Lines Matching refs:value

127 		p_out->value = string_to_security_class(pol, p_in->name);
128 if (!p_out->value) {
145 p_out->perms[k] = string_to_av_perm(pol, p_out->value,
179 return map->mapping[tclass].value;
185 * Get kernel value for class from its policy value
192 if (map->mapping[i].value == pol_value)
254 * Return the boolean value of a constraint expression
448 BUG_ON(pdatum->value < 1 || pdatum->value > 32);
450 permission_names[pdatum->value - 1] = (char *)k;
1448 ctx->user = usrdatum->value;
1463 ctx->role = role->value;
1476 ctx->type = typdatum->value;
1716 case SECCLASS_PROCESS: /* kernel value */
2040 newc->user = usrdatum->value;
2047 newc->role = role->value;
2054 newc->type = typdatum->value;
2066 * suitable default value, likely taken from one of the
2341 * @out_sid: pointer to the resulting SID value
2344 * on-demand when needed. Since updating the SID value is an SMP-sensitive
2737 usercon.user = user->value;
2788 SECCLASS_PROCESS, /* kernel value */
3244 * returns a negative value. A table summarizing the behavior is below:
3333 u32 value = datum->value - 1;
3335 classes[value] = kstrdup(name, GFP_ATOMIC);
3336 if (!classes[value])
3374 u32 value = datum->value - 1;
3376 perms[value] = kstrdup(name, GFP_ATOMIC);
3377 if (!perms[value])
3432 int value;
3439 value = policy->policydb.reject_unknown;
3441 return value;
3447 int value;
3454 value = policy->policydb.allow_unknown;
3456 return value;
3558 tmprule->au_ctxt.user = userdatum->value;
3567 tmprule->au_ctxt.role = roledatum->value;
3576 tmprule->au_ctxt.type = typedatum->value;