policydb          387 security/selinux/ss/avtab.c int avtab_read_item(struct avtab *a, void *fp, struct policydb *pol,
policydb          555 security/selinux/ss/avtab.c int avtab_read(struct avtab *a, void *fp, struct policydb *pol)
policydb          599 security/selinux/ss/avtab.c int avtab_write_item(struct policydb *p, struct avtab_node *cur, void *fp)
policydb          634 security/selinux/ss/avtab.c int avtab_write(struct policydb *p, struct avtab *a, void *fp)
policydb           96 security/selinux/ss/avtab.h struct policydb;
policydb           97 security/selinux/ss/avtab.h int avtab_read_item(struct avtab *a, void *fp, struct policydb *pol,
policydb          102 security/selinux/ss/avtab.h int avtab_read(struct avtab *a, void *fp, struct policydb *pol);
policydb          103 security/selinux/ss/avtab.h int avtab_write_item(struct policydb *p, struct avtab_node *cur, void *fp);
policydb          104 security/selinux/ss/avtab.h int avtab_write(struct policydb *p, struct avtab *a, void *fp);
policydb           24 security/selinux/ss/conditional.c static int cond_evaluate_expr(struct policydb *p, struct cond_expr *expr)
policydb           88 security/selinux/ss/conditional.c int evaluate_cond_node(struct policydb *p, struct cond_node *node)
policydb          117 security/selinux/ss/conditional.c int cond_policydb_init(struct policydb *p)
policydb          167 security/selinux/ss/conditional.c void cond_policydb_destroy(struct policydb *p)
policydb          174 security/selinux/ss/conditional.c int cond_init_bool_indexes(struct policydb *p)
policydb          194 security/selinux/ss/conditional.c 	struct policydb *p;
policydb          216 security/selinux/ss/conditional.c int cond_read_bool(struct policydb *p, struct hashtab *h, void *fp)
policydb          262 security/selinux/ss/conditional.c 	struct policydb *p;
policydb          271 security/selinux/ss/conditional.c 	struct policydb *p = data->p;
policydb          349 security/selinux/ss/conditional.c static int cond_read_av_list(struct policydb *p, void *fp, struct cond_av_list **ret_list, struct cond_av_list *other)
policydb          381 security/selinux/ss/conditional.c static int expr_isvalid(struct policydb *p, struct cond_expr *expr)
policydb          395 security/selinux/ss/conditional.c static int cond_read_node(struct policydb *p, struct cond_node *node, void *fp)
policydb          449 security/selinux/ss/conditional.c int cond_read_list(struct policydb *p, void *fp)
policydb          521 security/selinux/ss/conditional.c static int cond_write_av_list(struct policydb *p,
policydb          550 security/selinux/ss/conditional.c static int cond_write_node(struct policydb *p, struct cond_node *node,
policydb          589 security/selinux/ss/conditional.c int cond_write_list(struct policydb *p, struct cond_node *list, void *fp)
policydb           61 security/selinux/ss/conditional.h int cond_policydb_init(struct policydb *p);
policydb           62 security/selinux/ss/conditional.h void cond_policydb_destroy(struct policydb *p);
policydb           64 security/selinux/ss/conditional.h int cond_init_bool_indexes(struct policydb *p);
policydb           69 security/selinux/ss/conditional.h int cond_read_bool(struct policydb *p, struct hashtab *h, void *fp);
policydb           70 security/selinux/ss/conditional.h int cond_read_list(struct policydb *p, void *fp);
policydb           72 security/selinux/ss/conditional.h int cond_write_list(struct policydb *p, struct cond_node *list, void *fp);
policydb           78 security/selinux/ss/conditional.h int evaluate_cond_node(struct policydb *p, struct cond_node *node);
policydb           36 security/selinux/ss/mls.c int mls_compute_context_len(struct policydb *p, struct context *context)
policydb           89 security/selinux/ss/mls.c void mls_sid_to_context(struct policydb *p,
policydb          162 security/selinux/ss/mls.c int mls_level_isvalid(struct policydb *p, struct mls_level *l)
policydb          182 security/selinux/ss/mls.c int mls_range_isvalid(struct policydb *p, struct mls_range *r)
