policydb 387 security/selinux/ss/avtab.c int avtab_read_item(struct avtab *a, void *fp, struct policydb *pol, policydb 555 security/selinux/ss/avtab.c int avtab_read(struct avtab *a, void *fp, struct policydb *pol) policydb 599 security/selinux/ss/avtab.c int avtab_write_item(struct policydb *p, struct avtab_node *cur, void *fp) policydb 634 security/selinux/ss/avtab.c int avtab_write(struct policydb *p, struct avtab *a, void *fp) policydb 96 security/selinux/ss/avtab.h struct policydb; policydb 97 security/selinux/ss/avtab.h int avtab_read_item(struct avtab *a, void *fp, struct policydb *pol, policydb 102 security/selinux/ss/avtab.h int avtab_read(struct avtab *a, void *fp, struct policydb *pol); policydb 103 security/selinux/ss/avtab.h int avtab_write_item(struct policydb *p, struct avtab_node *cur, void *fp); policydb 104 security/selinux/ss/avtab.h int avtab_write(struct policydb *p, struct avtab *a, void *fp); policydb 24 security/selinux/ss/conditional.c static int cond_evaluate_expr(struct policydb *p, struct cond_expr *expr) policydb 88 security/selinux/ss/conditional.c int evaluate_cond_node(struct policydb *p, struct cond_node *node) policydb 117 security/selinux/ss/conditional.c int cond_policydb_init(struct policydb *p) policydb 167 security/selinux/ss/conditional.c void cond_policydb_destroy(struct policydb *p) policydb 174 security/selinux/ss/conditional.c int cond_init_bool_indexes(struct policydb *p) policydb 194 security/selinux/ss/conditional.c struct policydb *p; policydb 216 security/selinux/ss/conditional.c int cond_read_bool(struct policydb *p, struct hashtab *h, void *fp) policydb 262 security/selinux/ss/conditional.c struct policydb *p; policydb 271 security/selinux/ss/conditional.c struct policydb *p = data->p; policydb 349 security/selinux/ss/conditional.c static int cond_read_av_list(struct policydb *p, void *fp, struct cond_av_list **ret_list, struct cond_av_list *other) policydb 381 security/selinux/ss/conditional.c static int expr_isvalid(struct policydb *p, struct cond_expr *expr) policydb 395 security/selinux/ss/conditional.c static int cond_read_node(struct policydb *p, struct cond_node *node, void *fp) policydb 449 security/selinux/ss/conditional.c int cond_read_list(struct policydb *p, void *fp) policydb 521 security/selinux/ss/conditional.c static int cond_write_av_list(struct policydb *p, policydb 550 security/selinux/ss/conditional.c static int cond_write_node(struct policydb *p, struct cond_node *node, policydb 589 security/selinux/ss/conditional.c int cond_write_list(struct policydb *p, struct cond_node *list, void *fp) policydb 61 security/selinux/ss/conditional.h int cond_policydb_init(struct policydb *p); policydb 62 security/selinux/ss/conditional.h void cond_policydb_destroy(struct policydb *p); policydb 64 security/selinux/ss/conditional.h int cond_init_bool_indexes(struct policydb *p); policydb 69 security/selinux/ss/conditional.h int cond_read_bool(struct policydb *p, struct hashtab *h, void *fp); policydb 70 security/selinux/ss/conditional.h int cond_read_list(struct policydb *p, void *fp); policydb 72 security/selinux/ss/conditional.h int cond_write_list(struct policydb *p, struct cond_node *list, void *fp); policydb 78 security/selinux/ss/conditional.h int evaluate_cond_node(struct policydb *p, struct cond_node *node); policydb 36 security/selinux/ss/mls.c int mls_compute_context_len(struct policydb *p, struct context *context) policydb 89 security/selinux/ss/mls.c void mls_sid_to_context(struct policydb *p, policydb 162 security/selinux/ss/mls.c int mls_level_isvalid(struct policydb *p, struct mls_level *l) policydb 182 security/selinux/ss/mls.c int mls_range_isvalid(struct policydb *p, struct mls_range *r) policydb 193 security/selinux/ss/mls.c int mls_context_isvalid(struct policydb *p, struct context *c) policydb 234 security/selinux/ss/mls.c int mls_context_to_sid(struct policydb *pol, policydb 361 security/selinux/ss/mls.c int mls_from_string(struct policydb *p, char *str, struct context *context, policydb 402 security/selinux/ss/mls.c int mls_setup_user_range(struct policydb *p, policydb 447 security/selinux/ss/mls.c int mls_convert_context(struct policydb *oldp, policydb 448 security/selinux/ss/mls.c struct policydb *newp, policydb 487 security/selinux/ss/mls.c int mls_compute_sid(struct policydb *p, policydb 562 security/selinux/ss/mls.c void mls_export_netlbl_lvl(struct policydb *p, policydb 583 security/selinux/ss/mls.c void mls_import_netlbl_lvl(struct policydb *p, policydb 604 security/selinux/ss/mls.c int mls_export_netlbl_cat(struct policydb *p, policydb 633 security/selinux/ss/mls.c int mls_import_netlbl_cat(struct policydb *p, policydb 28 security/selinux/ss/mls.h int mls_compute_context_len(struct policydb *p, struct context *context); policydb 29 security/selinux/ss/mls.h void mls_sid_to_context(struct policydb *p, struct context *context, policydb 31 security/selinux/ss/mls.h int mls_context_isvalid(struct policydb *p, struct context *c); policydb 32 security/selinux/ss/mls.h int mls_range_isvalid(struct policydb *p, struct mls_range *r); policydb 33 security/selinux/ss/mls.h int mls_level_isvalid(struct policydb *p, struct mls_level *l); policydb 35 security/selinux/ss/mls.h int mls_context_to_sid(struct policydb *p, policydb 42 security/selinux/ss/mls.h int mls_from_string(struct policydb *p, char *str, struct context *context, policydb 47 security/selinux/ss/mls.h int mls_convert_context(struct policydb *oldp, policydb 48 security/selinux/ss/mls.h struct policydb *newp, policydb 52 security/selinux/ss/mls.h int mls_compute_sid(struct policydb *p, policydb 60 security/selinux/ss/mls.h int mls_setup_user_range(struct policydb *p, policydb 65 security/selinux/ss/mls.h void mls_export_netlbl_lvl(struct policydb *p, policydb 68 security/selinux/ss/mls.h void mls_import_netlbl_lvl(struct policydb *p, policydb 71 security/selinux/ss/mls.h int mls_export_netlbl_cat(struct policydb *p, policydb 74 security/selinux/ss/mls.h int mls_import_netlbl_cat(struct policydb *p, policydb 78 security/selinux/ss/mls.h static inline void mls_export_netlbl_lvl(struct policydb *p, policydb 84 security/selinux/ss/mls.h static inline void mls_import_netlbl_lvl(struct policydb *p, policydb 90 security/selinux/ss/mls.h static inline int mls_export_netlbl_cat(struct policydb *p, policydb 96 security/selinux/ss/mls.h static inline int mls_import_netlbl_cat(struct policydb *p, policydb 371 security/selinux/ss/policydb.c static int roles_init(struct policydb *p) policydb 468 security/selinux/ss/policydb.c static int policydb_init(struct policydb *p) policydb 532 security/selinux/ss/policydb.c struct policydb *p; policydb 547 security/selinux/ss/policydb.c struct policydb *p; policydb 562 security/selinux/ss/policydb.c struct policydb *p; policydb 579 security/selinux/ss/policydb.c struct policydb *p; policydb 599 security/selinux/ss/policydb.c struct policydb *p; policydb 616 security/selinux/ss/policydb.c struct policydb *p; policydb 635 security/selinux/ss/policydb.c struct policydb *p; policydb 694 security/selinux/ss/policydb.c static int policydb_index(struct policydb *p) policydb 762 security/selinux/ss/policydb.c void policydb_destroy(struct policydb *p) policydb 850 security/selinux/ss/policydb.c int policydb_load_isids(struct policydb *p, struct sidtab *s) policydb 890 security/selinux/ss/policydb.c int policydb_class_isvalid(struct policydb *p, unsigned