/selinux/ss/conditional.h
80
void evaluate_cond_nodes(struct policydb *p);
security/selinux/ss/conditional.h
81
void cond_policydb_destroy_dup(struct policydb *p);
security/selinux/ss/conditional.h
82
int cond_policydb_dup(struct policydb *new, const struct policydb *orig);
security/selinux/ss/mls.c
158
int mls_level_isvalid(struct policydb *p, struct mls_level *l)
security/selinux/ss/mls.c
178
int mls_range_isvalid(struct policydb *p, struct mls_range *r)
security/selinux/ss/mls.c
189
int mls_context_isvalid(struct policydb *p, struct context *c)
security/selinux/ss/mls.c
230
int mls_context_to_sid(struct policydb *pol, char oldc, char *scontext,
security/selinux/ss/mls.c
32
int mls_compute_context_len(struct policydb *p, struct context *context)
security/selinux/ss/mls.c
355
int mls_from_string(struct policydb *p, char *str, struct context *context,
security/selinux/ss/mls.c
395
int mls_setup_user_range(struct policydb *p, struct context *fromcon,
security/selinux/ss/mls.c
439
int mls_convert_context(struct policydb *oldp, struct policydb *newp,
security/selinux/ss/mls.c
480
int mls_compute_sid(struct policydb *p, struct context *scontext,
security/selinux/ss/mls.c
553
void mls_export_netlbl_lvl(struct policydb *p, struct context *context,
security/selinux/ss/mls.c
574
void mls_import_netlbl_lvl(struct policydb *p, struct context *context,
security/selinux/ss/mls.c
595
int mls_export_netlbl_cat(struct policydb *p, struct context *context,
security/selinux/ss/mls.c
624
int mls_import_netlbl_cat(struct policydb *p, struct context *context,
security/selinux/ss/mls.c
86
void mls_sid_to_context(struct policydb *p, struct context *context,
security/selinux/ss/mls.h
27
int mls_compute_context_len(struct policydb *p, struct context *context);
security/selinux/ss/mls.h
28
void mls_sid_to_context(struct policydb *p, struct context *context,
security/selinux/ss/mls.h
30
int mls_context_isvalid(struct policydb *p, struct context *c);
security/selinux/ss/mls.h
31
int mls_range_isvalid(struct policydb *p, struct mls_range *r);
security/selinux/ss/mls.h
32
int mls_level_isvalid(struct policydb *p, struct mls_level *l);
security/selinux/ss/mls.h
34
int mls_context_to_sid(struct policydb *p, char oldc, char *scontext,
security/selinux/ss/mls.h
37
int mls_from_string(struct policydb *p, char *str, struct context *context,
security/selinux/ss/mls.h
42
int mls_convert_context(struct policydb *oldp, struct policydb *newp,
security/selinux/ss/mls.h
45
int mls_compute_sid(struct policydb *p, struct context *scontext,
security/selinux/ss/mls.h
49
int mls_setup_user_range(struct policydb *p, struct context *fromcon,
security/selinux/ss/mls.h
53
void mls_export_netlbl_lvl(struct policydb *p, struct context *context,
security/selinux/ss/mls.h
55
void mls_import_netlbl_lvl(struct policydb *p, struct context *context,
security/selinux/ss/mls.h
57
int mls_export_netlbl_cat(struct policydb *p, struct context *context,
security/selinux/ss/mls.h
59
int mls_import_netlbl_cat(struct policydb *p, struct context *context,
security/selinux/ss/mls.h
62
static inline void mls_export_netlbl_lvl(struct policydb *p,
security/selinux/ss/mls.h
68
static inline void mls_import_netlbl_lvl(struct policydb *p,
security/selinux/ss/mls.h
74
static inline int mls_export_netlbl_cat(struct policydb *p,
security/selinux/ss/mls.h
80
static inline int mls_import_netlbl_cat(struct policydb *p,
security/selinux/ss/policydb.c
1063
static int context_read_and_validate(struct context *c, struct policydb *p,
security/selinux/ss/policydb.c
1125
static int perm_read(struct policydb *p, struct symtab *s, struct policy_file *fp)
security/selinux/ss/policydb.c
1158
