Lines Matching refs:fp

54 	struct policy_file *fp;
59 avrule_t * avrules, struct policy_file *fp);
61 static int ebitmap_write(ebitmap_t * e, struct policy_file *fp)
76 items = put_entry(buf, sizeof(uint32_t), 3, fp);
82 items = put_entry(&bit, sizeof(uint32_t), 1, fp);
86 items = put_entry(&map, sizeof(uint64_t), 1, fp);
106 avtab_ptr_t cur, struct policy_file *fp,
160 ERR(fp->handle, "null entry");
164 ERR(fp->handle, "entry has both access "
190 ERR(fp->handle, "missing node");
206 ERR(fp->handle, "data count wrong");
214 items2 = put_entry(buf32, sizeof(uint32_t), items, fp);
227 items = put_entry(buf16, sizeof(uint16_t), 4, fp);
232 ERR(fp->handle, "policy version %u does not support ioctl extended"
239 ERR(fp->handle, "Target platform %s does not support ioctl "
247 items = put_entry(&buf8, sizeof(uint8_t),1,fp);
251 items = put_entry(&buf8, sizeof(uint8_t),1,fp);
256 items = put_entry(buf32, sizeof(uint32_t),8,fp);
261 items = put_entry(buf32, sizeof(uint32_t), 1, fp);
279 static int avtab_write(struct policydb *p, avtab_t * a, struct policy_file *fp)
307 items = put_entry(&nel, sizeof(uint32_t), 1, fp);
316 if (avtab_write_item(p, cur, fp, 1, !oldvers, &nel)) {
327 items = put_entry(&nel, sizeof(uint32_t), 1, fp);
335 if (avtab_write_item(p, cur, fp, 1, 1, NULL)) {
355 struct policy_file *fp)
366 items = put_entry(buf, sizeof(uint32_t), 2, fp);
373 items = put_entry(buf, sizeof(uint32_t), 2, fp);
386 struct policy_file *fp)
390 rc = mls_write_semantic_level_helper(&r->level[0], fp);
394 rc = mls_write_semantic_level_helper(&r->level[1], fp);
403 static int mls_write_level(mls_level_t * l, struct policy_file *fp)
409 items = put_entry(&sens, sizeof(uint32_t), 1, fp);
413 if (ebitmap_write(&l->cat, fp))
423 static int mls_write_range_helper(mls_range_t * r, struct policy_file *fp)
437 items2 = put_entry(buf, sizeof(uint32_t), items, fp);
441 if (ebitmap_write(&r->level[0].cat, fp))
444 if (ebitmap_write(&r->level[1].cat, fp))
456 struct policy_file *fp = pd->fp;
464 items2 = put_entry(buf, sizeof(uint32_t), items, fp);
468 items = put_entry(key, 1, len, fp);
472 if (mls_write_level(levdatum->level, fp))
484 struct policy_file *fp = pd->fp;
493 items2 = put_entry(buf, sizeof(uint32_t), items, fp);
497 items = put_entry(key, 1, len, fp);
504 static int role_trans_write(policydb_t *p, struct policy_file *fp)
520 items = put_entry(buf, sizeof(uint32_t), 1, fp);
526 WARN(fp->handle, "Discarding role_transition "
535 items = put_entry(buf, sizeof(uint32_t), 3, fp);
540 items = put_entry(buf, sizeof(uint32_t), 1, fp);
549 static int role_allow_write(role_allow_t * r, struct policy_file *fp)
559 items = put_entry(buf, sizeof(uint32_t), 1, fp);
565 items = put_entry(buf, sizeof(uint32_t), 2, fp);
579 void *fp = ptr;
585 items = put_entry(buf, sizeof(uint32_t), 1, fp);
589 items = put_entry(ft->name, sizeof(char), len, fp);
597 items = put_entry(buf, sizeof(uint32_t), 4, fp);