policydb          193 security/selinux/ss/mls.c int mls_context_isvalid(struct policydb *p, struct context *c)
policydb          234 security/selinux/ss/mls.c int mls_context_to_sid(struct policydb *pol,
policydb          361 security/selinux/ss/mls.c int mls_from_string(struct policydb *p, char *str, struct context *context,
policydb          402 security/selinux/ss/mls.c int mls_setup_user_range(struct policydb *p,
policydb          447 security/selinux/ss/mls.c int mls_convert_context(struct policydb *oldp,
policydb          448 security/selinux/ss/mls.c 			struct policydb *newp,
policydb          487 security/selinux/ss/mls.c int mls_compute_sid(struct policydb *p,
policydb          562 security/selinux/ss/mls.c void mls_export_netlbl_lvl(struct policydb *p,
policydb          583 security/selinux/ss/mls.c void mls_import_netlbl_lvl(struct policydb *p,
policydb          604 security/selinux/ss/mls.c int mls_export_netlbl_cat(struct policydb *p,
policydb          633 security/selinux/ss/mls.c int mls_import_netlbl_cat(struct policydb *p,
policydb           28 security/selinux/ss/mls.h int mls_compute_context_len(struct policydb *p, struct context *context);
policydb           29 security/selinux/ss/mls.h void mls_sid_to_context(struct policydb *p, struct context *context,
policydb           31 security/selinux/ss/mls.h int mls_context_isvalid(struct policydb *p, struct context *c);
policydb           32 security/selinux/ss/mls.h int mls_range_isvalid(struct policydb *p, struct mls_range *r);
policydb           33 security/selinux/ss/mls.h int mls_level_isvalid(struct policydb *p, struct mls_level *l);
policydb           35 security/selinux/ss/mls.h int mls_context_to_sid(struct policydb *p,
policydb           42 security/selinux/ss/mls.h int mls_from_string(struct policydb *p, char *str, struct context *context,
policydb           47 security/selinux/ss/mls.h int mls_convert_context(struct policydb *oldp,
policydb           48 security/selinux/ss/mls.h 			struct policydb *newp,
policydb           52 security/selinux/ss/mls.h int mls_compute_sid(struct policydb *p,
policydb           60 security/selinux/ss/mls.h int mls_setup_user_range(struct policydb *p,
policydb           65 security/selinux/ss/mls.h void mls_export_netlbl_lvl(struct policydb *p,
policydb           68 security/selinux/ss/mls.h void mls_import_netlbl_lvl(struct policydb *p,
policydb           71 security/selinux/ss/mls.h int mls_export_netlbl_cat(struct policydb *p,
policydb           74 security/selinux/ss/mls.h int mls_import_netlbl_cat(struct policydb *p,
policydb           78 security/selinux/ss/mls.h static inline void mls_export_netlbl_lvl(struct policydb *p,
policydb           84 security/selinux/ss/mls.h static inline void mls_import_netlbl_lvl(struct policydb *p,
policydb           90 security/selinux/ss/mls.h static inline int mls_export_netlbl_cat(struct policydb *p,
policydb           96 security/selinux/ss/mls.h static inline int mls_import_netlbl_cat(struct policydb *p,
policydb          371 security/selinux/ss/policydb.c static int roles_init(struct policydb *p)
policydb          468 security/selinux/ss/policydb.c static int policydb_init(struct policydb *p)
policydb          532 security/selinux/ss/policydb.c 	struct policydb *p;
policydb          547 security/selinux/ss/policydb.c 	struct policydb *p;
policydb          562 security/selinux/ss/policydb.c 	struct policydb *p;
policydb          579 security/selinux/ss/policydb.c 	struct policydb *p;
policydb          599 security/selinux/ss/policydb.c 	struct policydb *p;
policydb          616 security/selinux/ss/policydb.c 	struct policydb *p;
policydb          635 security/selinux/ss/policydb.c 	struct policydb *p;
policydb          694 security/selinux/ss/policydb.c static int policydb_index(struct policydb *p)
policydb          762 security/selinux/ss/policydb.c void policydb_destroy(struct policydb *p)
policydb          850 security/selinux/ss/policydb.c int policydb_load_isids(struct policydb *p, struct sidtab *s)
policydb          890 security/selinux/ss/policydb.c int policydb_class_isvalid(struct policydb *p, unsigned int class)
