Lines Matching +full:data +full:- +full:role
1 /* SPDX-License-Identifier: GPL-2.0-only */
4 * configuration data for the security policy.
18 * Copyright (C) 2004-2005 Trusted Computer Solutions, Inc.
19 * Copyright (C) 2003 - 2004 Tresys Technology, LLC
35 * in the configuration data: individual permissions,
56 struct symtab permissions; /* class-specific permission symbol table */
59 /* Options how a new object user, role, and type should be decided */
76 /* Role attributes */
78 u32 value; /* internal role value */
79 u32 bounds; /* boundary of role */
80 struct ebitmap dominates; /* set of roles dominated by this role */
81 struct ebitmap types; /* set of authorized types for role */
85 u32 role; /* current role */ member
91 u32 new_role; /* new role */
107 u32 role; /* current role */ member
108 u32 new_role; /* new role */
125 struct mls_range range; /* MLS range (min - max) for user */
148 /* Boolean data type */
157 * type set preserves data needed to determine constraint info from
168 * The configuration data includes security contexts for
171 * relevant data for one such entry. Entries of the same kind
255 /* symbol names indexed by (value - 1) */
258 /* class, role, and user attributes indexed by (value - 1) */
267 /* role transitions */
278 /* bools indexed by (value - 1) */
286 /* role allows */
298 /* range transitions table (range_trans_key -> mls_range) */
301 /* type -> attribute reverse mapping */
325 extern int policydb_role_isvalid(struct policydb *p, unsigned int role);
353 char *data; member
364 if (bytes > fp->len) in next_entry()
365 return -EINVAL; in next_entry()
367 memcpy(buf, fp->data, bytes); in next_entry()
368 fp->data += bytes; in next_entry()
369 fp->len -= bytes; in next_entry()
377 if (len > fp->len) in put_entry()
378 return -EINVAL; in put_entry()
379 memcpy(fp->data, buf, len); in put_entry()
380 fp->data += len; in put_entry()
381 fp->len -= len; in put_entry()
388 return p->sym_val_to_name[sym_num][element_nr]; in sym_name()