Home | History | Annotate | Download | only in src

Lines Matching defs:fp

49 	struct policy_file *fp;
53 static int avrule_write_list(avrule_t * avrules, struct policy_file *fp);
55 static int ebitmap_write(ebitmap_t * e, struct policy_file *fp)
70 items = put_entry(buf, sizeof(uint32_t), 3, fp);
76 items = put_entry(&bit, sizeof(uint32_t), 1, fp);
80 items = put_entry(&map, sizeof(uint64_t), 1, fp);
100 avtab_ptr_t cur, struct policy_file *fp,
153 ERR(fp->handle, "null entry");
157 ERR(fp->handle, "entry has both access "
183 ERR(fp->handle, "missing node");
199 ERR(fp->handle, "data count wrong");
207 items2 = put_entry(buf32, sizeof(uint32_t), items, fp);
220 items = put_entry(buf16, sizeof(uint16_t), 4, fp);
224 items = put_entry(buf32, sizeof(uint32_t), 1, fp);
240 static int avtab_write(struct policydb *p, avtab_t * a, struct policy_file *fp)
268 items = put_entry(&nel, sizeof(uint32_t), 1, fp);
277 if (avtab_write_item(p, cur, fp, 1, !oldvers, &nel)) {
288 items = put_entry(&nel, sizeof(uint32_t), 1, fp);
296 if (avtab_write_item(p, cur, fp, 1, 1, NULL)) {
316 struct policy_file *fp)
327 items = put_entry(buf, sizeof(uint32_t), 2, fp);
334 items = put_entry(buf, sizeof(uint32_t), 2, fp);
347 struct policy_file *fp)
351 rc = mls_write_semantic_level_helper(&r->level[0], fp);
355 rc = mls_write_semantic_level_helper(&r->level[1], fp);
364 static int mls_write_level(mls_level_t * l, struct policy_file *fp)
370 items = put_entry(&sens, sizeof(uint32_t), 1, fp);
374 if (ebitmap_write(&l->cat, fp))
384 static int mls_write_range_helper(mls_range_t * r, struct policy_file *fp)
398 items2 = put_entry(buf, sizeof(uint32_t), items, fp);
402 if (ebitmap_write(&r->level[0].cat, fp))
405 if (ebitmap_write(&r->level[1].cat, fp))
417 struct policy_file *fp = pd->fp;
425 items2 = put_entry(buf, sizeof(uint32_t), items, fp);
429 items = put_entry(key, 1, len, fp);
433 if (mls_write_level(levdatum->level, fp))
445 struct policy_file *fp = pd->fp;
454 items2 = put_entry(buf, sizeof(uint32_t), items, fp);
458 items = put_entry(key, 1, len, fp);
465 static int role_trans_write(policydb_t *p, struct policy_file *fp)
481 items = put_entry(buf, sizeof(uint32_t), 1, fp);
487 WARN(fp->handle, "Discarding role_transition "
496 items = put_entry(buf, sizeof(uint32_t), 3, fp);
501 items = put_entry(buf, sizeof(uint32_t), 1, fp);
510 static int role_allow_write(role_allow_t * r, struct policy_file *fp)
520 items = put_entry(buf, sizeof(uint32_t), 1, fp);
526 items = put_entry(buf, sizeof(uint32_t), 2, fp);
533 static int filename_trans_write(filename_trans_t * r, struct policy_file *fp)
543 items = put_entry(buf, sizeof(uint32_t), 1, fp);
549 items = put_entry(buf, sizeof(uint32_t), 1, fp);
553 items = put_entry(ft->name, sizeof(char), len, fp);
561 items = put_entry(buf, sizeof(uint32_t), 4, fp);
569 static int role_set_write(role_set_t * x, struct policy_file *fp)
574 if (ebitmap_write(&x->roles, fp))
578 items = put_entry(buf, sizeof(uint32_t), 1, fp);
585 static int type_set_write(type_set_t * x, struct policy_file *fp)
590 if (ebitmap_write(&x->types, fp))
592 if (ebitmap_write(&x->negset, fp))
596 items = put_entry(buf, sizeof(uint32_t), 1, fp);
609 struct policy_file *fp = pd->fp;