614 void *fp = ptr;
618 items = put_entry(buf, sizeof(uint32_t), 1, fp);
622 items = put_entry(ft->name, sizeof(char), len, fp);
636 items = put_entry(buf, sizeof(uint32_t), 3, fp);
642 if (ebitmap_write(&datum->stypes, fp))
646 items = put_entry(buf, sizeof(uint32_t), 1, fp);
656 static int filename_trans_write(struct policydb *p, void *fp)
667 items = put_entry(buf, sizeof(uint32_t), 1, fp);
672 fp);
675 items = put_entry(buf, sizeof(uint32_t), 1, fp);
679 rc = hashtab_map(p->filename_trans, filename_write_one, fp);
684 static int role_set_write(role_set_t * x, struct policy_file *fp)
689 if (ebitmap_write(&x->roles, fp))
693 items = put_entry(buf, sizeof(uint32_t), 1, fp);
700 static int type_set_write(type_set_t * x, struct policy_file *fp)
705 if (ebitmap_write(&x->types, fp))
707 if (ebitmap_write(&x->negset, fp))
711 items = put_entry(buf, sizeof(uint32_t), 1, fp);
724 struct policy_file *fp = pd->fp;
734 items2 = put_entry(buf, sizeof(uint32_t), items, fp);
737 items = put_entry(key, 1, len, fp);
744 items = put_entry(buf, sizeof(uint32_t), 1, fp);
762 cond_av_list_t * list, struct policy_file *fp)
787 items = put_entry(buf, sizeof(uint32_t), 1, fp);
798 if (avtab_write_item(p, cur_list->node, fp, 0, 1, NULL))
813 cond_node_t * node, struct policy_file *fp)
820 items = put_entry(buf, sizeof(uint32_t), 1, fp);
830 items = put_entry(buf, sizeof(uint32_t), 1, fp);
838 items2 = put_entry(buf, sizeof(uint32_t), items, fp);
844 if (cond_write_av_list(p, node->true_list, fp) != 0)
846 if (cond_write_av_list(p, node->false_list, fp) != 0)
849 if (avrule_write_list(p, node->avtrue_list, fp))
851 if (avrule_write_list(p, node->avfalse_list, fp))
858 items = put_entry(buf, sizeof(uint32_t), 1, fp);
867 struct policy_file *fp)
877 items = put_entry(buf, sizeof(uint32_t), 1, fp);
882 if (cond_write_node(p, cur, fp) != 0)
893 struct policy_file *fp)
902 items2 = put_entry(buf, sizeof(uint32_t), items, fp);
909 if (mls_write_range_helper(&c->range, fp))
927 struct policy_file *fp = pd->fp;
935 items2 = put_entry(buf, sizeof(uint32_t), items, fp);
939 items = put_entry(key, 1, len, fp);
952 struct policy_file *fp = pd->fp;
962 items2 = put_entry(buf, sizeof(uint32_t), items, fp);
966 items = put_entry(key, 1, len, fp);
978 struct policy_file *fp)
992 items = put_entry(buf, sizeof(uint32_t), 2, fp);
999 items = put_entry(buf, sizeof(uint32_t), 3, fp);
1007 if (ebitmap_write(&e->names, fp)) {
1011 type_set_write(e->type_names, fp)) ||
1014 type_set_write(e->type_names, fp))) {
1034 struct policy_file *fp = pd->fp;
1060 items2 = put_entry(buf, sizeof(uint32_t), items, fp);
1064 items = put_entry(key, 1, len, fp);
1069 items = put_entry(cladatum->comkey, 1, len2, fp);
1076 if (write_cons_helper(p, cladatum->constraints, 0, fp))
1089 items = put_entry(buf, sizeof(uint32_t), 1, fp);
1092 if (write_cons_helper(p, cladatum->validatetrans, 1, fp))
1105 WARN(fp->handle,
