Searched refs:roleallow (Results 1 – 14 of 14) sorted by relevance
/external/selinux/secilc/docs/ |
D | cil_role_statements.md | 178 roleallow section in Role Statements 191 (roleallow current_role_id new_role_id) 202 <td align="left"><p><code>roleallow</code></p></td> 203 <td align="left"><p>The <code>roleallow</code> keyword.</p></td> 223 …and above, any valid class may be used. Note that a [`roleallow`](cil_role_statements.md#roleallow… 269 (roleallow unconfined.role msg_filter.role)
|
D | README.md | 114 * [roleallow](cil_role_statements.md#roleallow)
|
D | cil_container_statements.md | 200 … | [`role`](cil_role_statements.md#role) | [`roleallow`](cil_role_statements.md#roleallow…
|
/external/selinux/libsepol/cil/test/integration_testing/ |
D | nonmls.cil | 49 (roleallow rolea_r roleb_r)
|
D | mls_policy.cil | 73 (roleallow rolea_r roleb_r)
|
/external/selinux/libsepol/cil/src/ |
D | cil_tree.c | 859 struct cil_roleallow *roleallow = node->data; in cil_tree_print_node() local 862 if (roleallow->src != NULL) { in cil_tree_print_node() 863 cil_log(CIL_INFO, " %s", ((struct cil_symtab_datum*)roleallow->src)->name); in cil_tree_print_node() 865 cil_log(CIL_INFO, " %s", roleallow->src_str); in cil_tree_print_node() 868 if (roleallow->tgt != NULL) { in cil_tree_print_node() 869 cil_log(CIL_INFO, " %s", ((struct cil_symtab_datum*)roleallow->tgt)->name); in cil_tree_print_node() 871 cil_log(CIL_INFO, " %s", roleallow->tgt_str); in cil_tree_print_node()
|
D | cil_binary.h | 286 …l_roleallow_to_policydb(policydb_t *pdb, const struct cil_db *db, struct cil_roleallow *roleallow);
|
D | cil.c | 2409 void cil_roleallow_init(struct cil_roleallow **roleallow) in cil_roleallow_init() argument 2411 *roleallow = cil_malloc(sizeof(**roleallow)); in cil_roleallow_init() 2413 (*roleallow)->src_str = NULL; in cil_roleallow_init() 2414 (*roleallow)->src = NULL; in cil_roleallow_init() 2415 (*roleallow)->tgt_str = NULL; in cil_roleallow_init() 2416 (*roleallow)->tgt = NULL; in cil_roleallow_init()
|
D | cil_build_ast.h | 106 void cil_destroy_roleallow(struct cil_roleallow *roleallow);
|
D | cil_build_ast.c | 1864 struct cil_roleallow *roleallow = NULL; in cil_gen_roleallow() local 1876 cil_roleallow_init(&roleallow); in cil_gen_roleallow() 1878 roleallow->src_str = parse_current->next->data; in cil_gen_roleallow() 1879 roleallow->tgt_str = parse_current->next->next->data; in cil_gen_roleallow() 1881 ast_node->data = roleallow; in cil_gen_roleallow() 1888 cil_destroy_roleallow(roleallow); in cil_gen_roleallow() 1892 void cil_destroy_roleallow(struct cil_roleallow *roleallow) in cil_destroy_roleallow() argument 1894 if (roleallow == NULL) { in cil_destroy_roleallow() 1898 free(roleallow); in cil_destroy_roleallow()
|
D | cil_resolve_ast.c | 1100 struct cil_roleallow *roleallow = current->data; in cil_resolve_roleallow() local 1105 rc = cil_resolve_name(current, roleallow->src_str, CIL_SYM_ROLES, extra_args, &src_datum); in cil_resolve_roleallow() 1109 roleallow->src = (struct cil_role*)src_datum; in cil_resolve_roleallow() 1111 rc = cil_resolve_name(current, roleallow->tgt_str, CIL_SYM_ROLES, extra_args, &tgt_datum); in cil_resolve_roleallow() 1115 roleallow->tgt = (struct cil_role*)tgt_datum; in cil_resolve_roleallow()
|
D | cil_binary.c | 2380 …il_roleallow_to_policydb(policydb_t *pdb, const struct cil_db *db, struct cil_roleallow *roleallow) in cil_roleallow_to_policydb() argument 2390 rc = __cil_expand_role(roleallow->src, &src_bitmap); in cil_roleallow_to_policydb() 2393 rc = __cil_expand_role(roleallow->tgt, &tgt_bitmap); in cil_roleallow_to_policydb()
|
/external/selinux/secilc/test/ |
D | integration.cil | 145 (roleallow system_r user_r)
|
D | policy.cil | 219 (roleallow system_r user_r)
|