619 items2 = put_entry(buf, sizeof(uint32_t), items, fp);
622 items = put_entry(key, 1, len, fp);
629 items = put_entry(buf, sizeof(uint32_t), 1, fp);
647 cond_av_list_t * list, struct policy_file *fp)
672 items = put_entry(buf, sizeof(uint32_t), 1, fp);
683 if (avtab_write_item(p, cur_list->node, fp, 0, 1, NULL))
698 cond_node_t * node, struct policy_file *fp)
705 items = put_entry(buf, sizeof(uint32_t), 1, fp);
715 items = put_entry(buf, sizeof(uint32_t), 1, fp);
723 items2 = put_entry(buf, sizeof(uint32_t), items, fp);
729 if (cond_write_av_list(p, node->true_list, fp) != 0)
731 if (cond_write_av_list(p, node->false_list, fp) != 0)
734 if (avrule_write_list(node->avtrue_list, fp))
736 if (avrule_write_list(node->avfalse_list, fp))
743 items = put_entry(buf, sizeof(uint32_t), 1, fp);
752 struct policy_file *fp)
762 items = put_entry(buf, sizeof(uint32_t), 1, fp);
767 if (cond_write_node(p, cur, fp) != 0)
778 struct policy_file *fp)
787 items2 = put_entry(buf, sizeof(uint32_t), items, fp);
794 if (mls_write_range_helper(&c->range, fp))
812 struct policy_file *fp = pd->fp;
820 items2 = put_entry(buf, sizeof(uint32_t), items, fp);
824 items = put_entry(key, 1, len, fp);
837 struct policy_file *fp = pd->fp;
847 items2 = put_entry(buf, sizeof(uint32_t), items, fp);
851 items = put_entry(key, 1, len, fp);
863 struct policy_file *fp)
877 items = put_entry(buf, sizeof(uint32_t), 2, fp);
885 items = put_entry(buf, sizeof(uint32_t), 3, fp);
893 if (ebitmap_write(&e->names, fp)) {
897 type_set_write(e->type_names, fp)) {
917 struct policy_file *fp = pd->fp;
943 items2 = put_entry(buf, sizeof(uint32_t), items, fp);
947 items = put_entry(key, 1, len, fp);
952 items = put_entry(cladatum->comkey, 1, len2, fp);
959 if (write_cons_helper(p, cladatum->constraints, 0, fp))
972 items = put_entry(buf, sizeof(uint32_t), 1, fp);
975 if (write_cons_helper(p, cladatum->validatetrans, 1, fp))
988 struct policy_file *fp = pd->fp;
1012 items2 = put_entry(buf, sizeof(uint32_t), items, fp);
1016 items = put_entry(key, 1, len, fp);
1020 if (ebitmap_write(&role->dominates, fp))
1023 if (ebitmap_write(&role->types.types, fp))
1026 if (type_set_write(&role->types, fp))
1033 items = put_entry(buf, sizeof(uint32_t), 1, fp);
1037 if (ebitmap_write(&role->roles, fp))
1050 struct policy_file *fp = pd->fp;
1100 WARN(fp->handle, "Warning! Module policy "
1106 items2 = put_entry(buf, sizeof(uint32_t), items, fp);
1111 if (ebitmap_write(&typdatum->types, fp))
1115 items = put_entry(key, 1, len, fp);
1128 struct policy_file *fp = pd->fp;
1139 items2 = put_entry(buf, sizeof(uint32_t), items, fp);
1143 items = put_entry(key, 1, len, fp);
1148 if (ebitmap_write(&usrdatum->roles.roles, fp))
1151 if (role_set_write(&usrdatum->roles, fp))
1163 if (mls_write_range_helper(&usrdatum->exp_range, fp))
1165 if (mls_write_level(&usrdatum->exp_dfltlevel, fp))
1171 if (mls_write_semantic_range_helper(&usrdatum->range, fp))
1173 if (mls_write_semantic_level_helper(&usrdatum->dfltlevel, fp))
1186 struct policy_file *fp)
1197 items = put_entry(buf, sizeof(uint32_t), 1, fp);
1204 items = put_entry(buf, sizeof(uint32_t), 1, fp);
1207 if (context_write(p, &c->context[0], fp))
1212 items = put_entry(buf, sizeof(uint32_t), 1, fp);
