Searched refs:role (Results 1 – 15 of 15) sorted by relevance
1 # The vm role is used as part of user separation. Allow all domain types to use2 # this role except dom0.3 role vm_r;4 role vm_r types { domain_type -dom0_t };6 # Define some users that must use this role (full type "user_1:vm_r:domU_t").
83 # The object role (object_r) is used for devices, resources, and event channels;86 # The system user and role are used for utility domains and pseudo-domains. In88 # can use the system user and role.91 role system_r;92 role system_r types { xen_type dom0_t };
2 # user/role separation feature will work properly.3 role system_r types domain_type;
27 # Both of these domain types can be created using the default (system) role28 role system_r types { domU_t dm_dom_t };
23 # Xenstore is a utility domain, so it should use the system role24 role system_r types xenstore_t;
29 # further limited to only restricting those domains using the vm_r role.
973 my $role = "unknown";987 $role = $pvalue;992 $role = lc($role);994 $role = "supporter";996 $role = "maintainer";998 $role = "odd fixer";1000 $role = "orphan minder";1004 $role = "chief penguin";1166 && ($role eq "" || !($entry->[1] =~ m/$role/))1176 && ($role eq "" || !($entry->[1] =~ m/$role/))[all …]
173 struct role_datum *role; in roles_init() local176 if ( !role ) in roles_init()203 xfree(role); in roles_init()284 role = datum; in role_index()286 if ( !role->value in role_index()291 p->role_val_to_struct[role->value - 1] = role; in role_index()580 role = datum; in role_destroy()777 if ( !role || role > p->p_roles.nprim ) in policydb_role_isvalid()798 if ( !c->role || c->role > p->p_roles.nprim ) in policydb_context_isvalid()812 role = p->role_val_to_struct[c->role - 1]; in policydb_context_isvalid()[all …]
31 u32 role; member113 dst->role = src->role; in context_cpy()120 c->user = c->role = c->type = 0; in context_destroy()127 (c1->role == c2->role) && in context_cmp()
250 val1 = c->role; in constraint_expr_eval()538 scontext->role != tcontext->role ) in context_struct_compute_av()542 if ( scontext->role == ra->role && tcontext->role == ra->new_role ) in context_struct_compute_av()819 struct role_datum *role; in security_context_to_sid() local893 if ( !role ) in security_context_to_sid()895 context.role = role->value; in security_context_to_sid()1028 newcontext.role = scontext->role; in security_compute_sid()1074 if ( roletr->role == scontext->role && in security_compute_sid()1282 struct role_datum *role; in convert_context() local1308 if ( !role ) in convert_context()[all …]
72 u32 role; /* current role */ member79 u32 role; /* current role */ member259 extern int policydb_role_isvalid(struct policydb *p, unsigned int role);
221 if ( c->role == OBJECT_R_VAL ) in mls_context_isvalid()
81 role=$(drbdadm role "$drbd_res")82 if [[ "$role" != "Primary/Secondary" ]]; then
133 for more details on the use of the user, role, and optional MLS/MCS labels.140 only type enforcement is used and the user and role are set to system_u and215 The default user and role used for domains is system_u and system_r. Users are222 role (vm_r) and three users (user_1 .. user_3), along with constraints that
79 role as you write your new code].
Completed in 29 milliseconds