Lines Matching defs:data

244 	struct cil_tree_node *node = cil_common->datum.nodes->head->data;
263 struct cil_perm *curr = cil_perm->data;
293 struct cil_class *cil_class = curr_class->data;
335 struct cil_perm *cil_perm = curr->data;
341 struct cil_perm *cil_perm = curr->data;
798 cil_cat = curr_cat->data;
858 cil_sens = curr->data;
999 avtab_datum.data = res;
1007 if (existing->datum.data != res) {
1013 pdb->p_type_val_to_name[existing->datum.data - 1]);
1040 if (existing->datum.data != res) {
1046 pdb->p_type_val_to_name[existing->datum.data - 1]);
1080 rc = __cil_get_sepol_class_datum(pdb, DATUM(c->data), &sepol_obj);
1180 rc = __cil_get_sepol_class_datum(pdb, DATUM(c->data), &sepol_obj);
1324 uint32_t data = 0;
1327 cil_perm = curr_perm->data;
1330 rc = __perm_str_to_datum(key, sepol_class, &data);
1336 *datum = data;
1344 static int __cil_insert_avrule(policydb_t *pdb, uint32_t kind, uint32_t src, uint32_t tgt, uint32_t obj, uint32_t data, cond_node_t *cond_node, enum cil_flavor cond_flavor)
1374 avtab_datum.data = data;
1378 avtab_dup->data &= data;
1380 avtab_dup->data |= data;
1383 avtab_datum.data = data;
1397 uint32_t data = 0;
1402 rc = __cil_perms_to_datum(cp->perms, sepol_class, &data);
1405 if (data == 0) {
1411 data = ~data;
1420 rc = __cil_insert_avrule(pdb, kind, sepol_src->s.value, sepol_tgt->s.value, sepol_class->s.value, data, cond_node, cond_flavor);
1439 struct cil_classperms *cp = curr->data;
1448 struct cil_perm *cmp = i->data;
1456 struct cil_classperms_set *cp_set = curr->data;
1712 uint32_t data = 0;
1719 // setting the data for an extended avtab isn't really necessary because
1721 // the data value be set, so set it for that to work.
1722 rc = __perm_str_to_datum(CIL_KEY_IOCTL, sepol_obj, &data);
1726 avtab_datum.data = data;
1734 avtab_datum.xperms = item->data;
1746 free(item->data);
1828 rc = __cil_get_sepol_class_datum(pdb, DATUM(c->data), &sepol_obj);
1984 cil_typetrans = (struct cil_nametypetransition*)node->data;
1997 cil_type_rule = node->data;
2005 cil_avrule = node->data;
2033 *out = cil_strdup(DATUM(curr->data)->fqn);
2035 __cil_expr_to_string(curr->data, flavor, &c);
2041 *out = cil_strdup(curr->data);
2060 op = (enum cil_flavor)(uintptr_t)curr->data;
2117 char *key = DATUM(item->data)->fqn;
2129 struct cil_list *l = item->data;
2159 enum cil_flavor cil_op = (enum cil_flavor)(uintptr_t)item->data;
2308 struct cil_booleanif *cil_boolif = (struct cil_booleanif*)node->data;
2366 struct cil_condblock *cb = cb_node->data;
2450 rc = __cil_get_sepol_class_datum(pdb, DATUM(c->data), &sepol_obj);
2549 rc = __cil_expand_user(item->data, &user_bitmap);
2571 rc = __cil_expand_role(item->data, &role_bitmap);
2594 rc = __cil_get_sepol_type_datum(pdb, item->data, &sepol_type);
2596 if (FLAVOR(item->data) == CIL_TYPEATTRIBUTE) {
2597 struct cil_typeattribute *attr = item->data;
2613 rc = __cil_expand_type(item->data, &type_bitmap);
2645 enum cil_flavor l_operand = (enum cil_flavor)(uintptr_t)l_item->data;
2676 enum cil_flavor r_operand = (enum cil_flavor)(uintptr_t)r_item->data;