int class) policydb 897 security/selinux/ss/policydb.c int policydb_role_isvalid(struct policydb *p, unsigned int role) policydb 904 security/selinux/ss/policydb.c int policydb_type_isvalid(struct policydb *p, unsigned int type) policydb 915 security/selinux/ss/policydb.c int policydb_context_isvalid(struct policydb *p, struct context *c) policydb 1020 security/selinux/ss/policydb.c struct policydb *p, policydb 1082 security/selinux/ss/policydb.c static int perm_read(struct policydb *p, struct hashtab *h, void *fp) policydb 1115 security/selinux/ss/policydb.c static int common_read(struct policydb *p, struct hashtab *h, void *fp) policydb 1184 security/selinux/ss/policydb.c static int read_cons_helper(struct policydb *p, policydb 1280 security/selinux/ss/policydb.c static int class_read(struct policydb *p, struct hashtab *h, void *fp) policydb 1374 security/selinux/ss/policydb.c static int role_read(struct policydb *p, struct hashtab *h, void *fp) policydb 1430 security/selinux/ss/policydb.c static int type_read(struct policydb *p, struct hashtab *h, void *fp) policydb 1504 security/selinux/ss/policydb.c static int user_read(struct policydb *p, struct hashtab *h, void *fp) policydb 1554 security/selinux/ss/policydb.c static int sens_read(struct policydb *p, struct hashtab *h, void *fp) policydb 1595 security/selinux/ss/policydb.c static int cat_read(struct policydb *p, struct hashtab *h, void *fp) policydb 1628 security/selinux/ss/policydb.c static int (*read_f[SYM_NUM]) (struct policydb *p, struct hashtab *h, void *fp) = policydb 1643 security/selinux/ss/policydb.c struct policydb *p = datap; policydb 1679 security/selinux/ss/policydb.c struct policydb *p = datap; policydb 1715 security/selinux/ss/policydb.c struct policydb *p = datap; policydb 1742 security/selinux/ss/policydb.c static int policydb_bounds_sanity_check(struct policydb *p) policydb 1767 security/selinux/ss/policydb.c u16 string_to_security_class(struct policydb *p, const char *name) policydb 1778 security/selinux/ss/policydb.c u32 string_to_av_perm(struct policydb *p, u16 tclass, const char *name) policydb 1801 security/selinux/ss/policydb.c static int range_read(struct policydb *p, void *fp) policydb 1873 security/selinux/ss/policydb.c static int filename_trans_read(struct policydb *p, void *fp) policydb 1955 security/selinux/ss/policydb.c static int genfs_read(struct policydb *p, void *fp) policydb 2068 security/selinux/ss/policydb.c static int ocontext_read(struct policydb *p, struct policydb_compat_info *info, policydb 2254 security/selinux/ss/policydb.c int policydb_read(struct policydb *p, void *fp) policydb 2648 security/selinux/ss/policydb.c static int role_trans_write(struct policydb *p, void *fp) policydb 2709 security/selinux/ss/policydb.c static int context_write(struct policydb *p, struct context *c, policydb 2806 security/selinux/ss/policydb.c static int write_cons_helper(struct policydb *p, struct constraint_node *node, policydb 2859 security/selinux/ss/policydb.c struct policydb *p = pd->p; policydb 2947 security/selinux/ss/policydb.c struct policydb *p = pd->p; policydb 2985 security/selinux/ss/policydb.c struct policydb *p = pd->p; policydb 3026 security/selinux/ss/policydb.c struct policydb *p = pd->p; policydb 3075 security/selinux/ss/policydb.c static int ocontext_write(struct policydb *p, struct policydb_compat_info *info, policydb 3205 security/selinux/ss/policydb.c static int genfs_write(struct policydb *p, void *fp) policydb 3272 security/selinux/ss/policydb.c struct policydb *p = pd->p; policydb 3293 security/selinux/ss/policydb.c static int range_write(struct policydb *p, void *fp) policydb 3352 security/selinux/ss/policydb.c static int filename_trans_write(struct