policydb          897 security/selinux/ss/policydb.c int policydb_role_isvalid(struct policydb *p, unsigned int role)
policydb          904 security/selinux/ss/policydb.c int policydb_type_isvalid(struct policydb *p, unsigned int type)
policydb          915 security/selinux/ss/policydb.c int policydb_context_isvalid(struct policydb *p, struct context *c)
policydb         1020 security/selinux/ss/policydb.c 				     struct policydb *p,
policydb         1082 security/selinux/ss/policydb.c static int perm_read(struct policydb *p, struct hashtab *h, void *fp)
policydb         1115 security/selinux/ss/policydb.c static int common_read(struct policydb *p, struct hashtab *h, void *fp)
policydb         1184 security/selinux/ss/policydb.c static int read_cons_helper(struct policydb *p,
policydb         1280 security/selinux/ss/policydb.c static int class_read(struct policydb *p, struct hashtab *h, void *fp)
policydb         1374 security/selinux/ss/policydb.c static int role_read(struct policydb *p, struct hashtab *h, void *fp)
policydb         1430 security/selinux/ss/policydb.c static int type_read(struct policydb *p, struct hashtab *h, void *fp)
policydb         1504 security/selinux/ss/policydb.c static int user_read(struct policydb *p, struct hashtab *h, void *fp)
policydb         1554 security/selinux/ss/policydb.c static int sens_read(struct policydb *p, struct hashtab *h, void *fp)
policydb         1595 security/selinux/ss/policydb.c static int cat_read(struct policydb *p, struct hashtab *h, void *fp)
policydb         1628 security/selinux/ss/policydb.c static int (*read_f[SYM_NUM]) (struct policydb *p, struct hashtab *h, void *fp) =
policydb         1643 security/selinux/ss/policydb.c 	struct policydb *p = datap;
policydb         1679 security/selinux/ss/policydb.c 	struct policydb *p = datap;
policydb         1715 security/selinux/ss/policydb.c 	struct policydb *p = datap;
policydb         1742 security/selinux/ss/policydb.c static int policydb_bounds_sanity_check(struct policydb *p)
policydb         1767 security/selinux/ss/policydb.c u16 string_to_security_class(struct policydb *p, const char *name)
policydb         1778 security/selinux/ss/policydb.c u32 string_to_av_perm(struct policydb *p, u16 tclass, const char *name)
policydb         1801 security/selinux/ss/policydb.c static int range_read(struct policydb *p, void *fp)
policydb         1873 security/selinux/ss/policydb.c static int filename_trans_read(struct policydb *p, void *fp)
policydb         1955 security/selinux/ss/policydb.c static int genfs_read(struct policydb *p, void *fp)
policydb         2068 security/selinux/ss/policydb.c static int ocontext_read(struct policydb *p, struct policydb_compat_info *info,
policydb         2254 security/selinux/ss/policydb.c int policydb_read(struct policydb *p, void *fp)
policydb         2648 security/selinux/ss/policydb.c static int role_trans_write(struct policydb *p, void *fp)
policydb         2709 security/selinux/ss/policydb.c static int context_write(struct policydb *p, struct context *c,
policydb         2806 security/selinux/ss/policydb.c static int write_cons_helper(struct policydb *p, struct constraint_node *node,
policydb         2859 security/selinux/ss/policydb.c 	struct policydb *p = pd->p;
policydb         2947 security/selinux/ss/policydb.c 	struct policydb *p = pd->p;
policydb         2985 security/selinux/ss/policydb.c 	struct policydb *p = pd->p;
policydb         3026 security/selinux/ss/policydb.c 	struct policydb *p = pd->p;
policydb         3075 security/selinux/ss/policydb.c static int ocontext_write(struct policydb *p, struct policydb_compat_info *info,
policydb         3205 security/selinux/ss/policydb.c static int genfs_write(struct policydb *p, void *fp)
policydb         3272 security/selinux/ss/policydb.c 	struct policydb *p = pd->p;
policydb         3293 security/selinux/ss/policydb.c static int range_write(struct policydb *p, void *fp)
policydb         3352 security/selinux/ss/policydb.c static int filename_trans_write(struct policydb *p, void *fp)