2691 enum cil_flavor r_operand = (enum cil_flavor)(uintptr_t)r_item->data;
2714 struct cil_list *r_expr = r_item->data;
2756 cil_op = (enum cil_flavor)(uintptr_t)item->data;
2799 struct cil_list *l_expr = item->next->data;
2808 struct cil_list *l_expr = item->next->data;
2809 struct cil_list *r_expr = item->next->next->data;
2943 struct cil_classperms *cp = curr->data;
2952 struct cil_perm *cmp = i->data;
2960 struct cil_classperms_set *cp_set = curr->data;
3003 rc = __cil_get_sepol_class_datum(pdb, DATUM(c->data), &sepol_class);
3034 struct cil_tree_node *node = NODE(i->data);
3037 struct cil_catset *cs = i->data;
3039 rc = __cil_get_sepol_cat_datum(pdb, j->data, &sepol_cat);
3046 rc = __cil_get_sepol_cat_datum(pdb, i->data, &sepol_cat);
3076 struct cil_cats *cats = curr->data;
3224 struct cil_sid *cil_sid = (struct cil_sid*)curr->data;
3280 rc = __cil_get_sepol_class_datum(pdb, DATUM(c->data), &sepol_class);
3742 class_list = cil_expand_class(curr->data);
3745 int rc = __cil_get_sepol_class_datum(pdb, DATUM(c->data), &sepol_class);
3753 cil_log(CIL_ERR,"User default labeling for class %s already specified\n",DATUM(c->data)->fqn);
3761 cil_log(CIL_ERR,"Role default labeling for class %s already specified\n",DATUM(c->data)->fqn);
3769 cil_log(CIL_ERR,"Type default labeling for class %s already specified\n",DATUM(c->data)->fqn);
3797 class_list = cil_expand_class(curr->data);
3800 int rc = __cil_get_sepol_class_datum(pdb, DATUM(c->data), &sepol_class);
3806 cil_log(CIL_ERR,"Range default labeling for class %s already specified\n", DATUM(curr->data)->fqn);
3838 if (node != NODE(node->data)) {
3847 rc = cil_role_to_policydb(pdb, node->data);
3850 rc = cil_type_to_policydb(pdb, node->data, type_value_to_cil);
3853 rc = cil_typeattribute_to_policydb(pdb, node->data, type_value_to_cil);
3856 rc = cil_policycap_to_policydb(pdb, node->data);
3859 rc = cil_user_to_policydb(pdb, node->data);
3862 rc = cil_bool_to_policydb(pdb, node->data);
3866 rc = cil_catalias_to_policydb(pdb, node->data);
3871 rc = cil_sepol_level_define(pdb, node->data);
3881 rc = cil_type_bounds_to_policydb(pdb, node->data);
3884 rc = cil_typealias_to_policydb(pdb, node->data);
3887 rc = cil_typepermissive_to_policydb(pdb, node->data);
3890 rc = cil_typeattribute_to_bitmap(pdb, db, node->data);
3894 rc = cil_sensalias_to_policydb(pdb, node->data);
3898 rc = cil_role_bounds_to_policydb(pdb, node->data);
3900 rc = cil_roletype_to_policydb(pdb, db, node->data);
3903 rc = cil_user_bounds_to_policydb(pdb, node->data);
3906 rc = cil_userlevel_userrange_to_policydb(pdb, node->data);
3911 rc = cil_userrole_to_policydb(pdb, db, node->data);
3914 rc = cil_type_rule_to_policydb(pdb, db, node->data);
3918 struct cil_avrule *rule = node->data;
3926 rc = cil_roletrans_to_policydb(pdb, db, node->data, role_trans_table);
3929 /*rc = cil_roleattributeset_to_policydb(pdb, node->data);*/
3932 rc = cil_typetransition_to_policydb(pdb, db, node->data);
3935 rc = cil_constrain_to_policydb(pdb, db, node->data);
