/external/selinux/libsepol/cil/src/ |
H A D | cil_verify.h | 54 int *mls; member in struct:cil_args_verify
|
H A D | cil_verify.c | 1341 int *mls; local 1355 mls = args->mls; 1403 if (*mls != -1) { 1404 cil_log(CIL_ERR, "Policy can not have more than one mls\n"); 1407 *mls = ((struct cil_mls*)node->data)->value;
|
H A D | cil_write_ast.c | 1096 struct cil_mls *mls = (struct cil_mls *)node->data; local 1098 switch (mls->value) { 1106 cil_log(CIL_ERR, "Unknown mls value: %d.\n", mls->value);
|
H A D | cil.c | 207 CIL_KEY_MLS = cil_strpool_add("mls"); 289 (*db)->mls = -1; 1448 if (db->mls == CIL_TRUE) { 1467 if (db->mls == CIL_TRUE) { 1524 if (db->mls == CIL_TRUE) { 1589 if (db->mls == CIL_TRUE) { 1665 void cil_set_mls(struct cil_db *db, int mls) argument 1667 db->mls = mls; 2577 void cil_mls_init(struct cil_mls **mls) argument [all...] |
H A D | cil_policy.c | 271 static void cil_context_to_policy(FILE *out, struct cil_context *context, int mls) argument 276 if (mls) { 1370 static void cil_block_te_rules_to_policy(FILE *out, struct cil_tree_node *start, int mls) argument 1414 if (mls == CIL_TRUE) { 1423 int mls; member in struct:te_rules_extra 1452 cil_block_te_rules_to_policy(args->out, n, args->mls); 1458 cil_block_te_rules_to_policy(args->out, n, args->mls); 1471 static void cil_te_rules_to_policy(FILE *out, struct cil_tree_node *head, int mls) argument 1476 args.mls = mls; 1584 cil_users_to_policy(FILE *out, int mls, struct cil_list *users, struct cil_list *all_roles) argument 1658 cil_sid_contexts_to_policy(FILE *out, struct cil_list *sids, int mls) argument 1671 cil_fsuses_to_policy(FILE *out, struct cil_sort *fsuses, int mls) argument 1704 cil_genfscons_to_policy(FILE *out, struct cil_sort *genfscons, int mls) argument 1717 cil_portcons_to_policy(FILE *out, struct cil_sort *portcons, int mls) argument 1742 cil_netifcons_to_policy(FILE *out, struct cil_sort *netifcons, int mls) argument 1757 cil_nodecons_to_policy(FILE *out, struct cil_sort *nodecons, int mls) argument 1814 cil_pirqcons_to_policy(FILE *out, struct cil_sort *pirqcons, int mls) argument 1827 cil_iomemcons_to_policy(FILE *out, struct cil_sort *iomemcons, int mls) argument 1840 cil_ioportcons_to_policy(FILE *out, struct cil_sort *ioportcons, int mls) argument 1853 cil_pcidevicecons_to_policy(FILE *out, struct cil_sort *pcidevicecons, int mls) argument 1866 cil_devicetreecons_to_policy(FILE *out, struct cil_sort *devicetreecons, int mls) argument [all...] |
H A D | cil_post.c | 1991 int mls = -1; local 2003 extra_args.mls = &mls; 2023 if (db->mls == -1) { 2024 if (mls == -1) { 2025 db->mls = CIL_FALSE; 2027 db->mls = mls;
|
H A D | cil_build_ast.c | 5781 struct cil_mls *mls = NULL; local 5792 cil_mls_init(&mls); 5795 mls->value = CIL_TRUE; 5797 mls->value = CIL_FALSE; 5804 ast_node->data = mls; 5810 cil_tree_log(parse_current, CIL_ERR, "Bad mls"); 5811 cil_destroy_mls(mls); 5815 void cil_destroy_mls(struct cil_mls *mls) argument 5817 free(mls);
|
/external/selinux/libsepol/tests/ |
H A D | helpers.c | 35 int test_load_policy(policydb_t * p, int policy_type, int mls, const char *test_name, const char *policy_name) argument 39 if (mls) { 40 if (snprintf(filename, PATH_MAX, "policies/%s/%s.mls", test_name, policy_name) < 0) { 55 p->mls = mls;
|
H A D | libsepol-tests.c | 36 int mls; variable 110 /* first do the non-mls tests */ 111 mls = 0; 115 /* then with mls */ 116 mls = 1;
|
H A D | test-downgrade.c | 127 int do_downgrade_test(int mls) argument 138 fprintf(stderr, "error reading %spolicy binary\n", mls ? "mls " : ""); 144 policydb.mls = mls ? 1 : 0; 162 if (mls && lo < POLICYDB_VERSION_MLS) 165 fprintf(stderr, "error writing %spolicy binary, version %d (downgraded from %d)\n", mls ? "mls " : "", lo, hi); 177 fprintf(stderr, "error reading %spolicy binary, version %d (downgraded from %d)\n", mls ? "mls " [all...] |
/external/selinux/libsemanage/src/ |
H A D | seusers_file.c | 28 const char *mls = semanage_seuser_get_mlsrange(seuser); local 33 if (mls != NULL && fprintf(str, ":%s", mls) < 0)
|
H A D | seusers_local.c | 62 const char *mls = NULL; local 73 mls = semanage_seuser_get_mlsrange(seuser); 92 if (mls && (!pmls || strcmp(pmls, mls) != 0)) { 109 audit_log_semanage_message(fd, audit_type, NULL, msg, name, 0, sename, roles, mls, psename, proles, pmls, NULL, NULL,NULL, success); 265 /* Verify that the mls range is valid, and that it's contained 266 * within the (SELinux) user mls range. This range is optional */