policydb *p, void *fp) policydb 3383 security/selinux/ss/policydb.c int policydb_write(struct policydb *p, void *fp) policydb 311 security/selinux/ss/policydb.h extern void policydb_destroy(struct policydb *p); policydb 312 security/selinux/ss/policydb.h extern int policydb_load_isids(struct policydb *p, struct sidtab *s); policydb 313 security/selinux/ss/policydb.h extern int policydb_context_isvalid(struct policydb *p, struct context *c); policydb 314 security/selinux/ss/policydb.h extern int policydb_class_isvalid(struct policydb *p, unsigned int class); policydb 315 security/selinux/ss/policydb.h extern int policydb_type_isvalid(struct policydb *p, unsigned int type); policydb 316 security/selinux/ss/policydb.h extern int policydb_role_isvalid(struct policydb *p, unsigned int role); policydb 317 security/selinux/ss/policydb.h extern int policydb_read(struct policydb *p, void *fp); policydb 318 security/selinux/ss/policydb.h extern int policydb_write(struct policydb *p, void *fp); policydb 340 security/selinux/ss/policydb.h struct policydb *p; policydb 366 security/selinux/ss/policydb.h static inline char *sym_name(struct policydb *p, unsigned int sym_num, unsigned int element_nr) policydb 371 security/selinux/ss/policydb.h extern u16 string_to_security_class(struct policydb *p, const char *name); policydb 372 security/selinux/ss/policydb.h extern u32 string_to_av_perm(struct policydb *p, u16 tclass, const char *name); policydb 89 security/selinux/ss/services.c static int context_struct_to_string(struct policydb *policydb, policydb 94 security/selinux/ss/services.c static void context_struct_compute_av(struct policydb *policydb, policydb 101 security/selinux/ss/services.c static int selinux_set_mapping(struct policydb *pol, policydb 246 security/selinux/ss/services.c struct policydb *p = &state->ss->policydb; policydb 262 security/selinux/ss/services.c static int constraint_expr_eval(struct policydb *policydb, policydb 307 security/selinux/ss/services.c r1 = policydb->role_val_to_struct[val1 - 1]; policydb 308 security/selinux/ss/services.c r2 = policydb->role_val_to_struct[val2 - 1]; policydb 453 security/selinux/ss/services.c static void security_dump_masked_av(struct policydb *policydb, policydb 474 security/selinux/ss/services.c tclass_name = sym_name(policydb, SYM_CLASSES, tclass - 1); policydb 475 security/selinux/ss/services.c tclass_dat = policydb->class_val_to_struct[tclass - 1]; policydb 489 security/selinux/ss/services.c if (context_struct_to_string(policydb, scontext, policydb 493 security/selinux/ss/services.c if (context_struct_to_string(policydb, tcontext, policydb 532 security/selinux/ss/services.c static void type_attribute_bounds_av(struct policydb *policydb, policydb 545 security/selinux/ss/services.c source = policydb->type_val_to_struct[scontext->type - 1]; policydb 551 security/selinux/ss/services.c target = policydb->type_val_to_struct[tcontext->type - 1]; policydb 565 security/selinux/ss/services.c context_struct_compute_av(policydb, &lo_scontext, policydb 580 security/selinux/ss/services.c security_dump_masked_av(policydb, scontext, tcontext, policydb 613 security/selinux/ss/services.c static void context_struct_compute_av(struct policydb *policydb, policydb 637 security/selinux/ss/services.c if (unlikely(!tclass || tclass > policydb->p_classes.nprim)) { policydb 643 security/selinux/ss/services.c tclass_datum = policydb->class_val_to_struct[tclass - 1]; policydb 651 security/selinux/ss/services.c sattr = &policydb->type_attr_map_array[scontext->type - 1]; policydb 652 security/selinux/ss/services.c tattr = &policydb->type_attr_map_array[tcontext->type - 1]; policydb 657 security/selinux/ss/services.c for (node = avtab_search_node(&policydb->te_avtab, policydb 672 security/selinux/ss/services.c cond_compute_av(&policydb->te_cond_avtab, &avkey, policydb 685 security/selinux/ss/services.c !constraint_expr_eval(policydb, scontext, tcontext, NULL, policydb 697 security/selinux/ss/services.c if (tclass == policydb->process_class && policydb 698 security/selinux/ss/services.c (avd->allowed & policydb->process_trans_perms) && policydb 700 security/selinux/ss/services.c for (ra = policydb->role_allow; ra; ra = ra->next) { policydb 706 security/selinux/ss/services.c avd->allowed &= ~policydb->process_trans_perms; policydb 714 security/selinux/ss/services.c type_attribute_bounds_av(policydb, scontext, tcontext, policydb 724 security/selinux/ss/services.c struct policydb *p = &state->ss->policydb; policydb 752 security/selinux/ss/services.c struct policydb *policydb; policydb 768 security/selinux/ss/services.c policydb = &state->ss->policydb; policydb 776 security/selinux/ss/services.c if (!tclass || tclass > policydb->p_classes.nprim) { policydb 780 security/selinux/ss/services.c tclass_datum = policydb->class_val_to_struct[tclass - 1]; policydb 808 security/selinux/ss/services.c if (!constraint_expr_eval(policydb, ocontext, ncontext, policydb 856 security/selinux/ss/services.c struct policydb *policydb; policydb 868 security/selinux/ss/services.c policydb = &state->ss->policydb; policydb 894 security/selinux/ss/services.c type = policydb->type_val_to_struct[index - 1]; policydb 915 security/selinux/ss/services.c if (!context_struct_to_string(policydb, old_context, policydb 917 security/selinux/ss/services.c !context_struct_to_string(policydb, new_context, policydb 1005 security/selinux/ss/services.c struct policydb *policydb; policydb 1025 security/selinux/ss/services.c policydb = &state->ss->policydb; policydb 1044 security/selinux/ss/services.c if (policydb->allow_unknown) policydb 1050 security/selinux/ss/services.c if (unlikely(!tclass || tclass > policydb->p_classes.nprim)) { policydb 1057 security/selinux/ss/services.c sattr = &policydb->type_attr_map_array[scontext->type - 1]; policydb 1058 security/selinux/ss/services.c tattr = &policydb->type_attr_map_array[tcontext->type - 1]; policydb 1063 security/selinux/ss/services.c for (node = avtab_search_node(&policydb->te_avtab, policydb 1069 security/selinux/ss/services.c cond_compute_xperms(&policydb->te_cond_avtab, policydb 1099 security/selinux/ss/services.c struct policydb *policydb; policydb 1110 security/selinux/ss/services.c policydb = &state->ss->policydb; policydb 1121 security/selinux/ss/services.c if (ebitmap_get_bit(&policydb->permissive_map, scontext->type)) policydb 1133 security/selinux/ss/services.c if (policydb->allow_unknown) policydb 1137 security/selinux/ss/services.c context_struct_compute_av(policydb, scontext, tcontext, tclass, avd, policydb 1140 security/selinux/ss/services.c policydb->allow_unknown); policydb 1155 security/selinux/ss/services.c struct policydb *policydb; policydb 1164 security/selinux/ss/services.c policydb = &state->ss->policydb; policydb 1175 security/selinux/ss/services.c if (ebitmap_get_bit(&policydb->permissive_map, scontext->type)) policydb 1186 security/selinux/ss/services.c if (policydb->allow_unknown) policydb 1191 security/selinux/ss/services.c context_struct_compute_av(policydb, scontext, tcontext, tclass, avd, policydb 1208 security/selinux/ss/services.c static int context_struct_to_string(struct policydb *p, policydb 1272 security/selinux/ss/services.c struct policydb *policydb; policydb 1303 security/selinux/ss/services.c policydb = &state->ss->policydb; policydb 1318 security/selinux/ss/services.c rc = context_struct_to_string(policydb, context, scontext, policydb 