1215 if (context_write(p, &c->context[0], fp))
1223 items = put_entry(buf, sizeof(uint32_t), 2, fp);
1226 if (context_write(p, &c->context[0], fp))
1234 items = put_entry(buf, sizeof(uint32_t), 2, fp);
1237 if (context_write(p, &c->context[0], fp))
1242 items = put_entry(buf, sizeof(uint32_t), 1, fp);
1245 if (context_write(p, &c->context[0], fp))
1255 policydb_t *p, struct policy_file *fp)
1266 items = put_entry(buf, sizeof(uint32_t), 1, fp);
1273 items = put_entry(buf, sizeof(uint32_t), 1, fp);
1276 fp))
1283 items = put_entry(buf, sizeof(uint32_t), 1, fp);
1286 items = put_entry(c->u.name, 1, len, fp);
1289 if (context_write(p, &c->context[0], fp))
1291 if (context_write(p, &c->context[1], fp))
1301 items = put_entry(buf, sizeof(uint32_t), 3, fp);
1304 if (context_write(p, &c->context[0], fp))
1310 items = put_entry(buf, sizeof(uint32_t), 2, fp);
1313 if (context_write(p, &c->context[0], fp))
1320 items = put_entry(buf, sizeof(uint32_t), 2, fp);
1323 items = put_entry(c->u.name, 1, len, fp);
1326 if (context_write(p, &c->context[0], fp))
1334 items = put_entry(buf, sizeof(uint32_t), 8, fp);
1337 if (context_write(p, &c->context[0], fp))
1347 struct policy_file *fp)
1352 rc = ocontext_write_selinux(info, p, fp);
1355 rc = ocontext_write_xen(info, p, fp);
1361 static int genfs_write(policydb_t * p, struct policy_file *fp)
1371 items = put_entry(buf, sizeof(uint32_t), 1, fp);
1377 items = put_entry(buf, sizeof(uint32_t), 1, fp);
1380 items = put_entry(genfs->fstype, 1, len, fp);
1387 items = put_entry(buf, sizeof(uint32_t), 1, fp);
1393 items = put_entry(buf, sizeof(uint32_t), 1, fp);
1396 items = put_entry(c->u.name, 1, len, fp);
1400 items = put_entry(buf, sizeof(uint32_t), 1, fp);
1403 if (context_write(p, &c->context[0], fp))
1410 static int range_write(policydb_t * p, struct policy_file *fp)
1428 items = put_entry(buf, sizeof(uint32_t), 1, fp);
1434 WARN(fp->handle, "Discarding range_transition "
1442 items = put_entry(buf, sizeof(uint32_t), 2, fp);
1447 items = put_entry(buf, sizeof(uint32_t), 1, fp);
1451 if (mls_write_range_helper(&rt->target_range, fp))
1459 static int avrule_write(avrule_t * avrule, struct policy_file *fp)
1468 items2 = put_entry(buf, sizeof(uint32_t), items, fp);
1472 if (type_set_write(&avrule->stypes, fp))
1475 if (type_set_write(&avrule->ttypes, fp))
1486 items2 = put_entry(buf, sizeof(uint32_t), items, fp);
1494 items2 = put_entry(buf, sizeof(uint32_t), items, fp);
1504 static int avrule_write_list(avrule_t * avrules, struct policy_file *fp)
1517 if (put_entry(buf, sizeof(uint32_t), 1, fp) != 1)
1522 avrule_write(avrule, fp);
1543 struct policy_file *fp)
1557 items = put_entry(buf, sizeof(uint32_t), 1, fp);
1563 WARN(fp->handle, "Discarding role_transition "
1569 if (role_set_write(&tr->roles, fp))
1571 if (type_set_write(&tr->types, fp))
1574 if (ebitmap_write(&tr->classes, fp))
1577 items = put_entry(buf, sizeof(uint32_t), 1, fp);
1584 static int role_allow_rule_write(role_allow_rule_t * r, struct policy_file *fp)
1594 items = put_entry(buf, sizeof(uint32_t), 1, fp);
1598 if (role_set_write(&ra->roles, fp))
1600 if (role_set_write(&ra->new_roles, fp))
1606 static int filename_trans_rule_write(filename_trans_rule_t * t, struct policy_file *fp)