policydb         3383 security/selinux/ss/policydb.c int policydb_write(struct policydb *p, void *fp)
policydb          311 security/selinux/ss/policydb.h extern void policydb_destroy(struct policydb *p);
policydb          312 security/selinux/ss/policydb.h extern int policydb_load_isids(struct policydb *p, struct sidtab *s);
policydb          313 security/selinux/ss/policydb.h extern int policydb_context_isvalid(struct policydb *p, struct context *c);
policydb          314 security/selinux/ss/policydb.h extern int policydb_class_isvalid(struct policydb *p, unsigned int class);
policydb          315 security/selinux/ss/policydb.h extern int policydb_type_isvalid(struct policydb *p, unsigned int type);
policydb          316 security/selinux/ss/policydb.h extern int policydb_role_isvalid(struct policydb *p, unsigned int role);
policydb          317 security/selinux/ss/policydb.h extern int policydb_read(struct policydb *p, void *fp);
policydb          318 security/selinux/ss/policydb.h extern int policydb_write(struct policydb *p, void *fp);
policydb          340 security/selinux/ss/policydb.h 	struct policydb *p;
policydb          366 security/selinux/ss/policydb.h static inline char *sym_name(struct policydb *p, unsigned int sym_num, unsigned int element_nr)
policydb          371 security/selinux/ss/policydb.h extern u16 string_to_security_class(struct policydb *p, const char *name);
policydb          372 security/selinux/ss/policydb.h extern u32 string_to_av_perm(struct policydb *p, u16 tclass, const char *name);
policydb           89 security/selinux/ss/services.c static int context_struct_to_string(struct policydb *policydb,
policydb           94 security/selinux/ss/services.c static void context_struct_compute_av(struct policydb *policydb,
policydb          101 security/selinux/ss/services.c static int selinux_set_mapping(struct policydb *pol,
policydb          246 security/selinux/ss/services.c 	struct policydb *p = &state->ss->policydb;
policydb          262 security/selinux/ss/services.c static int constraint_expr_eval(struct policydb *policydb,
policydb          307 security/selinux/ss/services.c 				r1 = policydb->role_val_to_struct[val1 - 1];
policydb          308 security/selinux/ss/services.c 				r2 = policydb->role_val_to_struct[val2 - 1];
policydb          453 security/selinux/ss/services.c static void security_dump_masked_av(struct policydb *policydb,
policydb          474 security/selinux/ss/services.c 	tclass_name = sym_name(policydb, SYM_CLASSES, tclass - 1);
policydb          475 security/selinux/ss/services.c 	tclass_dat = policydb->class_val_to_struct[tclass - 1];
policydb          489 security/selinux/ss/services.c 	if (context_struct_to_string(policydb, scontext,
policydb          493 security/selinux/ss/services.c 	if (context_struct_to_string(policydb, tcontext,
policydb          532 security/selinux/ss/services.c static void type_attribute_bounds_av(struct policydb *policydb,
policydb          545 security/selinux/ss/services.c 	source = policydb->type_val_to_struct[scontext->type - 1];
policydb          551 security/selinux/ss/services.c 	target = policydb->type_val_to_struct[tcontext->type - 1];
policydb          565 security/selinux/ss/services.c 	context_struct_compute_av(policydb, &lo_scontext,
policydb          580 security/selinux/ss/services.c 	security_dump_masked_av(policydb, scontext, tcontext,
policydb          613 security/selinux/ss/services.c static void context_struct_compute_av(struct policydb *policydb,
policydb          637 security/selinux/ss/services.c 	if (unlikely(!tclass || tclass > policydb->p_classes.nprim)) {
policydb          643 security/selinux/ss/services.c 	tclass_datum = policydb->class_val_to_struct[tclass - 1];
policydb          651 security/selinux/ss/services.c 	sattr = &policydb->type_attr_map_array[scontext->type - 1];
policydb          652 security/selinux/ss/services.c 	tattr = &policydb->type_attr_map_array[tcontext->type - 1];
policydb          657 security/selinux/ss/services.c 			for (node = avtab_search_node(&policydb->te_avtab,