3939 rc = cil_constrain_to_policydb(pdb, db, node->data);
3943 rc = cil_validatetrans_to_policydb(pdb, db, node->data);
3947 rc = cil_validatetrans_to_policydb(pdb, db, node->data);
3952 rc = cil_rangetransition_to_policydb(pdb, db, node->data);
3958 rc = cil_default_to_policydb(pdb, node->data);
3961 rc = cil_defaultrange_to_policydb(pdb, node->data);
3973 struct cil_avrule *rule = node->data;
3975 rc = cil_avrule_to_policydb(pdb, db, node->data);
3980 struct cil_avrule *rule = node->data;
3982 rc = cil_avrulex_to_hashtable(pdb, db, node->data, args);
3987 rc = cil_roleallow_to_policydb(pdb, db, node->data);
4008 struct cil_block *blk = node->data;
4101 static int __cil_common_val_array_insert(hashtab_key_t key, hashtab_datum_t datum, void *data)
4103 policydb_t *pdb = data;
4114 static int __cil_class_val_array_insert(hashtab_key_t key, hashtab_datum_t datum, void *data)
4116 policydb_t *pdb = data;
4128 static int __cil_role_val_array_insert(hashtab_key_t key, hashtab_datum_t datum, void *data)
4130 policydb_t *pdb = data;
4142 static int __cil_type_val_array_insert(hashtab_key_t key, hashtab_datum_t datum, void *data)
4144 policydb_t *pdb = data;
4156 static int __cil_user_val_array_insert(hashtab_key_t key, hashtab_datum_t datum, void *data)
4158 policydb_t *pdb = data;
4170 static int __cil_bool_val_array_insert(hashtab_key_t key, hashtab_datum_t datum, void *data)
4172 policydb_t *pdb = data;
4184 static int __cil_level_val_array_insert(hashtab_key_t key, hashtab_datum_t datum, void *data)
4186 policydb_t *pdb = data;
4197 static int __cil_cat_val_array_insert(hashtab_key_t key, hashtab_datum_t datum, void *data)
4199 policydb_t *pdb = data;
4489 struct cil_classperms *cp = i->data;
4493 uint32_t data = 0;
4498 rc = __cil_perms_to_datum(cp->perms, sepol_class, &data);
4500 if (data != 0) { /* Only add if there are permissions */
4503 cpn->data = data;
4510 struct cil_perm *cmp = j->data;
4518 struct cil_classperms_set *cp_set = i->data;
4539 uint32_t data = 0;
4545 rc = __cil_get_sepol_class_datum(pdb, DATUM(c->data), &sepol_obj);
4559 rc = __perm_str_to_datum(perm_str, sepol_obj, &data);
4566 cpn->data = data;
4675 struct cil_classperms *cp = i1->data;
4678 cil_log(CIL_ERR,"%s",DATUM(i2->data)->fqn);
4686 struct cil_classperms_set *cp_set = i1->data;
4733 struct cil_avrule *cil_rule = node->data;
4773 n2 = i2->data;
4774 r2 = n2->data;
4793 struct cil_avrule *cil_rule = node->data;
4850 rule->xperms = item->data;
4865 free(item->data);
4866 item->data = NULL;
4883 rc = cil_check_neverallow(db, pdb, item->data, violation);
4893 static struct cil_list *cil_classperms_from_sepol(policydb_t *pdb, uint16_t class, uint32_t data, struct cil_class *class_value_to_cil[], struct cil_perm **perm_value_to_cil[])
4908 if ((data & (UINT32_C(1) << i)) == 0) continue;
4936 cil_rule->perms.classperms = cil_classperms_from_sepol(pdb, k->target_class, d->data, class_value_to_cil, perm_value_to_cil);
5011 struct cil_tree_node *n2 = i2->data;
5012 struct cil_avrule *r2 = n2->data;