static int common_read(struct policydb *p, struct symtab *s, struct policy_file *fp)
security/selinux/ss/policydb.c
1228
static int read_cons_helper(struct policydb *p, struct constraint_node **nodep,
security/selinux/ss/policydb.c
1321
static int class_read(struct policydb *p, struct symtab *s, struct policy_file *fp)
security/selinux/ss/policydb.c
1418
static int role_read(struct policydb *p, struct symtab *s, struct policy_file *fp)
security/selinux/ss/policydb.c
1475
static int type_read(struct policydb *p, struct symtab *s, struct policy_file *fp)
security/selinux/ss/policydb.c
1549
static int user_read(struct policydb *p, struct symtab *s, struct policy_file *fp)
security/selinux/ss/policydb.c
1600
static int sens_read(struct policydb *p, struct symtab *s, struct policy_file *fp)
security/selinux/ss/policydb.c
1636
static int cat_read(struct policydb *p, struct symtab *s, struct policy_file *fp)
security/selinux/ss/policydb.c
1670
static int (*const read_f[SYM_NUM])(struct policydb *p, struct symtab *s,
security/selinux/ss/policydb.c
1686
struct policydb *p = datap;
security/selinux/ss/policydb.c
1723
struct policydb *p = datap;
security/selinux/ss/policydb.c
1760
struct policydb *p = datap;
security/selinux/ss/policydb.c
1787
static int policydb_bounds_sanity_check(struct policydb *p)
security/selinux/ss/policydb.c
1809
u16 string_to_security_class(struct policydb *p, const char *name)
security/selinux/ss/policydb.c
1820
u32 string_to_av_perm(struct policydb *p, u16 tclass, const char *name)
security/selinux/ss/policydb.c
1841
static int range_read(struct policydb *p, struct policy_file *fp)
security/selinux/ss/policydb.c
1918
static int filename_trans_read_helper_compat(struct policydb *p, struct policy_file *fp)
security/selinux/ss/policydb.c
2003
static int filename_trans_read_helper(struct policydb *p, struct policy_file *fp)
security/selinux/ss/policydb.c
2092
static int filename_trans_read(struct policydb *p, struct policy_file *fp)
security/selinux/ss/policydb.c
2133
static int genfs_read(struct policydb *p, struct policy_file *fp)
security/selinux/ss/policydb.c
2246
static int ocontext_read(struct policydb *p,
security/selinux/ss/policydb.c
2444
int policydb_read(struct policydb *p, struct policy_file *fp)
security/selinux/ss/policydb.c
2882
struct policydb *p = pd->p;
security/selinux/ss/policydb.c
2901
static int role_trans_write(struct policydb *p, struct policy_file *fp)
security/selinux/ss/policydb.c
2943
static int context_write(struct policydb *p, struct context *c, struct policy_file *fp)
security/selinux/ss/policydb.c
3039
static int write_cons_helper(struct policydb *p, struct constraint_node *node,
security/selinux/ss/policydb.c
3092
struct policydb *p = pd->p;
security/selinux/ss/policydb.c
3177
struct policydb *p = pd->p;
security/selinux/ss/policydb.c
3215
struct policydb *p = pd->p;
security/selinux/ss/policydb.c
3256
struct policydb *p = pd->p;
security/selinux/ss/policydb.c
3305
static int ocontext_write(struct policydb *p,
security/selinux/ss/policydb.c
3443
static int genfs_write(struct policydb *p, struct policy_file *fp)
security/selinux/ss/policydb.c
3502
struct policydb *p = pd->p;
security/selinux/ss/policydb.c
3523
static int range_write(struct policydb *p, struct policy_file *fp)
security/selinux/ss/policydb.c
3632
static int filename_trans_write(struct policydb *p, struct policy_file *fp)
security/selinux/ss/policydb.c
3664
int policydb_write(struct policydb *p, struct policy_file *fp)
security/selinux/ss/policydb.c
387
static int roles_init(struct policydb *p)
security/selinux/ss/policydb.c
449
policydb_filenametr_search(struct policydb *p, struct filename_trans_key *key)
security/selinux/ss/policydb.c
485