policydb          672 security/selinux/ss/services.c 			cond_compute_av(&policydb->te_cond_avtab, &avkey,
policydb          685 security/selinux/ss/services.c 		    !constraint_expr_eval(policydb, scontext, tcontext, NULL,
policydb          697 security/selinux/ss/services.c 	if (tclass == policydb->process_class &&
policydb          698 security/selinux/ss/services.c 	    (avd->allowed & policydb->process_trans_perms) &&
policydb          700 security/selinux/ss/services.c 		for (ra = policydb->role_allow; ra; ra = ra->next) {
policydb          706 security/selinux/ss/services.c 			avd->allowed &= ~policydb->process_trans_perms;
policydb          714 security/selinux/ss/services.c 	type_attribute_bounds_av(policydb, scontext, tcontext,
policydb          724 security/selinux/ss/services.c 	struct policydb *p = &state->ss->policydb;
policydb          752 security/selinux/ss/services.c 	struct policydb *policydb;
policydb          768 security/selinux/ss/services.c 	policydb = &state->ss->policydb;
policydb          776 security/selinux/ss/services.c 	if (!tclass || tclass > policydb->p_classes.nprim) {
policydb          780 security/selinux/ss/services.c 	tclass_datum = policydb->class_val_to_struct[tclass - 1];
policydb          808 security/selinux/ss/services.c 		if (!constraint_expr_eval(policydb, ocontext, ncontext,
policydb          856 security/selinux/ss/services.c 	struct policydb *policydb;
policydb          868 security/selinux/ss/services.c 	policydb = &state->ss->policydb;
policydb          894 security/selinux/ss/services.c 		type = policydb->type_val_to_struct[index - 1];
policydb          915 security/selinux/ss/services.c 		if (!context_struct_to_string(policydb, old_context,
policydb          917 security/selinux/ss/services.c 		    !context_struct_to_string(policydb, new_context,
policydb         1005 security/selinux/ss/services.c 	struct policydb *policydb;
policydb         1025 security/selinux/ss/services.c 	policydb = &state->ss->policydb;
policydb         1044 security/selinux/ss/services.c 		if (policydb->allow_unknown)
policydb         1050 security/selinux/ss/services.c 	if (unlikely(!tclass || tclass > policydb->p_classes.nprim)) {
policydb         1057 security/selinux/ss/services.c 	sattr = &policydb->type_attr_map_array[scontext->type - 1];
policydb         1058 security/selinux/ss/services.c 	tattr = &policydb->type_attr_map_array[tcontext->type - 1];
policydb         1063 security/selinux/ss/services.c 			for (node = avtab_search_node(&policydb->te_avtab,
policydb         1069 security/selinux/ss/services.c 			cond_compute_xperms(&policydb->te_cond_avtab,
policydb         1099 security/selinux/ss/services.c 	struct policydb *policydb;
policydb         1110 security/selinux/ss/services.c 	policydb = &state->ss->policydb;
policydb         1121 security/selinux/ss/services.c 	if (ebitmap_get_bit(&policydb->permissive_map, scontext->type))
policydb         1133 security/selinux/ss/services.c 		if (policydb->allow_unknown)
policydb         1137 security/selinux/ss/services.c 	context_struct_compute_av(policydb, scontext, tcontext, tclass, avd,
policydb         1140 security/selinux/ss/services.c 		     policydb->allow_unknown);
policydb         1155 security/selinux/ss/services.c 	struct policydb *policydb;
policydb         1164 security/selinux/ss/services.c 	policydb = &state->ss->policydb;
policydb         1175 security/selinux/ss/services.c 	if (ebitmap_get_bit(&policydb->permissive_map, scontext->type))
policydb         1186 security/selinux/ss/services.c 		if (policydb->allow_unknown)
policydb         1191 security/selinux/ss/services.c 	context_struct_compute_av(policydb, scontext, tcontext, tclass, avd,
policydb         1208 security/selinux/ss/services.c static int context_struct_to_string(struct policydb *p,
policydb         1272 security/selinux/ss/services.c 	struct policydb *policydb;
policydb         1303 security/selinux/ss/services.c 	policydb = &state->ss->policydb;
policydb         1318 security/selinux/ss/services.c 		rc = context_struct_to_string(policydb, context, scontext,
