Home
Sort by
last modified time
|
relevance
|
path
Repository(s)
applications
arkcompiler
base
build
commonlibrary
developtools
device
docs
domains
drivers
foundation
ide
interface
kernel
napi_generator
productdefine
test
third_party
vendor
select all
invert selection
clear
Full Search
Search through all text tokens(words,strings,identifiers,numbers) in index.
Definition
Only finds symbol definitions(where e.g a variable(function,...) is defined).
Symbol
Only finds symbol(e.g. methods classes,function,variables).
File Path
Path of the source file(use "/").If you want just exact path,enclose it in "".Source files end with: .jar/.bz2/.a/.h/.java...
History
History log comments.
Type
Any
Bzip(2)
C
Clojure
C#
C++
ELF
Erlang
Image file
Fortran
Golang
GZIP
Haskell
Jar
Java
Java class
JavaScript
Lisp
Lua
Pascal
Perl
PHP
Plain Text
PL/SQL
Python
Rust
Scala
Shell script
SQL
Tar
Tcl
Troff
UUEncoded
Visual Basic
XML
Zip
Type of analyzer used to filter file types include with selected(e.g. just C sources).
Help
Searched
refs:role_allow
(Results
1 - 10
of
10
) sorted by relevance
/third_party/selinux/libsepol/src/
H
A
D
policydb_validate.c
1062
static int validate_role_allows(sepol_handle_t *handle, const role_allow_t *
role_allow
, validate_t flavors[])
in validate_role_allows()
argument
1064
for (;
role_allow
;
role_allow
=
role_allow
->next) {
in validate_role_allows()
1065
if (validate_value(
role_allow
->role, &flavors[SYM_ROLES]))
in validate_role_allows()
1067
if (validate_value(
role_allow
->new_role, &flavors[SYM_ROLES]))
in validate_role_allows()
1217
static int validate_role_allow_rules(sepol_handle_t *handle, const role_allow_rule_t *
role_allow
, validate_t flavors[])
in validate_role_allow_rules()
argument
1219
for (;
role_allow
;
role_allow
=
role_allow
in validate_role_allow_rules()
[all...]
H
A
D
services.c
915
struct
role_allow
*ra;
in context_struct_compute_av()
1007
for (ra = policydb->
role_allow
; ra; ra = ra->next) {
in context_struct_compute_av()
H
A
D
expand.c
1265
for (l = state->out->
role_allow
; l && l->next; l = l->next) ;
in copy_role_allows()
1285
cur_allow = state->out->
role_allow
;
in copy_role_allows()
1306
state->out->
role_allow
= n;
in copy_role_allows()
H
A
D
policydb.c
1559
for (ra = p->
role_allow
; ra; ra = ra->next) {
in policydb_destroy()
2580
ra = calloc(1, sizeof(struct
role_allow
));
in role_allow_read()
4470
if (role_allow_read(&p->
role_allow
, fp))
in policydb_read()
H
A
D
kernel_to_cil.c
2361
role_allow_t *curr = pdb->
role_allow
;
in write_role_allow_rules_to_cil()
H
A
D
kernel_to_conf.c
2292
role_allow_t *curr = pdb->
role_allow
;
in write_role_allow_rules_to_conf()
H
A
D
write.c
2370
if (role_allow_write(p->
role_allow
, fp))
in policydb_write()
/third_party/selinux/libsepol/include/sepol/policydb/
H
A
D
policydb.h
158
typedef struct
role_allow
{
struct
161
struct
role_allow
*next;
580
role_allow_t *
role_allow
;
member
/third_party/selinux/libsepol/cil/src/
H
A
D
cil_internal.h
1042
void cil_roleallow_init(struct cil_roleallow **
role_allow
);
H
A
D
cil_binary.c
2526
sepol_roleallow->next = pdb->
role_allow
;
in cil_roleallow_to_policydb()
2527
pdb->
role_allow
= sepol_roleallow;
in cil_roleallow_to_policydb()
Completed in 33 milliseconds