1374 security/selinux/ss/services.c static int string_to_context_struct(struct policydb *pol, policydb 1457 security/selinux/ss/services.c struct policydb *policydb; policydb 1494 security/selinux/ss/services.c policydb = &state->ss->policydb; policydb 1496 security/selinux/ss/services.c rc = string_to_context_struct(policydb, sidtab, scontext2, policydb 1582 security/selinux/ss/services.c struct policydb *policydb = &state->ss->policydb; policydb 1587 security/selinux/ss/services.c if (context_struct_to_string(policydb, scontext, &s, &slen)) policydb 1589 security/selinux/ss/services.c if (context_struct_to_string(policydb, tcontext, &t, &tlen)) policydb 1591 security/selinux/ss/services.c if (context_struct_to_string(policydb, newcontext, &n, &nlen)) policydb 1599 security/selinux/ss/services.c s, t, sym_name(policydb, SYM_CLASSES, tclass-1)); policydb 1610 security/selinux/ss/services.c static void filename_compute_type(struct policydb *policydb, policydb 1623 security/selinux/ss/services.c if (!ebitmap_get_bit(&policydb->filename_trans_ttypes, ttype)) policydb 1631 security/selinux/ss/services.c otype = hashtab_search(policydb->filename_trans, &ft); policydb 1645 security/selinux/ss/services.c struct policydb *policydb; policydb 1682 security/selinux/ss/services.c policydb = &state->ss->policydb; policydb 1700 security/selinux/ss/services.c if (tclass && tclass <= policydb->p_classes.nprim) policydb 1701 security/selinux/ss/services.c cladatum = policydb->class_val_to_struct[tclass - 1]; policydb 1727 security/selinux/ss/services.c if ((tclass == policydb->process_class) || (sock == true)) policydb 1739 security/selinux/ss/services.c if ((tclass == policydb->process_class) || (sock == true)) { policydb 1753 security/selinux/ss/services.c avdatum = avtab_search(&policydb->te_avtab, &avkey); policydb 1757 security/selinux/ss/services.c node = avtab_search_node(&policydb->te_cond_avtab, &avkey); policydb 1773 security/selinux/ss/services.c filename_compute_type(policydb, &newcontext, scontext->type, policydb 1779 security/selinux/ss/services.c for (roletr = policydb->role_tr; roletr; policydb 1793 security/selinux/ss/services.c rc = mls_compute_sid(policydb, scontext, tcontext, tclass, specified, policydb 1799 security/selinux/ss/services.c if (!policydb_context_isvalid(policydb, &newcontext)) { policydb 1899 security/selinux/ss/services.c struct policydb *policydb = &state->ss->policydb; policydb 1906 security/selinux/ss/services.c if (!context_struct_to_string(policydb, context, &s, &len)) { policydb 1916 security/selinux/ss/services.c struct policydb *oldp; policydb 1917 security/selinux/ss/services.c struct policydb *newp; policydb 2052 security/selinux/ss/services.c struct policydb *p = &state->ss->policydb; policydb 2072 security/selinux/ss/services.c struct policydb *newpolicydb); policydb 2086 security/selinux/ss/services.c struct policydb *policydb; policydb 2088 security/selinux/ss/services.c struct policydb *oldpolicydb, *newpolicydb; policydb 2104 security/selinux/ss/services.c policydb = &state->ss->policydb; policydb 2113 security/selinux/ss/services.c rc = policydb_read(policydb, fp); policydb 2119 security/selinux/ss/services.c policydb->len = len; policydb 2120 security/selinux/ss/services.c rc = selinux_set_mapping(policydb, secclass_map, policydb 2124 security/selinux/ss/services.c policydb_destroy(policydb); policydb 2128 security/selinux/ss/services.c rc = policydb_load_isids(policydb, newsidtab); policydb 2131 security/selinux/ss/services.c policydb_destroy(policydb); policydb 2156 security/selinux/ss/services.c if (policydb->mls_enabled && !newpolicydb->mls_enabled) policydb 2158 security/selinux/ss/services.c else if (!policydb->mls_enabled && newpolicydb->mls_enabled) policydb 2186 security/selinux/ss/services.c args.oldp = policydb; policydb 2202 security/selinux/ss/services.c memcpy(oldpolicydb, policydb, sizeof(*policydb)); policydb 2206 security/selinux/ss/services.c memcpy(policydb, newpolicydb, sizeof(*policydb)); policydb 2243 security/selinux/ss/services.c struct policydb *p = &state->ss->policydb; policydb 2262 security/selinux/ss/services.c struct policydb *policydb; policydb 2269 security/selinux/ss/services.c policydb = &state->ss->policydb; policydb 2272 security/selinux/ss/services.c c = policydb->ocontexts[OCON_PORT]; policydb 2308 security/selinux/ss/services.c struct policydb *policydb; policydb 2315 security/selinux/ss/services.c policydb = &state->ss->policydb; policydb 2318 security/selinux/ss/services.c c = policydb->ocontexts[OCON_IBPKEY]; policydb 2354 security/selinux/ss/services.c struct policydb *policydb; policydb 2361 security/selinux/ss/services.c policydb = &state->ss->policydb; policydb 2364 security/selinux/ss/services.c c = policydb->ocontexts[OCON_IBENDPORT]; policydb 2400 security/selinux/ss/services.c struct policydb *policydb; policydb 2407 security/selinux/ss/services.c policydb = &state->ss->policydb; policydb 2410 security/selinux/ss/services.c c = policydb->ocontexts[OCON_NETIF]; policydb 2465 security/selinux/ss/services.c struct policydb *policydb; policydb 2472 security/selinux/ss/services.c policydb = &state->ss->policydb; policydb 2485 security/selinux/ss/services.c c = policydb->ocontexts[OCON_NODE]; policydb 2498 security/selinux/ss/services.c c = policydb->ocontexts[OCON_NODE6]; policydb 2554 security/selinux/ss/services.c struct policydb *policydb; policydb 2572 security/selinux/ss/services.c policydb = &state->ss->policydb; policydb 2583 security/selinux/ss/services.c user = hashtab_search(policydb->p_users.table, username); policydb 2595 security/selinux/ss/services.c role = policydb->role_val_to_struct[i]; policydb 2600 security/selinux/ss/services.c if (mls_setup_user_range(policydb, fromcon, user, policydb 2674 security/selinux/ss/services.c struct policydb *policydb = &state->ss->policydb; policydb 2688 security/selinux/ss/services.c for (genfs = policydb->genfs; genfs; genfs = genfs->next) { policydb 2751 security/selinux/ss/services.c struct policydb *policydb; policydb 2760 security/selinux/ss/services.c policydb = &state->ss->policydb; policydb 2763 security/selinux/ss/services.c c = policydb->ocontexts[OCON_FSUSE]; policydb 2798 security/selinux/ss/services.c struct policydb *policydb; policydb 2810 security/selinux/ss/services.c policydb = &state->ss->policydb; policydb 2816 security/selinux/ss/services.c *len = policydb->p_bools.nprim; policydb 2831 security/selinux/ss/services.c (*values)[i] = policydb->bool_val_to_struct[i]->state; policydb 2834 security/selinux/ss/services.c (*names)[i] = kstrdup(sym_name(policydb, SYM_BOOLS, i), policydb 2855 security/selinux/ss/services.c struct policydb *policydb; policydb 2862 security/selinux/ss/services.c policydb = &state->ss->policydb; policydb 2865 security/selinux/ss/services.c lenp = policydb->p_bools.nprim; policydb 2870 security/selinux/ss/services.c if (!!values[i] != policydb->bool_val_to_struct[i]->state) { policydb 2874 security/selinux/ss/services.c sym_name(policydb, SYM_BOOLS, i), policydb 2876 security/selinux/ss/services.c policydb->bool_val_to_struct[i]->state, policydb 2881 security/selinux/ss/services.c policydb->bool_val_to_struct[i]->state = 1; policydb 2883 security/selinux/ss/services.c policydb->bool_val_to_struct[i]->state = 0; policydb 2886 security/selinux/ss/services.c for (cur = policydb->cond_list; cur; cur = cur->next) { policydb 2887 