/security/selinux/ss/ |
D | context.h | 44 dst->range.level[0].sens = src->range.level[0].sens; in mls_context_cpy() 45 rc = ebitmap_cpy(&dst->range.level[0].cat, &src->range.level[0].cat); in mls_context_cpy() 49 dst->range.level[1].sens = src->range.level[1].sens; in mls_context_cpy() 50 rc = ebitmap_cpy(&dst->range.level[1].cat, &src->range.level[1].cat); in mls_context_cpy() 52 ebitmap_destroy(&dst->range.level[0].cat); in mls_context_cpy() 64 dst->range.level[0].sens = src->range.level[0].sens; in mls_context_cpy_low() 65 rc = ebitmap_cpy(&dst->range.level[0].cat, &src->range.level[0].cat); in mls_context_cpy_low() 69 dst->range.level[1].sens = src->range.level[0].sens; in mls_context_cpy_low() 70 rc = ebitmap_cpy(&dst->range.level[1].cat, &src->range.level[0].cat); in mls_context_cpy_low() 72 ebitmap_destroy(&dst->range.level[0].cat); in mls_context_cpy_low() [all …]
|
D | mls.c | 47 int index_sens = context->range.level[l].sens; in mls_compute_context_len() 53 e = &context->range.level[l].cat; in mls_compute_context_len() 72 if (mls_level_eq(&context->range.level[0], in mls_compute_context_len() 73 &context->range.level[1])) in mls_compute_context_len() 106 context->range.level[l].sens - 1)); in mls_sid_to_context() 112 e = &context->range.level[l].cat; in mls_sid_to_context() 148 if (mls_level_eq(&context->range.level[0], in mls_sid_to_context() 149 &context->range.level[1])) in mls_sid_to_context() 176 if (!ebitmap_get_bit(&levdatum->level->cat, i)) { in mls_level_isvalid() 190 return (mls_level_isvalid(p, &r->level[0]) && in mls_range_isvalid() [all …]
|
D | mls_types.h | 26 struct mls_level level[2]; /* low == level[0], high == level[1] */ member 48 (mls_level_dom(&(r2).level[0], &(r1).level[0]) && \ 49 mls_level_dom(&(r1).level[1], &(r2).level[1]))
|
D | services.c | 337 l1 = &(scontext->range.level[0]); in constraint_expr_eval() 338 l2 = &(tcontext->range.level[0]); in constraint_expr_eval() 341 l1 = &(scontext->range.level[0]); in constraint_expr_eval() 342 l2 = &(tcontext->range.level[1]); in constraint_expr_eval() 345 l1 = &(scontext->range.level[1]); in constraint_expr_eval() 346 l2 = &(tcontext->range.level[0]); in constraint_expr_eval() 349 l1 = &(scontext->range.level[1]); in constraint_expr_eval() 350 l2 = &(tcontext->range.level[1]); in constraint_expr_eval() 353 l1 = &(scontext->range.level[0]); in constraint_expr_eval() 354 l2 = &(scontext->range.level[1]); in constraint_expr_eval() [all …]
|
D | policydb.c | 443 if (!levdatum->level->sens || in sens_index() 444 levdatum->level->sens > p->p_levels.nprim) in sens_index() 447 if (flex_array_put_ptr(fa, levdatum->level->sens - 1, key, in sens_index() 710 ebitmap_destroy(&usrdatum->range.level[0].cat); in user_destroy() 711 ebitmap_destroy(&usrdatum->range.level[1].cat); in user_destroy() 725 ebitmap_destroy(&levdatum->level->cat); in sens_destroy() 726 kfree(levdatum->level); in sens_destroy() 765 ebitmap_destroy(&rt->level[0].cat); in range_tr_destroy() 766 ebitmap_destroy(&rt->level[1].cat); in range_tr_destroy() 1012 r->level[0].sens = le32_to_cpu(buf[0]); in mls_read_range_helper() [all …]
|
D | policydb.h | 132 struct mls_level *level; /* sensitivity and associated categories */ member
|
/security/selinux/include/ |
D | netlabel.h | 64 int level, 137 int level, in selinux_netlbl_socket_setsockopt() argument
|
/security/selinux/ |
D | netlabel.c | 400 int level, in selinux_netlbl_socket_setsockopt() argument 408 if (level == IPPROTO_IP && optname == IP_OPTIONS && in selinux_netlbl_socket_setsockopt()
|
D | hooks.c | 4203 static int selinux_socket_setsockopt(struct socket *sock, int level, int optname) in selinux_socket_setsockopt() argument 4211 return selinux_netlbl_socket_setsockopt(sock, level, optname); in selinux_socket_setsockopt() 4214 static int selinux_socket_getsockopt(struct socket *sock, int level, in selinux_socket_getsockopt() argument
|
/security/smack/ |
D | smack_access.c | 393 int smk_netlbl_mls(int level, char *catset, struct netlbl_lsm_secattr *sap, in smk_netlbl_mls() argument 403 sap->attr.mls.lvl = level; in smk_netlbl_mls()
|
/security/ |
D | security.c | 1173 int security_socket_getsockopt(struct socket *sock, int level, int optname) in security_socket_getsockopt() argument 1175 return security_ops->socket_getsockopt(sock, level, optname); in security_socket_getsockopt() 1178 int security_socket_setsockopt(struct socket *sock, int level, int optname) in security_socket_setsockopt() argument 1180 return security_ops->socket_setsockopt(sock, level, optname); in security_socket_setsockopt()
|
D | capability.c | 646 static int cap_socket_setsockopt(struct socket *sock, int level, int optname) in cap_socket_setsockopt() argument 651 static int cap_socket_getsockopt(struct socket *sock, int level, int optname) in cap_socket_getsockopt() argument
|
D | Kconfig | 96 correctly. This level of protection requires a root of trust outside
|