Home
last modified time | relevance | path

Searched refs:roleallow (Results 1 – 15 of 15) sorted by relevance

/external/selinux/secilc/docs/
Dcil_role_statements.md178 roleallow section in Role Statements
191 (roleallow current_role_id new_role_id)
202 <td align="left"><p><code>roleallow</code></p></td>
203 <td align="left"><p>The <code>roleallow</code> keyword.</p></td>
223 …and above, any valid class may be used. Note that a [`roleallow`](cil_role_statements.md#roleallow
269 (roleallow unconfined.role msg_filter.role)
DREADME.md114 * [roleallow](cil_role_statements.md#roleallow)
Dcil_container_statements.md200 … | [`role`](cil_role_statements.md#role) | [`roleallow`](cil_role_statements.md#roleallow
/external/selinux/libsepol/cil/src/
Dcil_tree.c758 struct cil_roleallow *roleallow = node->data; in cil_tree_print_node() local
761 if (roleallow->src != NULL) { in cil_tree_print_node()
762 cil_log(CIL_INFO, " %s", ((struct cil_symtab_datum*)roleallow->src)->name); in cil_tree_print_node()
764 cil_log(CIL_INFO, " %s", roleallow->src_str); in cil_tree_print_node()
767 if (roleallow->tgt != NULL) { in cil_tree_print_node()
768 cil_log(CIL_INFO, " %s", ((struct cil_symtab_datum*)roleallow->tgt)->name); in cil_tree_print_node()
770 cil_log(CIL_INFO, " %s", roleallow->tgt_str); in cil_tree_print_node()
Dcil_binary.h286 …l_roleallow_to_policydb(policydb_t *pdb, const struct cil_db *db, struct cil_roleallow *roleallow);
Dcil.c2170 void cil_roleallow_init(struct cil_roleallow **roleallow) in cil_roleallow_init() argument
2172 *roleallow = cil_malloc(sizeof(**roleallow)); in cil_roleallow_init()
2174 (*roleallow)->src_str = NULL; in cil_roleallow_init()
2175 (*roleallow)->src = NULL; in cil_roleallow_init()
2176 (*roleallow)->tgt_str = NULL; in cil_roleallow_init()
2177 (*roleallow)->tgt = NULL; in cil_roleallow_init()
Dcil_policy.c1042 struct cil_roleallow *roleallow = (struct cil_roleallow*)current->data; in cil_name_to_policy() local
1043 char *src_str = ((struct cil_symtab_datum*)roleallow->src)->name; in cil_name_to_policy()
1044 char *tgt_str = ((struct cil_symtab_datum*)roleallow->tgt)->name; in cil_name_to_policy()
Dcil_build_ast.h106 void cil_destroy_roleallow(struct cil_roleallow *roleallow);
Dcil_build_ast.c1842 struct cil_roleallow *roleallow = NULL; in cil_gen_roleallow() local
1854 cil_roleallow_init(&roleallow); in cil_gen_roleallow()
1856 roleallow->src_str = parse_current->next->data; in cil_gen_roleallow()
1857 roleallow->tgt_str = parse_current->next->next->data; in cil_gen_roleallow()
1859 ast_node->data = roleallow; in cil_gen_roleallow()
1867 cil_destroy_roleallow(roleallow); in cil_gen_roleallow()
1871 void cil_destroy_roleallow(struct cil_roleallow *roleallow) in cil_destroy_roleallow() argument
1873 if (roleallow == NULL) { in cil_destroy_roleallow()
1877 free(roleallow); in cil_destroy_roleallow()
Dcil_resolve_ast.c1050 struct cil_roleallow *roleallow = current->data; in cil_resolve_roleallow() local
1055 rc = cil_resolve_name(current, roleallow->src_str, CIL_SYM_ROLES, extra_args, &src_datum); in cil_resolve_roleallow()
1059 roleallow->src = (struct cil_role*)src_datum; in cil_resolve_roleallow()
1061 rc = cil_resolve_name(current, roleallow->tgt_str, CIL_SYM_ROLES, extra_args, &tgt_datum); in cil_resolve_roleallow()
1065 roleallow->tgt = (struct cil_role*)tgt_datum; in cil_resolve_roleallow()
Dcil_binary.c2234 …il_roleallow_to_policydb(policydb_t *pdb, const struct cil_db *db, struct cil_roleallow *roleallow) in cil_roleallow_to_policydb() argument
2244 rc = __cil_expand_role(roleallow->src, &src_bitmap); in cil_roleallow_to_policydb()
2247 rc = __cil_expand_role(roleallow->tgt, &tgt_bitmap); in cil_roleallow_to_policydb()
/external/selinux/libsepol/cil/test/integration_testing/
Dnonmls.cil49 (roleallow rolea_r roleb_r)
Dmls_policy.cil73 (roleallow rolea_r roleb_r)
/external/selinux/secilc/test/
Dintegration.cil145 (roleallow system_r user_r)
Dpolicy.cil219 (roleallow system_r user_r)