Lines Matching defs:policydb
57 #include <sepol/policydb/policydb.h>
58 #include <sepol/policydb/sidtab.h>
59 #include <sepol/policydb/services.h>
60 #include <sepol/policydb/conditional.h>
61 #include <sepol/policydb/util.h>
75 static policydb_t mypolicydb, *policydb = &mypolicydb;
129 policydb = p;
151 policydb = &mypolicydb;
218 if (policydb->policy_type == POLICY_KERN &&
219 policydb->policyvers >= POLICYDB_VERSION_CONSTRAINT_NAMES &&
250 policydb->p_user_val_to_name[i]);
254 policydb->p_role_val_to_name[i]);
258 policydb->p_type_val_to_name[i]);
342 policydb->p_class_val_to_name[tclass - 1]);
351 sepol_av_to_string(policydb, tclass,
527 r1 = policydb->role_val_to_struct[val1 - 1];
528 r2 = policydb->role_val_to_struct[val2 - 1];
863 source = policydb->type_val_to_struct[scontext->type - 1];
867 target = policydb->type_val_to_struct[tcontext->type - 1];
923 if (!tclass || tclass > policydb->p_classes.nprim) {
927 tclass_datum = policydb->class_val_to_struct[tclass - 1];
946 sattr = &policydb->type_attr_map[scontext->type - 1];
947 tattr = &policydb->type_attr_map[tcontext->type - 1];
953 avtab_search_node(&policydb->te_avtab, &avkey);
967 cond_compute_av(&policydb->te_cond_avtab, &avkey, avd);
1004 if (tclass == policydb->process_class &&
1005 (avd->allowed & policydb->process_trans_dyntrans) &&
1007 for (ra = policydb->role_allow; ra; ra = ra->next) {
1013 avd->allowed &= ~policydb->process_trans_dyntrans;
1044 if (!tclass || tclass > policydb->p_classes.nprim) {
1048 tclass_datum = policydb->class_val_to_struct[tclass - 1];
1185 tclass_datum = hashtab_search(policydb->p_classes.table,
1206 if (!tclass || tclass > policydb->p_classes.nprim) {
1210 tclass_datum = policydb->class_val_to_struct[tclass - 1];
1240 return sepol_av_to_string(policydb, tclass, av);
1263 rc = context_to_string(NULL, policydb, context, scontext, scontext_len);
1280 if (context_from_string(NULL, policydb, &context,
1316 context_to_string(NULL, policydb, scontext, &s, &slen);
1317 context_to_string(NULL, policydb, tcontext, &t, &tlen);
1318 context_to_string(NULL, policydb, newcontext, &n, &nlen);
1321 n, s, t, policydb->p_class_val_to_name[tclass - 1]);
1355 if (tclass && tclass <= policydb->p_classes.nprim)
1356 cladatum = policydb->class_val_to_struct[tclass - 1];
1384 if (tclass == policydb->process_class)
1396 if (tclass == policydb->process_class) {
1410 avdatum = avtab_search(&policydb->te_avtab, &avkey);
1414 node = avtab_search_node(&policydb->te_cond_avtab, &avkey);
1432 for (roletr = policydb->role_tr; roletr;
1446 rc = mls_compute_sid(policydb, scontext, tcontext, tclass, specified,
1452 if (!policydb_context_isvalid(policydb, &newcontext)) {
1593 context_to_string(NULL, policydb, context, &s, &len);
1673 context_to_string(NULL, policydb, &oldc, &s, &len);
1812 (policydb->p_classes.table, validate_class, &newpolicydb)) {
1827 args.oldp = policydb;
1831 /* Save the old policydb and SID table to free later. */
1832 memcpy(&oldpolicydb, policydb, sizeof *policydb);
1835 /* Install the new policydb and SID table. */
1836 memcpy(policydb, &newpolicydb, sizeof *policydb);
1839 /* Free the old policydb and SID table. */
1866 c = policydb->ocontexts[OCON_FS];
1907 c = policydb->ocontexts[OCON_IBPKEY];
1944 c = policydb->ocontexts[OCON_IBENDPORT];
1982 c = policydb->ocontexts[OCON_PORT];
2021 c = policydb->ocontexts[OCON_NETIF];
2090 c = policydb->ocontexts[OCON_NODE];
2105 c = policydb->ocontexts[OCON_NODE6];
2165 user = (user_datum_t *) hashtab_search(policydb->p_users.table,
2180 role = policydb->role_val_to_struct[i];
2188 (fromcon, user, &usercon, policydb->mls))
2192 policydb->process_class,
2193 policydb->process_trans,
2195 if (rc || !(avd.allowed & policydb->process_trans))
2244 for (genfs = policydb->genfs; genfs; genfs = genfs->next) {
2287 c = policydb->ocontexts[OCON_FSUSE];
2305 rc = sepol_genfs_sid(fstype, "/", policydb->dir_class, sid);