/security/selinux/ss/ |
D | context.h | 47 dst->range.level[0].sens = src->range.level[0].sens; in mls_context_cpy() 48 rc = ebitmap_cpy(&dst->range.level[0].cat, &src->range.level[0].cat); in mls_context_cpy() 52 dst->range.level[1].sens = src->range.level[1].sens; in mls_context_cpy() 53 rc = ebitmap_cpy(&dst->range.level[1].cat, &src->range.level[1].cat); in mls_context_cpy() 55 ebitmap_destroy(&dst->range.level[0].cat); in mls_context_cpy() 70 dst->range.level[0].sens = src->range.level[0].sens; in mls_context_cpy_low() 71 rc = ebitmap_cpy(&dst->range.level[0].cat, &src->range.level[0].cat); in mls_context_cpy_low() 75 dst->range.level[1].sens = src->range.level[0].sens; in mls_context_cpy_low() 76 rc = ebitmap_cpy(&dst->range.level[1].cat, &src->range.level[0].cat); in mls_context_cpy_low() 78 ebitmap_destroy(&dst->range.level[0].cat); in mls_context_cpy_low() [all …]
|
D | mls.c | 47 int index_sens = context->range.level[l].sens; in mls_compute_context_len() 53 e = &context->range.level[l].cat; in mls_compute_context_len() 72 if (mls_level_eq(&context->range.level[0], in mls_compute_context_len() 73 &context->range.level[1])) in mls_compute_context_len() 106 policydb.p_sens_val_to_name[context->range.level[l].sens - 1]); in mls_sid_to_context() 112 e = &context->range.level[l].cat; in mls_sid_to_context() 148 if (mls_level_eq(&context->range.level[0], in mls_sid_to_context() 149 &context->range.level[1])) in mls_sid_to_context() 176 if (!ebitmap_get_bit(&levdatum->level->cat, i)) { in mls_level_isvalid() 190 return (mls_level_isvalid(p, &r->level[0]) && in mls_range_isvalid() [all …]
|
D | mls_types.h | 25 struct mls_level level[2]; /* low == level[0], high == level[1] */ member 53 (mls_level_dom(&(r2).level[0], &(r1).level[0]) && \ 54 mls_level_dom(&(r1).level[1], &(r2).level[1]))
|
D | services.c | 173 l1 = &(scontext->range.level[0]); in constraint_expr_eval() 174 l2 = &(tcontext->range.level[0]); in constraint_expr_eval() 177 l1 = &(scontext->range.level[0]); in constraint_expr_eval() 178 l2 = &(tcontext->range.level[1]); in constraint_expr_eval() 181 l1 = &(scontext->range.level[1]); in constraint_expr_eval() 182 l2 = &(tcontext->range.level[0]); in constraint_expr_eval() 185 l1 = &(scontext->range.level[1]); in constraint_expr_eval() 186 l2 = &(tcontext->range.level[1]); in constraint_expr_eval() 189 l1 = &(scontext->range.level[0]); in constraint_expr_eval() 190 l2 = &(scontext->range.level[1]); in constraint_expr_eval() [all …]
|
D | policydb.c | 317 if (!levdatum->level->sens || in sens_index() 318 levdatum->level->sens > p->p_levels.nprim) in sens_index() 320 p->p_sens_val_to_name[levdatum->level->sens - 1] = key; in sens_index() 577 ebitmap_destroy(&usrdatum->range.level[0].cat); in user_destroy() 578 ebitmap_destroy(&usrdatum->range.level[1].cat); in user_destroy() 590 ebitmap_destroy(&levdatum->level->cat); in sens_destroy() 591 kfree(levdatum->level); in sens_destroy() 699 ebitmap_destroy(&lrt->target_range.level[0].cat); in policydb_destroy() 700 ebitmap_destroy(&lrt->target_range.level[1].cat); in policydb_destroy() 706 ebitmap_destroy(&lrt->target_range.level[0].cat); in policydb_destroy() [all …]
|
D | policydb.h | 102 struct mls_level *level; /* sensitivity and associated categories */ member
|
/security/selinux/include/ |
D | netlabel.h | 64 int level, 138 int level, in selinux_netlbl_socket_setsockopt() argument
|
/security/smack/ |
D | smack_access.c | 330 void smack_from_cipso(u32 level, char *cp, char *result) in smack_from_cipso() argument 341 if (kp->smk_cipso->smk_level == level && in smack_from_cipso()
|
/security/selinux/ |
D | netlabel.c | 479 int level, in selinux_netlbl_socket_setsockopt() argument 487 if (level == IPPROTO_IP && optname == IP_OPTIONS && in selinux_netlbl_socket_setsockopt()
|
D | hooks.c | 4018 static int selinux_socket_setsockopt(struct socket *sock, int level, int optname) in selinux_socket_setsockopt() argument 4026 return selinux_netlbl_socket_setsockopt(sock, level, optname); in selinux_socket_setsockopt() 4029 static int selinux_socket_getsockopt(struct socket *sock, int level, in selinux_socket_getsockopt() argument
|
/security/ |
D | security.c | 1033 int security_socket_getsockopt(struct socket *sock, int level, int optname) in security_socket_getsockopt() argument 1035 return security_ops->socket_getsockopt(sock, level, optname); in security_socket_getsockopt() 1038 int security_socket_setsockopt(struct socket *sock, int level, int optname) in security_socket_setsockopt() argument 1040 return security_ops->socket_setsockopt(sock, level, optname); in security_socket_setsockopt()
|
D | capability.c | 648 static int cap_socket_setsockopt(struct socket *sock, int level, int optname) in cap_socket_setsockopt() argument 653 static int cap_socket_getsockopt(struct socket *sock, int level, int optname) in cap_socket_getsockopt() argument
|