1112 items = put_entry(buf, sizeof(uint32_t), 3, fp);
1122 items = put_entry(buf, sizeof(uint32_t), 1, fp);
1136 struct policy_file *fp = pd->fp;
1160 items2 = put_entry(buf, sizeof(uint32_t), items, fp);
1164 items = put_entry(key, 1, len, fp);
1168 if (ebitmap_write(&role->dominates, fp))
1184 if (ebitmap_write(&empty, fp))
1187 if (ebitmap_write(&role->types.types, fp))
1191 if (type_set_write(&role->types, fp))
1198 items = put_entry(buf, sizeof(uint32_t), 1, fp);
1202 if (ebitmap_write(&role->roles, fp))
1215 struct policy_file *fp = pd->fp;
1265 WARN(fp->handle, "Warning! Module policy "
1271 items2 = put_entry(buf, sizeof(uint32_t), items, fp);
1276 if (ebitmap_write(&typdatum->types, fp))
1280 items = put_entry(key, 1, len, fp);
1293 struct policy_file *fp = pd->fp;
1304 items2 = put_entry(buf, sizeof(uint32_t), items, fp);
1308 items = put_entry(key, 1, len, fp);
1313 if (ebitmap_write(&usrdatum->roles.roles, fp))
1316 if (role_set_write(&usrdatum->roles, fp))
1328 if (mls_write_range_helper(&usrdatum->exp_range, fp))
1330 if (mls_write_level(&usrdatum->exp_dfltlevel, fp))
1336 if (mls_write_semantic_range_helper(&usrdatum->range, fp))
1338 if (mls_write_semantic_level_helper(&usrdatum->dfltlevel, fp))
1351 struct policy_file *fp)
1361 INFO(fp->handle,
1369 items = put_entry(buf, sizeof(uint32_t), 1, fp);
1378 items = put_entry(buf, sizeof(uint32_t), 1, fp);
1381 if (context_write(p, &c->context[0], fp))
1386 items = put_entry(buf, sizeof(uint32_t), 1, fp);
1389 if (context_write(p, &c->context[0], fp))
1397 items = put_entry(buf, sizeof(uint32_t), 2, fp);
1400 if (context_write(p, &c->context[0], fp))
1410 items = put_entry(b64, sizeof(uint64_t), 2, fp);
1415 ERR(fp->handle, "policy version %d"
1425 items = put_entry(buf, sizeof(uint32_t), 2, fp);
1429 if (context_write(p, &c->context[0], fp))
1434 items = put_entry(buf, sizeof(uint32_t), 1, fp);
1437 if (context_write(p, &c->context[0], fp))
1443 items = put_entry(buf, sizeof(uint32_t), 1, fp);
1446 items = put_entry(c->u.name, 1, len, fp);
1449 if (context_write(p, &c->context[0], fp))
1459 policydb_t *p, struct policy_file *fp)
1469 INFO(fp->handle,
1477 items = put_entry(buf, sizeof(uint32_t), 1, fp);
1486 items = put_entry(buf, sizeof(uint32_t), 1, fp);
1489 if (context_write(p, &c->context[0], fp))
1496 items = put_entry(buf, sizeof(uint32_t), 1, fp);
1499 items = put_entry(c->u.name, 1, len, fp);
1502 if (context_write(p, &c->context[0], fp))
1504 if (context_write(p, &c->context[1], fp))
1515 items = put_entry(buf, sizeof(uint32_t), 4, fp);
1519 if (context_write(p, &c->context[0], fp))
1526 items = put_entry(buf, sizeof(uint32_t), 2, fp);
1529 items = put_entry(c->u.ibendport.dev_name, 1, len, fp);
1533 if (context_write(p, &c->context[0], fp))
1543 items = put_entry(buf, sizeof(uint32_t), 3, fp);
1546 if (context_write(p, &c->context[0], fp))
1552 items = put_entry(buf, sizeof(uint32_t), 2, fp);