struct mls_range *policydb_rangetr_search(struct policydb *p,
security/selinux/ss/policydb.c
520
struct role_trans_datum *policydb_roletr_search(struct policydb *p,
security/selinux/ss/policydb.c
529
static void policydb_init(struct policydb *p)
security/selinux/ss/policydb.c
554
struct policydb *p;
security/selinux/ss/policydb.c
569
struct policydb *p;
security/selinux/ss/policydb.c
584
struct policydb *p;
security/selinux/ss/policydb.c
600
struct policydb *p;
security/selinux/ss/policydb.c
619
struct policydb *p;
security/selinux/ss/policydb.c
635
struct policydb *p;
security/selinux/ss/policydb.c
654
struct policydb *p;
security/selinux/ss/policydb.c
721
static int policydb_index(struct policydb *p)
security/selinux/ss/policydb.c
783
void policydb_destroy(struct policydb *p)
security/selinux/ss/policydb.c
867
int policydb_load_isids(struct policydb *p, struct sidtab *s)
security/selinux/ss/policydb.c
934
int policydb_class_isvalid(struct policydb *p, unsigned int class)
security/selinux/ss/policydb.c
941
int policydb_role_isvalid(struct policydb *p, unsigned int role)
security/selinux/ss/policydb.c
948
int policydb_type_isvalid(struct policydb *p, unsigned int type)
security/selinux/ss/policydb.c
959
int policydb_context_isvalid(struct policydb *p, struct context *c)
security/selinux/ss/policydb.h
322
extern void policydb_destroy(struct policydb *p);
security/selinux/ss/policydb.h
323
extern int policydb_load_isids(struct policydb *p, struct sidtab *s);
security/selinux/ss/policydb.h
324
extern int policydb_context_isvalid(struct policydb *p, struct context *c);
security/selinux/ss/policydb.h
325
extern int policydb_class_isvalid(struct policydb *p, unsigned int class);
security/selinux/ss/policydb.h
326
extern int policydb_type_isvalid(struct policydb *p, unsigned int type);
security/selinux/ss/policydb.h
327
extern int policydb_role_isvalid(struct policydb *p, unsigned int role);
security/selinux/ss/policydb.h
328
extern int policydb_read(struct policydb *p, struct policy_file *fp);
security/selinux/ss/policydb.h
329
extern int policydb_write(struct policydb *p, struct policy_file *fp);
security/selinux/ss/policydb.h
332
policydb_filenametr_search(struct policydb *p, struct filename_trans_key *key);
security/selinux/ss/policydb.h
334
extern struct mls_range *policydb_rangetr_search(struct policydb *p,
security/selinux/ss/policydb.h
338
policydb_roletr_search(struct policydb *p, struct role_trans_key *key);
security/selinux/ss/policydb.h
353
struct policydb *p;
security/selinux/ss/policydb.h
385
static inline char *sym_name(struct policydb *p, unsigned int sym_num,
security/selinux/ss/policydb.h
393
extern u16 string_to_security_class(struct policydb *p, const char *name);
security/selinux/ss/policydb.h
394
extern u32 string_to_av_perm(struct policydb *p, u16 tclass, const char *name);
security/selinux/ss/services.c
1034
struct policydb *policydb;
security/selinux/ss/services.c
1056
policydb = &policy->policydb;
security/selinux/ss/services.c
1075
if (policydb->allow_unknown)
security/selinux/ss/services.c
1081
if (unlikely(!tclass || tclass > policydb->p_classes.nprim)) {
security/selinux/ss/services.c
1088
sattr = &policydb->type_attr_map_array[scontext->type - 1];
security/selinux/ss/services.c
1089
tattr = &policydb->type_attr_map_array[tcontext->type - 1];
security/selinux/ss/services.c
1094
for (node = avtab_search_node(&policydb->te_avtab,
security/selinux/ss/services.c
1100
cond_compute_xperms(&policydb->te_cond_avtab,
security/selinux/ss/services.c
1130
struct policydb *policydb;
security/selinux/ss/services.c
1142
policydb = &policy->policydb;
security/selinux/ss/services.c
1153
if (ebitmap_get_bit(&policydb->permissive_map, scontext->type))
