Lines Matching refs:value

131 		p_out->value = string_to_security_class(pol, p_in->name);
132 if (!p_out->value) {
149 p_out->perms[k] = string_to_av_perm(pol, p_out->value,
183 return map->mapping[tclass].value;
189 * Get kernel value for class from its policy value
196 if (map->mapping[i].value == pol_value)
258 * Return the boolean value of a constraint expression
452 BUG_ON(pdatum->value < 1 || pdatum->value > 32);
454 permission_names[pdatum->value - 1] = (char *)k;
1467 ctx->user = usrdatum->value;
1482 ctx->role = role->value;
1495 ctx->type = typdatum->value;
1740 case SECCLASS_PROCESS: /* kernel value */
2070 newc->user = usrdatum->value;
2078 newc->role = role->value;
2087 newc->type = typdatum->value;
2099 * suitable default value, likely taken from one of the
2377 * @out_sid: pointer to the resulting SID value
2380 * on-demand when needed. Since updating the SID value is an SMP-sensitive
2779 usercon.user = user->value;
2831 SECCLASS_PROCESS, /* kernel value */
3289 * returns a negative value. A table summarizing the behavior is below:
3379 int value = datum->value - 1;
3381 classes[value] = kstrdup(name, GFP_ATOMIC);
3382 if (!classes[value])
3419 int value = datum->value - 1;
3421 perms[value] = kstrdup(name, GFP_ATOMIC);
3422 if (!perms[value])
3476 int value;
3483 value = policy->policydb.reject_unknown;
3485 return value;
3491 int value;
3498 value = policy->policydb.allow_unknown;
3500 return value;
3605 tmprule->au_ctxt.user = userdatum->value;
3613 tmprule->au_ctxt.role = roledatum->value;
3621 tmprule->au_ctxt.type = typedatum->value;