|
/external/selinux/secilc/ |
H A D | secil2conf.c | 51 printf(" -M, --mls true|false write an mls policy. Must be true or false.\n"); 52 printf(" This will override the (mls boolean) statement\n"); 69 int mls = -1; local 77 {"mls", required_argument, 0, 'M'}, 95 mls = 1; 97 mls = 0; 126 cil_set_mls(db, mls);
|
H A D | secilc.c | 55 printf(" -M, --mls true|false build an mls policy. Must be true or false.\n"); 56 printf(" This will override the (mls boolean) statement\n"); 90 int mls = -1; local 107 {"mls", required_argument, 0, 'M'}, 142 mls = 1; 144 mls = 0; 235 cil_set_mls(db, mls);
|
/external/selinux/prebuilts/bin/ |
H A D | seinfo.py | 297 mls = "enabled" if p.mls else "disabled" variable 300 print("Policy Version: {0} (MLS {1})".format(p.version, mls))
|
/external/selinux/libsepol/src/ |
H A D | context.c | 12 #include "mls.h" 159 const char *mls = sepol_context_get_mls(record); local 196 if (mls && !policydb->mls) { 198 mls); 200 } else if (!mls && policydb->mls) { 204 if (mls && (mls_from_string(handle, policydb, mls, scontext) < 0)) 209 if (mls) { 250 char *mls = NULL; local [all...] |
H A D | context_record.c | 22 char *mls; member in struct:sepol_context 108 return con->mls; 114 sepol_context_t * con, const char *mls) 117 char *tmp_mls = strdup(mls); 120 "MLS fields to %s", mls); 123 free(con->mls); 124 con->mls = tmp_mls; 145 con->mls = NULL; 176 if (con->mls && !(new_con->mls [all...] |
H A D | mls.c | 40 #include "mls.h" 44 const context_struct_t * mls, char **str) 50 int len = mls_compute_context_len(policydb, mls) + 1; 61 mls_sid_to_context(policydb, mls, &ptr); 70 ERR(handle, "out of memory, could not convert mls context to string"); 80 const char *str, context_struct_t * mls) 88 if (mls_context_to_sid(policydb, '$', &tmp_cp, mls) < 0) { 101 ERR(handle, "could not construct mls context structure"); 116 if (!policydb->mls) 175 if (!policydb->mls) 42 mls_to_string(sepol_handle_t * handle, const policydb_t * policydb, const context_struct_t * mls, char **str) argument 78 mls_from_string(sepol_handle_t * handle, const policydb_t * policydb, const char *str, context_struct_t * mls) argument 511 mls_setup_user_range(context_struct_t * fromcon, user_datum_t * user, context_struct_t * usercon, int mls) argument 708 sepol_mls_check(sepol_handle_t * handle, sepol_policydb_t * policydb, const char *mls) argument [all...] |
H A D | services.c | 69 #include "mls.h" 294 int mls, state_num; local 297 mls = 0; 300 mls = 1; 314 state_num = mls + 0; 316 state_num = mls + 2; 1108 * Set the buffer to NULL as mls/validatetrans may not be processed. 1111 * chunks (as it gets called for each mls/validatetrans processed). 2136 (fromcon, user, &usercon, policydb->mls))
|
H A D | module_to_cil.c | 1524 if (!pdb->mls) { 1913 const char *mls; local 1916 mls = pdb->mls ? "mls" : ""; 1927 cil_println(indent, "(%sconstrain (%s (%s)) %s)", mls, classkey, perms + 1, expr); 1929 cil_println(indent, "(%svalidatetrans %s %s)", mls, classkey, expr); 2300 if (pdb->mls) { 2309 if (pdb->mls) { 2486 if (pdb->mls) { [all...] |
/external/selinux/checkpolicy/ |
H A D | policy_parse.y | 247 opt_mls : mls 250 mls : sensitivities dominance opt_categories levels mlspolicy label
|
/external/selinux/mcstrans/src/ |
H A D | mcstrans.c | 229 mls_level_t *mls = calloc(1, sizeof(mls_level_t)); local 230 if (!mls) 232 if (sscanf(raw,"s%u", &mls->sens) != 1) 234 raw += numdigits(mls->sens) + 1; 237 if (parse_category(&mls->cat, raw, 0) < 0) 243 return mls; 246 ebitmap_destroy(&mls->cat); 247 free(mls);
|
/external/selinux/libsepol/include/sepol/policydb/ |
H A D | policydb.h | 500 /* Whether this policydb is mls, should always be set */ 501 int mls; member in struct:policydb
|
/external/v8/src/arm/ |
H A D | assembler-arm.cc | 1689 void Assembler::mls(Register dst, Register src1, Register src2, Register srcA, function in class:v8::internal::Assembler
|
/external/vixl/src/aarch64/ |
H A D | logic-aarch64.cc | 833 LogicVRegister Simulator::mls(VectorFormat vform, function in class:vixl::aarch64::Simulator 878 LogicVRegister Simulator::mls(VectorFormat vform, function in class:vixl::aarch64::Simulator 885 return mls(vform, dst, src1, dup_element(indexform, temp, src2, index)); 3178 mls(vform, dst, temp1, temp2); 3190 mls(vform, dst, temp1, temp2); 3202 mls(vform, dst, temp1, temp2); 3214 mls(vform, dst, temp1, temp2);
|