policydb         1374 security/selinux/ss/services.c static int string_to_context_struct(struct policydb *pol,
policydb         1457 security/selinux/ss/services.c 	struct policydb *policydb;
policydb         1494 security/selinux/ss/services.c 	policydb = &state->ss->policydb;
policydb         1496 security/selinux/ss/services.c 	rc = string_to_context_struct(policydb, sidtab, scontext2,
policydb         1582 security/selinux/ss/services.c 	struct policydb *policydb = &state->ss->policydb;
policydb         1587 security/selinux/ss/services.c 	if (context_struct_to_string(policydb, scontext, &s, &slen))
policydb         1589 security/selinux/ss/services.c 	if (context_struct_to_string(policydb, tcontext, &t, &tlen))
policydb         1591 security/selinux/ss/services.c 	if (context_struct_to_string(policydb, newcontext, &n, &nlen))
policydb         1599 security/selinux/ss/services.c 			 s, t, sym_name(policydb, SYM_CLASSES, tclass-1));
policydb         1610 security/selinux/ss/services.c static void filename_compute_type(struct policydb *policydb,
policydb         1623 security/selinux/ss/services.c 	if (!ebitmap_get_bit(&policydb->filename_trans_ttypes, ttype))
policydb         1631 security/selinux/ss/services.c 	otype = hashtab_search(policydb->filename_trans, &ft);
policydb         1645 security/selinux/ss/services.c 	struct policydb *policydb;
policydb         1682 security/selinux/ss/services.c 	policydb = &state->ss->policydb;
policydb         1700 security/selinux/ss/services.c 	if (tclass && tclass <= policydb->p_classes.nprim)
policydb         1701 security/selinux/ss/services.c 		cladatum = policydb->class_val_to_struct[tclass - 1];
policydb         1727 security/selinux/ss/services.c 		if ((tclass == policydb->process_class) || (sock == true))
policydb         1739 security/selinux/ss/services.c 		if ((tclass == policydb->process_class) || (sock == true)) {
policydb         1753 security/selinux/ss/services.c 	avdatum = avtab_search(&policydb->te_avtab, &avkey);
policydb         1757 security/selinux/ss/services.c 		node = avtab_search_node(&policydb->te_cond_avtab, &avkey);
policydb         1773 security/selinux/ss/services.c 		filename_compute_type(policydb, &newcontext, scontext->type,
policydb         1779 security/selinux/ss/services.c 		for (roletr = policydb->role_tr; roletr;
policydb         1793 security/selinux/ss/services.c 	rc = mls_compute_sid(policydb, scontext, tcontext, tclass, specified,
policydb         1799 security/selinux/ss/services.c 	if (!policydb_context_isvalid(policydb, &newcontext)) {
policydb         1899 security/selinux/ss/services.c 	struct policydb *policydb = &state->ss->policydb;
policydb         1906 security/selinux/ss/services.c 	if (!context_struct_to_string(policydb, context, &s, &len)) {
policydb         1916 security/selinux/ss/services.c 	struct policydb *oldp;
policydb         1917 security/selinux/ss/services.c 	struct policydb *newp;
policydb         2052 security/selinux/ss/services.c 	struct policydb *p = &state->ss->policydb;
policydb         2072 security/selinux/ss/services.c 				   struct policydb *newpolicydb);
policydb         2086 security/selinux/ss/services.c 	struct policydb *policydb;
policydb         2088 security/selinux/ss/services.c 	struct policydb *oldpolicydb, *newpolicydb;
policydb         2104 security/selinux/ss/services.c 	policydb = &state->ss->policydb;
policydb         2113 security/selinux/ss/services.c 		rc = policydb_read(policydb, fp);
policydb         2119 security/selinux/ss/services.c 		policydb->len = len;
policydb         2120 security/selinux/ss/services.c 		rc = selinux_set_mapping(policydb, secclass_map,
policydb         2124 security/selinux/ss/services.c 			policydb_destroy(policydb);
policydb         2128 security/selinux/ss/services.c 		rc = policydb_load_isids(policydb, newsidtab);
policydb         2131 security/selinux/ss/services.c 			policydb_destroy(policydb);
policydb         2156 security/selinux/ss/services.c 	if (policydb->mls_enabled && !newpolicydb->mls_enabled)
policydb         2158 security/selinux/ss/services.c 	else if (!policydb->mls_enabled && newpolicydb->mls_enabled)