security/selinux/ss/services.c
1157
if (ebitmap_get_bit(&policydb->neveraudit_map, scontext->type))
security/selinux/ss/services.c
1173
if (policydb->allow_unknown)
security/selinux/ss/services.c
1177
context_struct_compute_av(policydb, scontext, tcontext, tclass, avd,
security/selinux/ss/services.c
1180
policydb->allow_unknown);
security/selinux/ss/services.c
1197
struct policydb *policydb;
security/selinux/ss/services.c
1207
policydb = &policy->policydb;
security/selinux/ss/services.c
1218
if (ebitmap_get_bit(&policydb->permissive_map, scontext->type))
security/selinux/ss/services.c
1222
if (ebitmap_get_bit(&policydb->neveraudit_map, scontext->type))
security/selinux/ss/services.c
1237
if (policydb->allow_unknown)
security/selinux/ss/services.c
1242
context_struct_compute_av(policydb, scontext, tcontext, tclass, avd,
security/selinux/ss/services.c
1261
static int context_struct_to_string(struct policydb *p,
security/selinux/ss/services.c
1311
static int sidtab_entry_to_string(struct policydb *p,
security/selinux/ss/services.c
1361
struct policydb *policydb;
security/selinux/ss/services.c
1403
policydb = &policy->policydb;
security/selinux/ss/services.c
1419
rc = sidtab_entry_to_string(policydb, sidtab, entry, scontext,
security/selinux/ss/services.c
1474
static int string_to_context_struct(struct policydb *pol,
security/selinux/ss/services.c
1557
struct policydb *policydb;
security/selinux/ss/services.c
1598
policydb = &policy->policydb;
security/selinux/ss/services.c
1600
rc = string_to_context_struct(policydb, sidtab, scontext2,
security/selinux/ss/services.c
1692
struct policydb *policydb = &policy->policydb;
security/selinux/ss/services.c
1698
if (sidtab_entry_to_string(policydb, sidtab, sentry, &s, &slen))
security/selinux/ss/services.c
1700
if (sidtab_entry_to_string(policydb, sidtab, tentry, &t, &tlen))
security/selinux/ss/services.c
1702
if (context_struct_to_string(policydb, newcontext, &n, &nlen))
security/selinux/ss/services.c
1712
s, t, sym_name(policydb, SYM_CLASSES, tclass-1));
security/selinux/ss/services.c
1723
static void filename_compute_type(struct policydb *policydb,
security/selinux/ss/services.c
1736
if (!ebitmap_get_bit(&policydb->filename_trans_ttypes, ttype))
security/selinux/ss/services.c
1743
datum = policydb_filenametr_search(policydb, &ft);
security/selinux/ss/services.c
1762
struct policydb *policydb;
security/selinux/ss/services.c
1802
policydb = &policy->policydb;
security/selinux/ss/services.c
1823
if (tclass && tclass <= policydb->p_classes.nprim)
security/selinux/ss/services.c
1824
cladatum = policydb->class_val_to_struct[tclass - 1];
security/selinux/ss/services.c
1850
if ((tclass == policydb->process_class) || sock)
security/selinux/ss/services.c
1863
avnode = avtab_search_node(&policydb->te_avtab, &avkey);
security/selinux/ss/services.c
1867
node = avtab_search_node(&policydb->te_cond_avtab, &avkey);
security/selinux/ss/services.c
1887
if ((tclass == policydb->process_class) || sock) {
security/selinux/ss/services.c
1898
filename_compute_type(policydb, &newcontext, scontext->type,
security/selinux/ss/services.c
1911
rtd = policydb_roletr_search(policydb, &rtk);
security/selinux/ss/services.c
1918
rc = mls_compute_sid(policydb, scontext, tcontext, tclass, specified,
security/selinux/ss/services.c
1924
if (!policydb_context_isvalid(policydb, &newcontext)) {
security/selinux/ss/services.c
2027
struct policydb *policydb,
security/selinux/ss/services.c
2036
if (!context_struct_to_string(policydb, context, &s, &len)) {
security/selinux/ss/services.c
2172
struct policydb *p;
security/selinux/ss/services.c
2176
p = &policy->policydb;
security/selinux/ss/services.c
2204
policydb_destroy(&policy->policydb);
