Home
last modified time | relevance | path

Searched refs:roleallow (Results 1 – 14 of 14) sorted by relevance

/external/selinux/secilc/docs/
Dcil_role_statements.md178 roleallow section in Role Statements
191 (roleallow current_role_id new_role_id)
202 <td align="left"><p><code>roleallow</code></p></td>
203 <td align="left"><p>The <code>roleallow</code> keyword.</p></td>
223 …and above, any valid class may be used. Note that a [`roleallow`](cil_role_statements.md#roleallow
269 (roleallow unconfined.role msg_filter.role)
DREADME.md114 * [roleallow](cil_role_statements.md#roleallow)
Dcil_container_statements.md200 … | [`role`](cil_role_statements.md#role) | [`roleallow`](cil_role_statements.md#roleallow
/external/selinux/libsepol/cil/test/integration_testing/
Dnonmls.cil49 (roleallow rolea_r roleb_r)
Dmls_policy.cil73 (roleallow rolea_r roleb_r)
/external/selinux/libsepol/cil/src/
Dcil_tree.c855 struct cil_roleallow *roleallow = node->data; in cil_tree_print_node() local
858 if (roleallow->src != NULL) { in cil_tree_print_node()
859 cil_log(CIL_INFO, " %s", ((struct cil_symtab_datum*)roleallow->src)->name); in cil_tree_print_node()
861 cil_log(CIL_INFO, " %s", roleallow->src_str); in cil_tree_print_node()
864 if (roleallow->tgt != NULL) { in cil_tree_print_node()
865 cil_log(CIL_INFO, " %s", ((struct cil_symtab_datum*)roleallow->tgt)->name); in cil_tree_print_node()
867 cil_log(CIL_INFO, " %s", roleallow->tgt_str); in cil_tree_print_node()
Dcil_binary.h286 …l_roleallow_to_policydb(policydb_t *pdb, const struct cil_db *db, struct cil_roleallow *roleallow);
Dcil.c2213 void cil_roleallow_init(struct cil_roleallow **roleallow) in cil_roleallow_init() argument
2215 *roleallow = cil_malloc(sizeof(**roleallow)); in cil_roleallow_init()
2217 (*roleallow)->src_str = NULL; in cil_roleallow_init()
2218 (*roleallow)->src = NULL; in cil_roleallow_init()
2219 (*roleallow)->tgt_str = NULL; in cil_roleallow_init()
2220 (*roleallow)->tgt = NULL; in cil_roleallow_init()
Dcil_build_ast.h106 void cil_destroy_roleallow(struct cil_roleallow *roleallow);
Dcil_build_ast.c1830 struct cil_roleallow *roleallow = NULL; in cil_gen_roleallow() local
1842 cil_roleallow_init(&roleallow); in cil_gen_roleallow()
1844 roleallow->src_str = parse_current->next->data; in cil_gen_roleallow()
1845 roleallow->tgt_str = parse_current->next->next->data; in cil_gen_roleallow()
1847 ast_node->data = roleallow; in cil_gen_roleallow()
1854 cil_destroy_roleallow(roleallow); in cil_gen_roleallow()
1858 void cil_destroy_roleallow(struct cil_roleallow *roleallow) in cil_destroy_roleallow() argument
1860 if (roleallow == NULL) { in cil_destroy_roleallow()
1864 free(roleallow); in cil_destroy_roleallow()
Dcil_resolve_ast.c1106 struct cil_roleallow *roleallow = current->data; in cil_resolve_roleallow() local
1111 rc = cil_resolve_name(current, roleallow->src_str, CIL_SYM_ROLES, extra_args, &src_datum); in cil_resolve_roleallow()
1115 roleallow->src = (struct cil_role*)src_datum; in cil_resolve_roleallow()
1117 rc = cil_resolve_name(current, roleallow->tgt_str, CIL_SYM_ROLES, extra_args, &tgt_datum); in cil_resolve_roleallow()
1121 roleallow->tgt = (struct cil_role*)tgt_datum; in cil_resolve_roleallow()
Dcil_binary.c2417 …il_roleallow_to_policydb(policydb_t *pdb, const struct cil_db *db, struct cil_roleallow *roleallow) in cil_roleallow_to_policydb() argument
2427 rc = __cil_expand_role(roleallow->src, &src_bitmap); in cil_roleallow_to_policydb()
2430 rc = __cil_expand_role(roleallow->tgt, &tgt_bitmap); in cil_roleallow_to_policydb()
/external/selinux/secilc/test/
Dintegration.cil145 (roleallow system_r user_r)
Dpolicy.cil219 (roleallow system_r user_r)