Lines Matching +full:data +full:- +full:role

1 /* SPDX-License-Identifier: GPL-2.0-only */
4 * configuration data for the security policy.
18 * Copyright (C) 2004-2005 Trusted Computer Solutions, Inc.
19 * Copyright (C) 2003 - 2004 Tresys Technology, LLC
35 * in the configuration data: individual permissions,
56 struct symtab permissions; /* class-specific permission symbol table */
59 /* Options how a new object user, role, and type should be decided */
76 /* Role attributes */
78 u32 value; /* internal role value */
79 u32 bounds; /* boundary of role */
80 struct ebitmap dominates; /* set of roles dominated by this role */
81 struct ebitmap types; /* set of authorized types for role */
85 u32 role; /* current role */ member
91 u32 new_role; /* new role */
107 u32 role; /* current role */ member
108 u32 new_role; /* new role */
125 struct mls_range range; /* MLS range (min - max) for user */
148 /* Boolean data type */
157 * type set preserves data needed to determine constraint info from
168 * The configuration data includes security contexts for
171 * relevant data for one such entry. Entries of the same kind
253 /* symbol names indexed by (value - 1) */
256 /* class, role, and user attributes indexed by (value - 1) */
265 /* role transitions */
276 /* bools indexed by (value - 1) */
284 /* role allows */
296 /* range transitions table (range_trans_key -> mls_range) */
299 /* type -> attribute reverse mapping */
323 extern int policydb_role_isvalid(struct policydb *p, unsigned int role);
349 char *data; member
360 if (bytes > fp->len) in next_entry()
361 return -EINVAL; in next_entry()
363 memcpy(buf, fp->data, bytes); in next_entry()
364 fp->data += bytes; in next_entry()
365 fp->len -= bytes; in next_entry()
374 return -EINVAL; in put_entry()
376 if (len > fp->len) in put_entry()
377 return -EINVAL; in put_entry()
378 memcpy(fp->data, buf, len); in put_entry()
379 fp->data += len; in put_entry()
380 fp->len -= len; in put_entry()
387 return p->sym_val_to_name[sym_num][element_nr]; in sym_name()