policydb         2186 security/selinux/ss/services.c 	args.oldp = policydb;
policydb         2202 security/selinux/ss/services.c 	memcpy(oldpolicydb, policydb, sizeof(*policydb));
policydb         2206 security/selinux/ss/services.c 	memcpy(policydb, newpolicydb, sizeof(*policydb));
policydb         2243 security/selinux/ss/services.c 	struct policydb *p = &state->ss->policydb;
policydb         2262 security/selinux/ss/services.c 	struct policydb *policydb;
policydb         2269 security/selinux/ss/services.c 	policydb = &state->ss->policydb;
policydb         2272 security/selinux/ss/services.c 	c = policydb->ocontexts[OCON_PORT];
policydb         2308 security/selinux/ss/services.c 	struct policydb *policydb;
policydb         2315 security/selinux/ss/services.c 	policydb = &state->ss->policydb;
policydb         2318 security/selinux/ss/services.c 	c = policydb->ocontexts[OCON_IBPKEY];
policydb         2354 security/selinux/ss/services.c 	struct policydb *policydb;
policydb         2361 security/selinux/ss/services.c 	policydb = &state->ss->policydb;
policydb         2364 security/selinux/ss/services.c 	c = policydb->ocontexts[OCON_IBENDPORT];
policydb         2400 security/selinux/ss/services.c 	struct policydb *policydb;
policydb         2407 security/selinux/ss/services.c 	policydb = &state->ss->policydb;
policydb         2410 security/selinux/ss/services.c 	c = policydb->ocontexts[OCON_NETIF];
policydb         2465 security/selinux/ss/services.c 	struct policydb *policydb;
policydb         2472 security/selinux/ss/services.c 	policydb = &state->ss->policydb;
policydb         2485 security/selinux/ss/services.c 		c = policydb->ocontexts[OCON_NODE];
policydb         2498 security/selinux/ss/services.c 		c = policydb->ocontexts[OCON_NODE6];
policydb         2554 security/selinux/ss/services.c 	struct policydb *policydb;
policydb         2572 security/selinux/ss/services.c 	policydb = &state->ss->policydb;
policydb         2583 security/selinux/ss/services.c 	user = hashtab_search(policydb->p_users.table, username);
policydb         2595 security/selinux/ss/services.c 		role = policydb->role_val_to_struct[i];
policydb         2600 security/selinux/ss/services.c 			if (mls_setup_user_range(policydb, fromcon, user,
policydb         2674 security/selinux/ss/services.c 	struct policydb *policydb = &state->ss->policydb;
policydb         2688 security/selinux/ss/services.c 	for (genfs = policydb->genfs; genfs; genfs = genfs->next) {
policydb         2751 security/selinux/ss/services.c 	struct policydb *policydb;
policydb         2760 security/selinux/ss/services.c 	policydb = &state->ss->policydb;
policydb         2763 security/selinux/ss/services.c 	c = policydb->ocontexts[OCON_FSUSE];
policydb         2798 security/selinux/ss/services.c 	struct policydb *policydb;
policydb         2810 security/selinux/ss/services.c 	policydb = &state->ss->policydb;
policydb         2816 security/selinux/ss/services.c 	*len = policydb->p_bools.nprim;
policydb         2831 security/selinux/ss/services.c 		(*values)[i] = policydb->bool_val_to_struct[i]->state;
policydb         2834 security/selinux/ss/services.c 		(*names)[i] = kstrdup(sym_name(policydb, SYM_BOOLS, i),
policydb         2855 security/selinux/ss/services.c 	struct policydb *policydb;
policydb         2862 security/selinux/ss/services.c 	policydb = &state->ss->policydb;
policydb         2865 security/selinux/ss/services.c 	lenp = policydb->p_bools.nprim;
policydb         2870 security/selinux/ss/services.c 		if (!!values[i] != policydb->bool_val_to_struct[i]->state) {
policydb         2874 security/selinux/ss/services.c 				sym_name(policydb, SYM_BOOLS, i),
policydb         2876 security/selinux/ss/services.c 				policydb->bool_val_to_struct[i]->state,
policydb         2881 security/selinux/ss/services.c 			policydb->bool_val_to_struct[i]->state = 1;
policydb         2883 security/selinux/ss/services.c 			policydb->bool_val_to_struct[i]->state = 0;
policydb         2886 security/selinux/ss/services.c 	for (cur = policydb->cond_list; cur; cur = cur->next) {
