Lines Matching refs:child
285 uint32_t child, uint32_t parent, uint32_t src,
299 if (ebitmap_get_bit(&p->attr_type_map[src - 1], child - 1)) {
316 rc = bounds_add_bad(handle, child, i+1, class, d, bad);
328 cond_av_list_t *rules, uint32_t child,
342 child, parent, key->source_type,
356 uint32_t child;
370 return bounds_check_rule(a->handle, a->p, NULL, a->cur_avtab, a->child,
378 uint32_t child, uint32_t parent,
388 args.child = child;
399 node->true_list, child, parent,
405 node->false_list, child, parent,
417 int bounds_check_type(sepol_handle_t *handle, policydb_t *p, uint32_t child,
428 child, parent, bad, numbad);
443 static void bounds_report(sepol_handle_t *handle, policydb_t *p, uint32_t child,
446 ERR(handle, "Child type %s exceeds bounds of parent %s in the following rules:",
447 p->p_type_val_to_name[child - 1],
513 /* The role bounds is defined as: a child role cannot have a type that
556 /* The user bounds is defined as: a child user cannot have a role that