security/selinux/ss/services.c rc = evaluate_cond_node(policydb, cur); policydb 2908 security/selinux/ss/services.c struct policydb *policydb; policydb 2914 security/selinux/ss/services.c policydb = &state->ss->policydb; policydb 2917 security/selinux/ss/services.c len = policydb->p_bools.nprim; policydb 2921 security/selinux/ss/services.c rc = policydb->bool_val_to_struct[index]->state; policydb 2928 security/selinux/ss/services.c struct policydb *policydb) policydb 2939 security/selinux/ss/services.c booldatum = hashtab_search(policydb->p_bools.table, bnames[i]); policydb 2943 security/selinux/ss/services.c for (cur = policydb->cond_list; cur; cur = cur->next) { policydb 2944 security/selinux/ss/services.c rc = evaluate_cond_node(policydb, cur); policydb 2966 security/selinux/ss/services.c struct policydb *policydb = &state->ss->policydb; policydb 2976 security/selinux/ss/services.c if (!state->initialized || !policydb->mls_enabled) { policydb 3009 security/selinux/ss/services.c if (!policydb_context_isvalid(policydb, &newcon)) { policydb 3012 security/selinux/ss/services.c if (!context_struct_to_string(policydb, &newcon, &s, policydb 3063 security/selinux/ss/services.c struct policydb *policydb = &state->ss->policydb; policydb 3091 security/selinux/ss/services.c if (!policydb->mls_enabled) policydb 3141 security/selinux/ss/services.c struct policydb *policydb = &state->ss->policydb; policydb 3153 security/selinux/ss/services.c *nclasses = policydb->p_classes.nprim; policydb 3158 security/selinux/ss/services.c rc = hashtab_map(policydb->p_classes.table, get_classes_callback, policydb 3188 security/selinux/ss/services.c struct policydb *policydb = &state->ss->policydb; policydb 3195 security/selinux/ss/services.c match = hashtab_search(policydb->p_classes.table, class); policydb 3234 security/selinux/ss/services.c return state->ss->policydb.reject_unknown; policydb 3239 security/selinux/ss/services.c return state->ss->policydb.allow_unknown; policydb 3255 security/selinux/ss/services.c struct policydb *policydb = &state->ss->policydb; policydb 3259 security/selinux/ss/services.c rc = ebitmap_get_bit(&policydb->policycaps, req_cap); policydb 3283 security/selinux/ss/services.c struct policydb *policydb = &state->ss->policydb; policydb 3334 security/selinux/ss/services.c userdatum = hashtab_search(policydb->p_users.table, rulestr); policydb 3342 security/selinux/ss/services.c roledatum = hashtab_search(policydb->p_roles.table, rulestr); policydb 3350 security/selinux/ss/services.c typedatum = hashtab_search(policydb->p_types.table, rulestr); policydb 3359 security/selinux/ss/services.c rc = mls_from_string(policydb, rulestr, &tmprule->au_ctxt, policydb 3586 security/selinux/ss/services.c struct policydb *policydb = &state->ss->policydb; policydb 3613 security/selinux/ss/services.c mls_import_netlbl_lvl(policydb, &ctx_new, secattr); policydb 3615 security/selinux/ss/services.c rc = mls_import_netlbl_cat(policydb, &ctx_new, secattr); policydb 3620 security/selinux/ss/services.c if (!mls_context_isvalid(policydb, &ctx_new)) policydb 3655 security/selinux/ss/services.c struct policydb *policydb = &state->ss->policydb; policydb 3670 security/selinux/ss/services.c secattr->domain = kstrdup(sym_name(policydb, SYM_TYPES, ctx->type - 1), policydb 3677 security/selinux/ss/services.c mls_export_netlbl_lvl(policydb, ctx, secattr); policydb 3678 security/selinux/ss/services.c rc = mls_export_netlbl_cat(policydb, ctx, secattr); policydb 3694 security/selinux/ss/services.c struct policydb *policydb = &state->ss->policydb; policydb 3711 security/selinux/ss/services.c rc = policydb_write(policydb, &fp); policydb 28 security/selinux/ss/services.h struct policydb policydb;