security/selinux/ss/services.c
2211
cond_policydb_destroy_dup(&policy->policydb);
security/selinux/ss/services.c
2251
if (oldpolicy->policydb.mls_enabled && !newpolicy->policydb.mls_enabled)
security/selinux/ss/services.c
2253
else if (!oldpolicy->policydb.mls_enabled && newpolicy->policydb.mls_enabled)
security/selinux/ss/services.c
2325
rc = policydb_read(&newpolicy->policydb, fp);
security/selinux/ss/services.c
2329
newpolicy->policydb.len = len;
security/selinux/ss/services.c
2330
rc = selinux_set_mapping(&newpolicy->policydb, secclass_map,
security/selinux/ss/services.c
2335
rc = policydb_load_isids(&newpolicy->policydb, newpolicy->sidtab);
security/selinux/ss/services.c
2369
convert_data->args.oldp = &oldpolicy->policydb;
security/selinux/ss/services.c
2370
convert_data->args.newp = &newpolicy->policydb;
security/selinux/ss/services.c
2394
policydb_destroy(&newpolicy->policydb);
security/selinux/ss/services.c
2449
struct policydb *policydb;
security/selinux/ss/services.c
2463
policydb = &policy->policydb;
security/selinux/ss/services.c
2466
c = policydb->ocontexts[OCON_PORT];
security/selinux/ss/services.c
249
mls_enabled = policy->policydb.mls_enabled;
security/selinux/ss/services.c
2501
struct policydb *policydb;
security/selinux/ss/services.c
2515
policydb = &policy->policydb;
security/selinux/ss/services.c
2518
c = policydb->ocontexts[OCON_IBPKEY];
security/selinux/ss/services.c
2553
struct policydb *policydb;
security/selinux/ss/services.c
2567
policydb = &policy->policydb;
security/selinux/ss/services.c
2570
c = policydb->ocontexts[OCON_IBENDPORT];
security/selinux/ss/services.c
2605
struct policydb *policydb;
security/selinux/ss/services.c
2620
policydb = &policy->policydb;
security/selinux/ss/services.c
2622
wildcard_support = ebitmap_get_bit(&policydb->policycaps, POLICYDB_CAP_NETIF_WILDCARD);
security/selinux/ss/services.c
2624
c = policydb->ocontexts[OCON_NETIF];
security/selinux/ss/services.c
265
static int constraint_expr_eval(struct policydb *policydb,
security/selinux/ss/services.c
2677
struct policydb *policydb;
security/selinux/ss/services.c
2690
policydb = &policy->policydb;
security/selinux/ss/services.c
2703
c = policydb->ocontexts[OCON_NODE];
security/selinux/ss/services.c
2716
c = policydb->ocontexts[OCON_NODE6];
security/selinux/ss/services.c
2771
struct policydb *policydb;
security/selinux/ss/services.c
2795
policydb = &policy->policydb;
security/selinux/ss/services.c
2806
user = symtab_search(&policydb->p_users, username);
security/selinux/ss/services.c
2813
role = policydb->role_val_to_struct[i];
security/selinux/ss/services.c
2818
if (mls_setup_user_range(policydb, fromcon, user,
security/selinux/ss/services.c
2895
struct policydb *policydb = &policy->policydb;
security/selinux/ss/services.c
2909
for (genfs = policydb->genfs; genfs; genfs = genfs->next) {
security/selinux/ss/services.c
2918
wildcard = ebitmap_get_bit(&policy->policydb.policycaps,
security/selinux/ss/services.c
2990
struct policydb *policydb;
security/selinux/ss/services.c
3006
policydb = &policy->policydb;
security/selinux/ss/services.c
3009
c = policydb->ocontexts[OCON_FSUSE];
security/selinux/ss/services.c
3048
struct policydb *policydb;
security/selinux/ss/services.c
3052
policydb = &policy->policydb;
security/selinux/ss/services.c
3058
*len = policydb->p_bools.nprim;
security/selinux/ss/services.c
3073
(*values)[i] = policydb->bool_val_to_struct[i]->state;
security/selinux/ss/services.c
3076
(*names)[i] = kstrdup(sym_name(policydb, SYM_BOOLS, i),
security/selinux/ss/services.c
310
r1 = policydb->role_val_to_struct[val1 - 1];
security/selinux/ss/services.c
311
r2 = policydb->role_val_to_struct[val2 - 1];
security/selinux/ss/services.c
3112