1617 items = put_entry(buf, sizeof(uint32_t), 1, fp);
1624 items = put_entry(buf, sizeof(uint32_t), 1, fp);
1628 items = put_entry(ftr->name, sizeof(char), len, fp);
1632 if (type_set_write(&ftr->stypes, fp))
1634 if (type_set_write(&ftr->ttypes, fp))
1640 items = put_entry(buf, sizeof(uint32_t), 2, fp);
1648 struct policy_file *fp)
1658 items = put_entry(buf, sizeof(uint32_t), 1, fp);
1662 if (type_set_write(&rt->stypes, fp))
1664 if (type_set_write(&rt->ttypes, fp))
1666 if (ebitmap_write(&rt->tclasses, fp))
1668 if (mls_write_semantic_range_helper(&rt->trange, fp))
1676 struct policy_file *fp)
1681 if (ebitmap_write(scope_index->scope + i, fp) == -1) {
1686 if (put_entry(buf, sizeof(uint32_t), 1, fp) != 1) {
1690 if (ebitmap_write(scope_index->class_perms_map + i, fp) == -1) {
1698 policydb_t * p, struct policy_file *fp)
1705 if (put_entry(buf, sizeof(uint32_t), 2, fp) != 2) {
1708 if (cond_write_list(p, decl->cond_list, fp) == -1 ||
1709 avrule_write_list(decl->avrules, fp) == -1 ||
1710 role_trans_rule_write(p, decl->role_tr_rules, fp) == -1 ||
1711 role_allow_rule_write(decl->role_allow_rules, fp) == -1) {
1716 filename_trans_rule_write(decl->filename_trans_rules, fp))
1720 range_trans_rule_write(decl->range_tr_rules, fp) == -1) {
1723 if (scope_index_write(&decl->required, num_scope_syms, fp) == -1 ||
1724 scope_index_write(&decl->declared, num_scope_syms, fp) == -1) {
1727 pd.fp = fp;
1732 if (put_entry(buf, sizeof(uint32_t), 2, fp) != 2) {
1743 policydb_t * p, struct policy_file *fp)
1752 if (put_entry(buf, sizeof(uint32_t), 1, fp) != 1) {
1765 if (put_entry(buf, sizeof(uint32_t), 1, fp) != 1) {
1769 if (avrule_decl_write(decl, num_scope_syms, p, fp) ==
1782 struct policy_file *fp = pd->fp;
1799 if (put_entry(buf, sizeof(*buf), 1, fp) != 1 ||
1800 put_entry(key, 1, key_len, fp) != key_len) {
1808 if (put_entry(buf, sizeof(*buf), items, fp) != items) {
1847 int policydb_write(policydb_t * p, struct policy_file *fp)
1859 pd.fp = fp;
1870 ERR(fp->handle, "policy version %d cannot support MLS",
1891 items2 = put_entry(buf, sizeof(uint32_t), items, fp);
1894 fp);
1903 ERR(fp->handle, "compatibility lookup failed for policy "
1916 items2 = put_entry(buf, sizeof(uint32_t), items, fp);
1924 items = put_entry(buf, sizeof(uint32_t), 1, fp);
1927 items = put_entry(p->name, 1, len, fp);
1932 items = put_entry(buf, sizeof(uint32_t), 1, fp);
1935 items = put_entry(p->version, 1, len, fp);
1946 if (ebitmap_write(&p->policycaps, fp) == -1)
1956 WARN(fp->handle, "Warning! Policy version %d cannot "
1966 if (ebitmap_write(&p->permissive_map, fp) == -1)
2000 items = put_entry(buf, sizeof(uint32_t), 2, fp);
2008 if (avtab_write(p, &p->te_avtab, fp))
2012 WARN(fp->handle, "Discarding "
2015 if (cond_write_list(p, p->cond_list, fp))
2018 if (role_trans_write(p, fp))
2020 if (role_allow_write(p->role_allow, fp))
2023 if (filename_trans_write(p->filename_trans, fp))
2027 WARN(fp->handle, "Discarding filename type transition rules");
2030 if (avrule_block_write(p->global, num_syms, p, fp) == -1) {
2036 if (put_entry(buf, sizeof(uint32_t), 1, fp) != 1) {
2044 if (ocontext_write(info, p, fp) == -1 || genfs_write(p, fp) == -1) {
2053 if (range_write(p, fp)) {
2061 if (ebitmap_write(&p->type_attr_map[i], fp) == -1)