Searched refs:role (Results 1 – 16 of 16) sorted by relevance
/xen/tools/flask/policy/modules/ |
A D | vm_role.te | 1 # The vm role is used as part of user separation. Allow all domain types to use 2 # this role except dom0. 3 role vm_r; 4 role vm_r types { domain_type -dom0_t }; 6 # Define some users that must use this role (full type "user_1:vm_r:domU_t").
|
A D | xen.te | 83 # The object role (object_r) is used for devices, resources, and event channels; 86 # The system user and role are used for utility domains and pseudo-domains. In 88 # can use the system user and role. 91 role system_r; 92 role system_r types { xen_type dom0_t };
|
A D | all_system_role.te | 2 # user/role separation feature will work properly. 3 role system_r types domain_type;
|
A D | domU.te | 27 # Both of these domain types can be created using the default (system) role 28 role system_r types { domU_t dm_dom_t };
|
A D | xenstore.te | 23 # Xenstore is a utility domain, so it should use the system role 24 role system_r types xenstore_t;
|
A D | vm_role.cons | 29 # further limited to only restricting those domains using the vm_r role.
|
/xen/scripts/ |
A D | get_maintainer.pl | 1003 my $role = "unknown"; 1017 $role = $pvalue; 1022 $role = lc($role); 1024 $role = "supporter"; 1026 $role = "maintainer"; 1028 $role = "odd fixer"; 1030 $role = "orphan minder"; 1034 $role = "chief penguin"; 1190 && ($role eq "" || !($entry->[1] =~ m/$role/)) 1200 && ($role eq "" || !($entry->[1] =~ m/$role/)) [all …]
|
/xen/xen/xsm/flask/ss/ |
A D | context.h | 31 u32 role; member 113 dst->role = src->role; in context_cpy() 120 c->user = c->role = c->type = 0; in context_destroy() 127 (c1->role == c2->role) && in context_cmp()
|
A D | policydb.c | 173 struct role_datum *role; in roles_init() local 176 if ( !role ) in roles_init() 203 xfree(role); in roles_init() 284 role = datum; in role_index() 286 if ( !role->value in role_index() 291 p->role_val_to_struct[role->value - 1] = role; in role_index() 580 role = datum; in role_destroy() 777 if ( !role || role > p->p_roles.nprim ) in policydb_role_isvalid() 798 if ( !c->role || c->role > p->p_roles.nprim ) in policydb_context_isvalid() 812 role = p->role_val_to_struct[c->role - 1]; in policydb_context_isvalid() [all …]
|
A D | services.c | 250 val1 = c->role; in constraint_expr_eval() 538 scontext->role != tcontext->role ) in context_struct_compute_av() 542 if ( scontext->role == ra->role && tcontext->role == ra->new_role ) in context_struct_compute_av() 821 struct role_datum *role; in security_context_to_sid() local 895 if ( !role ) in security_context_to_sid() 897 context.role = role->value; in security_context_to_sid() 1030 newcontext.role = scontext->role; in security_compute_sid() 1076 if ( roletr->role == scontext->role && in security_compute_sid() 1284 struct role_datum *role; in convert_context() local 1310 if ( !role ) in convert_context() [all …]
|
A D | policydb.h | 72 u32 role; /* current role */ member 79 u32 role; /* current role */ member 259 extern int policydb_role_isvalid(struct policydb *p, unsigned int role);
|
A D | mls.c | 221 if ( c->role == OBJECT_R_VAL ) in mls_context_isvalid()
|
/xen/tools/hotplug/Linux/ |
A D | block-drbd-probe | 81 role=$(drbdadm role "$drbd_res") 82 if [[ "$role" != "Primary/Secondary" ]]; then
|
/xen/docs/admin-guide/ |
A D | introduction.rst | 19 Dom0 takes the role of :term:`control domain`, responsible for creating and 20 managing other virtual machines, and the role of :term:`hardware domain`,
|
/xen/docs/misc/ |
A D | xsm-flask.txt | 97 for more details on the use of the user, role, and optional MLS/MCS labels. 104 only type enforcement is used and the user and role are set to system_u and 179 The default user and role used for domains is system_u and system_r. Users are 186 role (vm_r) and three users (user_1 .. user_3), along with constraints that
|
/xen/ |
A D | MAINTAINERS | 67 have a formal governance role, and are listed here 78 role as you write your new code].
|
Completed in 71 milliseconds