if (WARN_ON(len != oldpolicy->policydb.p_bools.nprim))
security/selinux/ss/services.c
3123
rc = cond_policydb_dup(&newpolicy->policydb, &oldpolicy->policydb);
security/selinux/ss/services.c
3132
int old_state = newpolicy->policydb.bool_val_to_struct[i]->state;
security/selinux/ss/services.c
3138
sym_name(&newpolicy->policydb, SYM_BOOLS, i),
security/selinux/ss/services.c
3143
newpolicy->policydb.bool_val_to_struct[i]->state = new_state;
security/selinux/ss/services.c
3148
evaluate_cond_nodes(&newpolicy->policydb);
security/selinux/ss/services.c
3173
struct policydb *policydb;
security/selinux/ss/services.c
3182
policydb = &policy->policydb;
security/selinux/ss/services.c
3185
len = policydb->p_bools.nprim;
security/selinux/ss/services.c
3189
rc = policydb->bool_val_to_struct[index]->state;
security/selinux/ss/services.c
3207
booldatum = symtab_search(&newpolicy->policydb.p_bools,
security/selinux/ss/services.c
3212
evaluate_cond_nodes(&newpolicy->policydb);
security/selinux/ss/services.c
3231
struct policydb *policydb;
security/selinux/ss/services.c
3251
policydb = &policy->policydb;
security/selinux/ss/services.c
3254
if (!policydb->mls_enabled) {
security/selinux/ss/services.c
3283
if (!policydb_context_isvalid(policydb, &newcon)) {
security/selinux/ss/services.c
3284
rc = convert_context_handle_invalid_context(policydb,
security/selinux/ss/services.c
3287
if (!context_struct_to_string(policydb, &newcon, &s,
security/selinux/ss/services.c
3342
struct policydb *policydb;
security/selinux/ss/services.c
3370
policydb = &policy->policydb;
security/selinux/ss/services.c
3378
if (!policydb->mls_enabled) {
security/selinux/ss/services.c
3428
struct policydb *policydb;
security/selinux/ss/services.c
3431
policydb = &policy->policydb;
security/selinux/ss/services.c
3434
*nclasses = policydb->p_classes.nprim;
security/selinux/ss/services.c
3439
rc = hashtab_map(&policydb->p_classes.table, get_classes_callback,
security/selinux/ss/services.c
3469
struct policydb *policydb;
security/selinux/ss/services.c
3474
policydb = &policy->policydb;
security/selinux/ss/services.c
3477
match = symtab_search(&policydb->p_classes, class);
security/selinux/ss/services.c
3522
value = policy->policydb.reject_unknown;
security/selinux/ss/services.c
3537
value = policy->policydb.allow_unknown;
security/selinux/ss/services.c
3562
rc = ebitmap_get_bit(&policy->policydb.policycaps, req_cap);
security/selinux/ss/services.c
3595
struct policydb *policydb;
security/selinux/ss/services.c
3639
policydb = &policy->policydb;
security/selinux/ss/services.c
3644
userdatum = symtab_search(&policydb->p_users, rulestr);
security/selinux/ss/services.c
3653
roledatum = symtab_search(&policydb->p_roles, rulestr);
security/selinux/ss/services.c
3662
typedatum = symtab_search(&policydb->p_types, rulestr);
security/selinux/ss/services.c
3673
rc = mls_from_string(policydb, rulestr, &tmprule->au_ctxt,
security/selinux/ss/services.c
3881
struct policydb *policydb;
security/selinux/ss/services.c
3896
policydb = &policy->policydb;
security/selinux/ss/services.c
3913
mls_import_netlbl_lvl(policydb, &ctx_new, secattr);
security/selinux/ss/services.c
3915
rc = mls_import_netlbl_cat(policydb, &ctx_new, secattr);
security/selinux/ss/services.c
3920
if (!mls_context_isvalid(policydb, &ctx_new)) {
security/selinux/ss/services.c
3956
struct policydb *policydb;
security/selinux/ss/services.c
3965
policydb = &policy->policydb;
security/selinux/ss/services.c
3973
secattr->domain = kstrdup(sym_name(policydb, SYM_TYPES, ctx->type - 1),
security/selinux/ss/services.c
3980
mls_export_netlbl_lvl(policydb, ctx, secattr);
security/selinux/ss/services.c
3981
rc = mls_export_netlbl_cat(policydb, ctx, secattr);