1555 if (context_write(p, &c->context[0], fp))
1562 items = put_entry(buf, sizeof(uint32_t), 2, fp);
1565 items = put_entry(c->u.name, 1, len, fp);
1568 if (context_write(p, &c->context[0], fp))
1576 items = put_entry(buf, sizeof(uint32_t), 8, fp);
1579 if (context_write(p, &c->context[0], fp))
1589 struct policy_file *fp)
1594 rc = ocontext_write_selinux(info, p, fp);
1597 rc = ocontext_write_xen(info, p, fp);
1603 static int genfs_write(policydb_t * p, struct policy_file *fp)
1613 items = put_entry(buf, sizeof(uint32_t), 1, fp);
1619 items = put_entry(buf, sizeof(uint32_t), 1, fp);
1622 items = put_entry(genfs->fstype, 1, len, fp);
1629 items = put_entry(buf, sizeof(uint32_t), 1, fp);
1635 items = put_entry(buf, sizeof(uint32_t), 1, fp);
1638 items = put_entry(c->u.name, 1, len, fp);
1642 items = put_entry(buf, sizeof(uint32_t), 1, fp);
1645 if (context_write(p, &c->context[0], fp))
1656 struct policy_file *fp;
1682 struct policy_file *fp = args->fp;
1691 WARN(fp->handle, "Discarding range_transition "
1700 items = put_entry(buf, sizeof(uint32_t), 2, fp);
1705 items = put_entry(buf, sizeof(uint32_t), 1, fp);
1709 rc = mls_write_range_helper(r, fp);
1716 static int range_write(policydb_t * p, struct policy_file *fp)
1727 args.fp = fp;
1734 items = put_entry(buf, sizeof(uint32_t), 1, fp);
1744 struct policy_file *fp)
1753 ERR(fp->handle,
1761 items2 = put_entry(buf, sizeof(uint32_t), items, fp);
1765 if (type_set_write(&avrule->stypes, fp))
1768 if (type_set_write(&avrule->ttypes, fp))
1779 items2 = put_entry(buf, sizeof(uint32_t), items, fp);
1787 items2 = put_entry(buf, sizeof(uint32_t), items, fp);
1801 ERR(fp->handle,
1809 ERR(fp->handle,
1817 items = put_entry(&buf8, sizeof(uint8_t),1,fp);
1821 items = put_entry(&buf8, sizeof(uint8_t),1,fp);
1826 items = put_entry(buf32, sizeof(uint32_t), nel, fp);
1835 struct policy_file *fp)
1848 if (put_entry(buf, sizeof(uint32_t), 1, fp) != 1)
1853 if (avrule_write(p, avrule, fp))
1879 struct policy_file *fp)
1893 items = put_entry(buf, sizeof(uint32_t), 1, fp);
1899 WARN(fp->handle, "Discarding role_transition "
1905 if (role_set_write(&tr->roles, fp))
1907 if (type_set_write(&tr->types, fp))
1910 if (ebitmap_write(&tr->classes, fp))
1913 items = put_entry(buf, sizeof(uint32_t), 1, fp);
1920 static int role_allow_rule_write(role_allow_rule_t * r, struct policy_file *fp)
1930 items = put_entry(buf, sizeof(uint32_t), 1, fp);
1934 if (role_set_write(&ra->roles, fp))
1936 if (role_set_write(&ra->new_roles, fp))
1943 struct policy_file *fp)
1954 items = put_entry(buf, sizeof(uint32_t), 1, fp);
1961 items = put_entry(buf, sizeof(uint32_t), 1, fp);
1965 items = put_entry(ftr->name, sizeof(char), len, fp);
1969 if (type_set_write(&ftr->stypes, fp))
1971 if (type_set_write(&ftr->ttypes, fp))
1983 ERR(fp->handle,
1988 items = put_entry(buf, sizeof(uint32_t), entries, fp);
1996 struct policy_file *fp)
2006 items = put_entry(buf, sizeof(uint32_t), 1, fp);
