Lines Matching +full:data +full:- +full:role
1 /* SPDX-License-Identifier: GPL-2.0-only */
4 * configuration data for the security policy.
12 * Copyright (C) 2004-2005 Trusted Computer Solutions, Inc.
17 * Copyright (C) 2003-2004 Tresys Technology, LLC
33 * in the configuration data: individual permissions,
54 struct symtab permissions; /* class-specific permission symbol table */
57 /* Options how a new object user, role, and type should be decided */
74 /* Role attributes */
76 u32 value; /* internal role value */
77 u32 bounds; /* boundary of role */
78 struct ebitmap dominates; /* set of roles dominated by this role */
79 struct ebitmap types; /* set of authorized types for role */
83 u32 role; /* current role */ member
89 u32 new_role; /* new role */
105 u32 role; /* current role */ member
106 u32 new_role; /* new role */
123 struct mls_range range; /* MLS range (min - max) for user */
145 /* Boolean data type */
154 * type set preserves data needed to determine constraint info from
165 * The configuration data includes security contexts for
168 * relevant data for one such entry. Entries of the same kind
250 /* symbol names indexed by (value - 1) */
253 /* class, role, and user attributes indexed by (value - 1) */
262 /* role transitions */
273 /* bools indexed by (value - 1) */
281 /* role allows */
293 /* range transitions table (range_trans_key -> mls_range) */
296 /* type -> attribute reverse mapping */
316 char *data; member
325 extern int policydb_role_isvalid(struct policydb *p, unsigned int role);
357 if (bytes > fp->len) in next_entry()
358 return -EINVAL; in next_entry()
360 memcpy(buf, fp->data, bytes); in next_entry()
361 fp->data += bytes; in next_entry()
362 fp->len -= bytes; in next_entry()
372 return -EINVAL; in put_entry()
374 if (len > fp->len) in put_entry()
375 return -EINVAL; in put_entry()
376 memcpy(fp->data, buf, len); in put_entry()
377 fp->data += len; in put_entry()
378 fp->len -= len; in put_entry()
386 return p->sym_val_to_name[sym_num][element_nr]; in sym_name()