security/selinux/ss/services.c
4004
rc = policydb_write(&policy->policydb, &fp);
security/selinux/ss/services.c
4028
*len = policy->policydb.len;
security/selinux/ss/services.c
4058
*len = policy->policydb.len;
security/selinux/ss/services.c
456
static void security_dump_masked_av(struct policydb *policydb,
security/selinux/ss/services.c
477
tclass_name = sym_name(policydb, SYM_CLASSES, tclass - 1);
security/selinux/ss/services.c
478
tclass_dat = policydb->class_val_to_struct[tclass - 1];
security/selinux/ss/services.c
492
if (context_struct_to_string(policydb, scontext,
security/selinux/ss/services.c
496
if (context_struct_to_string(policydb, tcontext,
security/selinux/ss/services.c
533
static void type_attribute_bounds_av(struct policydb *policydb,
security/selinux/ss/services.c
546
source = policydb->type_val_to_struct[scontext->type - 1];
security/selinux/ss/services.c
552
target = policydb->type_val_to_struct[tcontext->type - 1];
security/selinux/ss/services.c
566
context_struct_compute_av(policydb, &lo_scontext,
security/selinux/ss/services.c
581
security_dump_masked_av(policydb, scontext, tcontext,
security/selinux/ss/services.c
622
static void context_struct_compute_av(struct policydb *policydb,
security/selinux/ss/services.c
645
if (unlikely(!tclass || tclass > policydb->p_classes.nprim)) {
security/selinux/ss/services.c
650
tclass_datum = policydb->class_val_to_struct[tclass - 1];
security/selinux/ss/services.c
658
sattr = &policydb->type_attr_map_array[scontext->type - 1];
security/selinux/ss/services.c
659
tattr = &policydb->type_attr_map_array[tcontext->type - 1];
security/selinux/ss/services.c
664
for (node = avtab_search_node(&policydb->te_avtab,
security/selinux/ss/services.c
679
cond_compute_av(&policydb->te_cond_avtab, &avkey,
security/selinux/ss/services.c
692
!constraint_expr_eval(policydb, scontext, tcontext, NULL,
security/selinux/ss/services.c
704
if (tclass == policydb->process_class &&
security/selinux/ss/services.c
705
(avd->allowed & policydb->process_trans_perms) &&
security/selinux/ss/services.c
707
for (ra = policydb->role_allow; ra; ra = ra->next) {
security/selinux/ss/services.c
713
avd->allowed &= ~policydb->process_trans_perms;
security/selinux/ss/services.c
721
type_attribute_bounds_av(policydb, scontext, tcontext,
security/selinux/ss/services.c
731
struct policydb *p = &policy->policydb;
security/selinux/ss/services.c
760
struct policydb *policydb;
security/selinux/ss/services.c
777
policydb = &policy->policydb;
security/selinux/ss/services.c
78
static int context_struct_to_string(struct policydb *policydb,
security/selinux/ss/services.c
785
if (!tclass || tclass > policydb->p_classes.nprim) {
security/selinux/ss/services.c
789
tclass_datum = policydb->class_val_to_struct[tclass - 1];
security/selinux/ss/services.c
817
if (!constraint_expr_eval(policydb, &oentry->context,
security/selinux/ss/services.c
83
static int sidtab_entry_to_string(struct policydb *policydb,
security/selinux/ss/services.c
864
struct policydb *policydb;
security/selinux/ss/services.c
876
policydb = &policy->policydb;
security/selinux/ss/services.c
89
static void context_struct_compute_av(struct policydb *policydb,
security/selinux/ss/services.c
902
type = policydb->type_val_to_struct[index - 1];
security/selinux/ss/services.c
923
if (!sidtab_entry_to_string(policydb, sidtab, old_entry,
security/selinux/ss/services.c
925
!sidtab_entry_to_string(policydb, sidtab, new_entry,
security/selinux/ss/services.c
96
static int selinux_set_mapping(struct policydb *pol,
security/selinux/ss/services.h
28
struct policydb policydb;
security/selinux/ss/services.h
34
struct policydb *oldp;
security/selinux/ss/services.h
35
struct policydb *newp;