policydb         2887 security/selinux/ss/services.c 		rc = evaluate_cond_node(policydb, cur);
policydb         2908 security/selinux/ss/services.c 	struct policydb *policydb;
policydb         2914 security/selinux/ss/services.c 	policydb = &state->ss->policydb;
policydb         2917 security/selinux/ss/services.c 	len = policydb->p_bools.nprim;
policydb         2921 security/selinux/ss/services.c 	rc = policydb->bool_val_to_struct[index]->state;
policydb         2928 security/selinux/ss/services.c 				   struct policydb *policydb)
policydb         2939 security/selinux/ss/services.c 		booldatum = hashtab_search(policydb->p_bools.table, bnames[i]);
policydb         2943 security/selinux/ss/services.c 	for (cur = policydb->cond_list; cur; cur = cur->next) {
policydb         2944 security/selinux/ss/services.c 		rc = evaluate_cond_node(policydb, cur);
policydb         2966 security/selinux/ss/services.c 	struct policydb *policydb = &state->ss->policydb;
policydb         2976 security/selinux/ss/services.c 	if (!state->initialized || !policydb->mls_enabled) {
policydb         3009 security/selinux/ss/services.c 	if (!policydb_context_isvalid(policydb, &newcon)) {
policydb         3012 security/selinux/ss/services.c 			if (!context_struct_to_string(policydb, &newcon, &s,
policydb         3063 security/selinux/ss/services.c 	struct policydb *policydb = &state->ss->policydb;
policydb         3091 security/selinux/ss/services.c 	if (!policydb->mls_enabled)
policydb         3141 security/selinux/ss/services.c 	struct policydb *policydb = &state->ss->policydb;
policydb         3153 security/selinux/ss/services.c 	*nclasses = policydb->p_classes.nprim;
policydb         3158 security/selinux/ss/services.c 	rc = hashtab_map(policydb->p_classes.table, get_classes_callback,
policydb         3188 security/selinux/ss/services.c 	struct policydb *policydb = &state->ss->policydb;
policydb         3195 security/selinux/ss/services.c 	match = hashtab_search(policydb->p_classes.table, class);
policydb         3234 security/selinux/ss/services.c 	return state->ss->policydb.reject_unknown;
policydb         3239 security/selinux/ss/services.c 	return state->ss->policydb.allow_unknown;
policydb         3255 security/selinux/ss/services.c 	struct policydb *policydb = &state->ss->policydb;
policydb         3259 security/selinux/ss/services.c 	rc = ebitmap_get_bit(&policydb->policycaps, req_cap);
policydb         3283 security/selinux/ss/services.c 	struct policydb *policydb = &state->ss->policydb;
policydb         3334 security/selinux/ss/services.c 		userdatum = hashtab_search(policydb->p_users.table, rulestr);
policydb         3342 security/selinux/ss/services.c 		roledatum = hashtab_search(policydb->p_roles.table, rulestr);
policydb         3350 security/selinux/ss/services.c 		typedatum = hashtab_search(policydb->p_types.table, rulestr);
policydb         3359 security/selinux/ss/services.c 		rc = mls_from_string(policydb, rulestr, &tmprule->au_ctxt,
policydb         3586 security/selinux/ss/services.c 	struct policydb *policydb = &state->ss->policydb;
policydb         3613 security/selinux/ss/services.c 		mls_import_netlbl_lvl(policydb, &ctx_new, secattr);
policydb         3615 security/selinux/ss/services.c 			rc = mls_import_netlbl_cat(policydb, &ctx_new, secattr);
policydb         3620 security/selinux/ss/services.c 		if (!mls_context_isvalid(policydb, &ctx_new))
policydb         3655 security/selinux/ss/services.c 	struct policydb *policydb = &state->ss->policydb;
policydb         3670 security/selinux/ss/services.c 	secattr->domain = kstrdup(sym_name(policydb, SYM_TYPES, ctx->type - 1),
policydb         3677 security/selinux/ss/services.c 	mls_export_netlbl_lvl(policydb, ctx, secattr);
policydb         3678 security/selinux/ss/services.c 	rc = mls_export_netlbl_cat(policydb, ctx, secattr);
policydb         3694 security/selinux/ss/services.c 	struct policydb *policydb = &state->ss->policydb;
policydb         3711 security/selinux/ss/services.c 	rc = policydb_write(policydb, &fp);
policydb           28 security/selinux/ss/services.h 	struct policydb policydb;