Home
last modified time | relevance | path

Searched refs:level (Results 1 – 22 of 22) sorted by relevance

/security/selinux/ss/
Dcontext.h45 dst->range.level[0].sens = src->range.level[0].sens; in mls_context_cpy()
46 rc = ebitmap_cpy(&dst->range.level[0].cat, &src->range.level[0].cat); in mls_context_cpy()
50 dst->range.level[1].sens = src->range.level[1].sens; in mls_context_cpy()
51 rc = ebitmap_cpy(&dst->range.level[1].cat, &src->range.level[1].cat); in mls_context_cpy()
53 ebitmap_destroy(&dst->range.level[0].cat); in mls_context_cpy()
65 dst->range.level[0].sens = src->range.level[0].sens; in mls_context_cpy_low()
66 rc = ebitmap_cpy(&dst->range.level[0].cat, &src->range.level[0].cat); in mls_context_cpy_low()
70 dst->range.level[1].sens = src->range.level[0].sens; in mls_context_cpy_low()
71 rc = ebitmap_cpy(&dst->range.level[1].cat, &src->range.level[0].cat); in mls_context_cpy_low()
73 ebitmap_destroy(&dst->range.level[0].cat); in mls_context_cpy_low()
[all …]
Dmls.c48 int index_sens = context->range.level[l].sens; in mls_compute_context_len()
54 e = &context->range.level[l].cat; in mls_compute_context_len()
73 if (mls_level_eq(&context->range.level[0], in mls_compute_context_len()
74 &context->range.level[1])) in mls_compute_context_len()
107 context->range.level[l].sens - 1)); in mls_sid_to_context()
113 e = &context->range.level[l].cat; in mls_sid_to_context()
149 if (mls_level_eq(&context->range.level[0], in mls_sid_to_context()
150 &context->range.level[1])) in mls_sid_to_context()
177 return ebitmap_contains(&levdatum->level->cat, &l->cat, in mls_level_isvalid()
183 return (mls_level_isvalid(p, &r->level[0]) && in mls_range_isvalid()
[all …]
Dmls_types.h27 struct mls_level level[2]; /* low == level[0], high == level[1] */ member
49 (mls_level_dom(&(r2).level[0], &(r1).level[0]) && \
50 mls_level_dom(&(r1).level[1], &(r2).level[1]))
Dservices.c352 l1 = &(scontext->range.level[0]); in constraint_expr_eval()
353 l2 = &(tcontext->range.level[0]); in constraint_expr_eval()
356 l1 = &(scontext->range.level[0]); in constraint_expr_eval()
357 l2 = &(tcontext->range.level[1]); in constraint_expr_eval()
360 l1 = &(scontext->range.level[1]); in constraint_expr_eval()
361 l2 = &(tcontext->range.level[0]); in constraint_expr_eval()
364 l1 = &(scontext->range.level[1]); in constraint_expr_eval()
365 l2 = &(tcontext->range.level[1]); in constraint_expr_eval()
368 l1 = &(scontext->range.level[0]); in constraint_expr_eval()
369 l2 = &(scontext->range.level[1]); in constraint_expr_eval()
[all …]
Dpolicydb.c460 if (!levdatum->level->sens || in sens_index()
461 levdatum->level->sens > p->p_levels.nprim) in sens_index()
464 if (flex_array_put_ptr(fa, levdatum->level->sens - 1, key, in sens_index()
722 ebitmap_destroy(&usrdatum->range.level[0].cat); in user_destroy()
723 ebitmap_destroy(&usrdatum->range.level[1].cat); in user_destroy()
737 if (levdatum->level) in sens_destroy()
738 ebitmap_destroy(&levdatum->level->cat); in sens_destroy()
739 kfree(levdatum->level); in sens_destroy()
778 ebitmap_destroy(&rt->level[0].cat); in range_tr_destroy()
779 ebitmap_destroy(&rt->level[1].cat); in range_tr_destroy()
[all …]
Dpolicydb.h132 struct mls_level *level; /* sensitivity and associated categories */ member
/security/selinux/
Dnetlabel.c424 static inline int selinux_netlbl_option(int level, int optname) in selinux_netlbl_option() argument
426 return (level == IPPROTO_IP && optname == IP_OPTIONS) || in selinux_netlbl_option()
427 (level == IPPROTO_IPV6 && optname == IPV6_HOPOPTS); in selinux_netlbl_option()
444 int level, in selinux_netlbl_socket_setsockopt() argument
452 if (selinux_netlbl_option(level, optname) && in selinux_netlbl_socket_setsockopt()
Dhooks.c4664 static int selinux_socket_setsockopt(struct socket *sock, int level, int optname) in selinux_socket_setsockopt() argument
4672 return selinux_netlbl_socket_setsockopt(sock, level, optname); in selinux_socket_setsockopt()
4675 static int selinux_socket_getsockopt(struct socket *sock, int level, in selinux_socket_getsockopt() argument
/security/keys/
Dkeyring.c230 static unsigned long keyring_get_key_chunk(const void *data, int level) in keyring_get_key_chunk() argument
237 level /= ASSOC_ARRAY_KEY_CHUNK_SIZE; in keyring_get_key_chunk()
238 switch (level) { in keyring_get_key_chunk()
251 offset += (level - 3) * sizeof(chunk); in keyring_get_key_chunk()
263 if (level == 2) { in keyring_get_key_chunk()
272 static unsigned long keyring_get_object_key_chunk(const void *object, int level) in keyring_get_object_key_chunk() argument
275 return keyring_get_key_chunk(&key->index_key, level); in keyring_get_object_key_chunk()
299 int level, i; in keyring_diff_objects() local
301 level = 0; in keyring_diff_objects()
311 level += ASSOC_ARRAY_KEY_CHUNK_SIZE / 8; in keyring_diff_objects()
[all …]
DKconfig38 LSMs gets to rule on which admin-level processes get to access the
/security/selinux/include/
Dnetlabel.h65 int level,
139 int level, in selinux_netlbl_socket_setsockopt() argument
/security/apparmor/
Dpolicy_ns.c269 ns->level = parent->level + 1; in __aa_create_ns()
Dpolicy.c653 user_ns->level == view_ns->level))) in policy_view_capable()
Dlabel.c123 res = a->level - b->level; in ns_cmp()
Dapparmorfs.c1189 seq_printf(seq, "%d\n", labels_ns(label)->level); in seq_ns_level_show()
1206 SEQ_NS_FOPS(level);
/security/
DKconfig.hardening16 This chooses the level of coverage over classes of potentially
Dsecurity.c1399 int security_socket_getsockopt(struct socket *sock, int level, int optname) in security_socket_getsockopt() argument
1401 return call_int_hook(socket_getsockopt, 0, sock, level, optname); in security_socket_getsockopt()
1404 int security_socket_setsockopt(struct socket *sock, int level, int optname) in security_socket_setsockopt() argument
1406 return call_int_hook(socket_setsockopt, 0, sock, level, optname); in security_socket_setsockopt()
Dcommoncap.c93 if (ns->level <= cred->user_ns->level) in __cap_capable()
DKconfig122 correctly. This level of protection requires a root of trust outside
/security/apparmor/include/
Dpolicy_ns.h71 int level; member
/security/smack/
Dsmack_access.c489 int smk_netlbl_mls(int level, char *catset, struct netlbl_lsm_secattr *sap, in smk_netlbl_mls() argument
499 sap->attr.mls.lvl = level; in smk_netlbl_mls()
/security/integrity/
DKconfig61 controls the level of integrity auditing messages.