Home
last modified time | relevance | path

Searched refs:level (Results 1 – 13 of 13) sorted by relevance

/security/selinux/ss/
Dcontext.h44 dst->range.level[0].sens = src->range.level[0].sens; in mls_context_cpy()
45 rc = ebitmap_cpy(&dst->range.level[0].cat, &src->range.level[0].cat); in mls_context_cpy()
49 dst->range.level[1].sens = src->range.level[1].sens; in mls_context_cpy()
50 rc = ebitmap_cpy(&dst->range.level[1].cat, &src->range.level[1].cat); in mls_context_cpy()
52 ebitmap_destroy(&dst->range.level[0].cat); in mls_context_cpy()
64 dst->range.level[0].sens = src->range.level[0].sens; in mls_context_cpy_low()
65 rc = ebitmap_cpy(&dst->range.level[0].cat, &src->range.level[0].cat); in mls_context_cpy_low()
69 dst->range.level[1].sens = src->range.level[0].sens; in mls_context_cpy_low()
70 rc = ebitmap_cpy(&dst->range.level[1].cat, &src->range.level[0].cat); in mls_context_cpy_low()
72 ebitmap_destroy(&dst->range.level[0].cat); in mls_context_cpy_low()
[all …]
Dmls.c47 int index_sens = context->range.level[l].sens; in mls_compute_context_len()
53 e = &context->range.level[l].cat; in mls_compute_context_len()
72 if (mls_level_eq(&context->range.level[0], in mls_compute_context_len()
73 &context->range.level[1])) in mls_compute_context_len()
106 context->range.level[l].sens - 1)); in mls_sid_to_context()
112 e = &context->range.level[l].cat; in mls_sid_to_context()
148 if (mls_level_eq(&context->range.level[0], in mls_sid_to_context()
149 &context->range.level[1])) in mls_sid_to_context()
176 if (!ebitmap_get_bit(&levdatum->level->cat, i)) { in mls_level_isvalid()
190 return (mls_level_isvalid(p, &r->level[0]) && in mls_range_isvalid()
[all …]
Dmls_types.h26 struct mls_level level[2]; /* low == level[0], high == level[1] */ member
48 (mls_level_dom(&(r2).level[0], &(r1).level[0]) && \
49 mls_level_dom(&(r1).level[1], &(r2).level[1]))
Dservices.c337 l1 = &(scontext->range.level[0]); in constraint_expr_eval()
338 l2 = &(tcontext->range.level[0]); in constraint_expr_eval()
341 l1 = &(scontext->range.level[0]); in constraint_expr_eval()
342 l2 = &(tcontext->range.level[1]); in constraint_expr_eval()
345 l1 = &(scontext->range.level[1]); in constraint_expr_eval()
346 l2 = &(tcontext->range.level[0]); in constraint_expr_eval()
349 l1 = &(scontext->range.level[1]); in constraint_expr_eval()
350 l2 = &(tcontext->range.level[1]); in constraint_expr_eval()
353 l1 = &(scontext->range.level[0]); in constraint_expr_eval()
354 l2 = &(scontext->range.level[1]); in constraint_expr_eval()
[all …]
Dpolicydb.c443 if (!levdatum->level->sens || in sens_index()
444 levdatum->level->sens > p->p_levels.nprim) in sens_index()
447 if (flex_array_put_ptr(fa, levdatum->level->sens - 1, key, in sens_index()
710 ebitmap_destroy(&usrdatum->range.level[0].cat); in user_destroy()
711 ebitmap_destroy(&usrdatum->range.level[1].cat); in user_destroy()
725 ebitmap_destroy(&levdatum->level->cat); in sens_destroy()
726 kfree(levdatum->level); in sens_destroy()
765 ebitmap_destroy(&rt->level[0].cat); in range_tr_destroy()
766 ebitmap_destroy(&rt->level[1].cat); in range_tr_destroy()
1012 r->level[0].sens = le32_to_cpu(buf[0]); in mls_read_range_helper()
[all …]
Dpolicydb.h132 struct mls_level *level; /* sensitivity and associated categories */ member
/security/selinux/include/
Dnetlabel.h64 int level,
137 int level, in selinux_netlbl_socket_setsockopt() argument
/security/selinux/
Dnetlabel.c400 int level, in selinux_netlbl_socket_setsockopt() argument
408 if (level == IPPROTO_IP && optname == IP_OPTIONS && in selinux_netlbl_socket_setsockopt()
Dhooks.c4203 static int selinux_socket_setsockopt(struct socket *sock, int level, int optname) in selinux_socket_setsockopt() argument
4211 return selinux_netlbl_socket_setsockopt(sock, level, optname); in selinux_socket_setsockopt()
4214 static int selinux_socket_getsockopt(struct socket *sock, int level, in selinux_socket_getsockopt() argument
/security/smack/
Dsmack_access.c393 int smk_netlbl_mls(int level, char *catset, struct netlbl_lsm_secattr *sap, in smk_netlbl_mls() argument
403 sap->attr.mls.lvl = level; in smk_netlbl_mls()
/security/
Dsecurity.c1173 int security_socket_getsockopt(struct socket *sock, int level, int optname) in security_socket_getsockopt() argument
1175 return security_ops->socket_getsockopt(sock, level, optname); in security_socket_getsockopt()
1178 int security_socket_setsockopt(struct socket *sock, int level, int optname) in security_socket_setsockopt() argument
1180 return security_ops->socket_setsockopt(sock, level, optname); in security_socket_setsockopt()
Dcapability.c646 static int cap_socket_setsockopt(struct socket *sock, int level, int optname) in cap_socket_setsockopt() argument
651 static int cap_socket_getsockopt(struct socket *sock, int level, int optname) in cap_socket_getsockopt() argument
DKconfig96 correctly. This level of protection requires a root of trust outside