2010 if (type_set_write(&rt->stypes, fp))
2012 if (type_set_write(&rt->ttypes, fp))
2014 if (ebitmap_write(&rt->tclasses, fp))
2016 if (mls_write_semantic_range_helper(&rt->trange, fp))
2024 struct policy_file *fp)
2029 if (ebitmap_write(scope_index->scope + i, fp) == -1) {
2034 if (put_entry(buf, sizeof(uint32_t), 1, fp) != 1) {
2038 if (ebitmap_write(scope_index->class_perms_map + i, fp) == -1) {
2046 policydb_t * p, struct policy_file *fp)
2053 if (put_entry(buf, sizeof(uint32_t), 2, fp) != 2) {
2056 if (cond_write_list(p, decl->cond_list, fp) == -1 ||
2057 avrule_write_list(p, decl->avrules, fp) == -1 ||
2058 role_trans_rule_write(p, decl->role_tr_rules, fp) == -1 ||
2059 role_allow_rule_write(decl->role_allow_rules, fp) == -1) {
2064 filename_trans_rule_write(p, decl->filename_trans_rules, fp))
2068 range_trans_rule_write(decl->range_tr_rules, fp) == -1) {
2071 if (scope_index_write(&decl->required, num_scope_syms, fp) == -1 ||
2072 scope_index_write(&decl->declared, num_scope_syms, fp) == -1) {
2075 pd.fp = fp;
2080 if (put_entry(buf, sizeof(uint32_t), 2, fp) != 2) {
2091 policydb_t * p, struct policy_file *fp)
2100 if (put_entry(buf, sizeof(uint32_t), 1, fp) != 1) {
2113 if (put_entry(buf, sizeof(uint32_t), 1, fp) != 1) {
2117 if (avrule_decl_write(decl, num_scope_syms, p, fp) ==
2130 struct policy_file *fp = pd->fp;
2150 if (put_entry(buf, sizeof(*buf), 1, fp) != 1 ||
2151 put_entry(key, 1, key_len, fp) != key_len)
2160 if (put_entry(buf, sizeof(*buf), items, fp) != items)
2199 int policydb_write(policydb_t * p, struct policy_file *fp)
2211 pd.fp = fp;
2222 ERR(fp->handle, "policy version %d cannot support MLS",
2243 items2 = put_entry(buf, sizeof(uint32_t), items, fp);
2246 items = put_entry(policydb_str, 1, len, fp);
2255 ERR(fp->handle, "compatibility lookup failed for policy "
2268 items2 = put_entry(buf, sizeof(uint32_t), items, fp);
2276 items = put_entry(buf, sizeof(uint32_t), 1, fp);
2279 items = put_entry(p->name, 1, len, fp);
2284 items = put_entry(buf, sizeof(uint32_t), 1, fp);
2287 items = put_entry(p->version, 1, len, fp);
2298 if (ebitmap_write(&p->policycaps, fp) == -1)
2307 WARN(fp->handle, "Warning! Policy version %d cannot "
2316 if (ebitmap_write(&p->permissive_map, fp) == -1)
2350 items = put_entry(buf, sizeof(uint32_t), 2, fp);
2358 if (avtab_write(p, &p->te_avtab, fp))
2362 WARN(fp->handle, "Discarding "
2365 if (cond_write_list(p, p->cond_list, fp))
2368 if (role_trans_write(p, fp))
2370 if (role_allow_write(p->role_allow, fp))
2373 if (filename_trans_write(p, fp))
2377 WARN(fp->handle, "Discarding filename type transition rules");
2380 if (avrule_block_write(p->global, num_syms, p, fp) == -1) {
2386 if (put_entry(buf, sizeof(uint32_t), 1, fp) != 1) {
2394 if (ocontext_write(info, p, fp) == -1 || genfs_write(p, fp) == -1) {
2403 if (range_write(p, fp)) {
2411 if (ebitmap_write(&p->type_attr_map[i], fp) == -1)