Home
last modified time | relevance | path

Searched refs:src (Results 1 – 16 of 16) sorted by relevance

/security/selinux/ss/
Dcontext.h42 static inline int mls_context_cpy(struct context *dst, struct context *src) in mls_context_cpy() argument
46 dst->range.level[0].sens = src->range.level[0].sens; in mls_context_cpy()
47 rc = ebitmap_cpy(&dst->range.level[0].cat, &src->range.level[0].cat); in mls_context_cpy()
51 dst->range.level[1].sens = src->range.level[1].sens; in mls_context_cpy()
52 rc = ebitmap_cpy(&dst->range.level[1].cat, &src->range.level[1].cat); in mls_context_cpy()
62 static inline int mls_context_cpy_low(struct context *dst, struct context *src) in mls_context_cpy_low() argument
66 dst->range.level[0].sens = src->range.level[0].sens; in mls_context_cpy_low()
67 rc = ebitmap_cpy(&dst->range.level[0].cat, &src->range.level[0].cat); in mls_context_cpy_low()
71 dst->range.level[1].sens = src->range.level[0].sens; in mls_context_cpy_low()
72 rc = ebitmap_cpy(&dst->range.level[1].cat, &src->range.level[0].cat); in mls_context_cpy_low()
[all …]
Debitmap.c52 int ebitmap_cpy(struct ebitmap *dst, struct ebitmap *src) in ebitmap_cpy() argument
57 n = src->node; in ebitmap_cpy()
76 dst->highbit = src->highbit; in ebitmap_cpy()
Debitmap.h126 int ebitmap_cpy(struct ebitmap *dst, struct ebitmap *src);
/security/safesetid/
Dlsm.c31 kuid_t src, kuid_t dst) in _setuid_policy_lookup() argument
36 hash_for_each_possible(policy->rules, rule, next, __kuid_val(src)) { in _setuid_policy_lookup()
37 if (!uid_eq(rule->src_uid, src)) in _setuid_policy_lookup()
50 static enum sid_policy_type setuid_policy_lookup(kuid_t src, kuid_t dst) in setuid_policy_lookup() argument
58 result = _setuid_policy_lookup(pol, src, dst); in setuid_policy_lookup()
Dlsm.h49 kuid_t src, kuid_t dst);
/security/selinux/
Davc.c253 struct extended_perms_decision *src) in avc_copy_xperms_decision() argument
255 dest->driver = src->driver; in avc_copy_xperms_decision()
256 dest->used = src->used; in avc_copy_xperms_decision()
258 memcpy(dest->allowed->p, src->allowed->p, in avc_copy_xperms_decision()
259 sizeof(src->allowed->p)); in avc_copy_xperms_decision()
261 memcpy(dest->auditallow->p, src->auditallow->p, in avc_copy_xperms_decision()
262 sizeof(src->auditallow->p)); in avc_copy_xperms_decision()
264 memcpy(dest->dontaudit->p, src->dontaudit->p, in avc_copy_xperms_decision()
265 sizeof(src->dontaudit->p)); in avc_copy_xperms_decision()
274 struct extended_perms_decision *src) in avc_quick_copy_xperms_decision() argument
[all …]
DMakefile25 $(obj)/flask.h: $(src)/include/classmap.h FORCE
Dhooks.c2784 const struct selinux_mnt_opts *src = src_fc->security; in selinux_fs_context_dup() local
2787 if (!src) in selinux_fs_context_dup()
2796 if (src->fscontext) { in selinux_fs_context_dup()
2797 opts->fscontext = kstrdup(src->fscontext, GFP_KERNEL); in selinux_fs_context_dup()
2801 if (src->context) { in selinux_fs_context_dup()
2802 opts->context = kstrdup(src->context, GFP_KERNEL); in selinux_fs_context_dup()
2806 if (src->rootcontext) { in selinux_fs_context_dup()
2807 opts->rootcontext = kstrdup(src->rootcontext, GFP_KERNEL); in selinux_fs_context_dup()
2811 if (src->defcontext) { in selinux_fs_context_dup()
2812 opts->defcontext = kstrdup(src->defcontext, GFP_KERNEL); in selinux_fs_context_dup()
[all …]
/security/apparmor/
DMakefile101 $(src)/Makefile
104 $(src)/Makefile
108 $(src)/Makefile
Dpolicy_unpack.c203 static void *kvmemdup(const void *src, size_t len) in kvmemdup() argument
208 memcpy(p, src, len); in kvmemdup()
/security/tomoyo/
DMakefile7 $(objtree)/scripts/bin2c <$(firstword $(wildcard $(obj)/policy/$(1).conf $(srctree)/$(src)/policy/$…
13 $(obj)/builtin-policy.h: $(wildcard $(obj)/policy/*.conf $(src)/policy/*.conf.default) FORCE
Dutil.c382 bool tomoyo_str_starts(char **src, const char *find) in tomoyo_str_starts() argument
385 char *tmp = *src; in tomoyo_str_starts()
390 *src = tmp; in tomoyo_str_starts()
Dcommon.h953 bool tomoyo_str_starts(char **src, const char *find);
/security/keys/
Ddh.c143 static int kdf_ctr(struct kdf_sdesc *sdesc, const u8 *src, unsigned int slen, in kdf_ctr() argument
177 if (src && slen) { in kdf_ctr()
178 err = crypto_shash_update(desc, src, slen); in kdf_ctr()
/security/smack/
Dsmack_lsm.c645 struct smack_mnt_opts *dst, *src = src_fc->security; in smack_fs_context_dup() local
647 if (!src) in smack_fs_context_dup()
655 if (src->fsdefault) { in smack_fs_context_dup()
656 dst->fsdefault = kstrdup(src->fsdefault, GFP_KERNEL); in smack_fs_context_dup()
660 if (src->fsfloor) { in smack_fs_context_dup()
661 dst->fsfloor = kstrdup(src->fsfloor, GFP_KERNEL); in smack_fs_context_dup()
665 if (src->fshat) { in smack_fs_context_dup()
666 dst->fshat = kstrdup(src->fshat, GFP_KERNEL); in smack_fs_context_dup()
670 if (src->fsroot) { in smack_fs_context_dup()
671 dst->fsroot = kstrdup(src->fsroot, GFP_KERNEL); in smack_fs_context_dup()
[all …]
/security/
Dsecurity.c1354 int security_inode_copy_up(struct dentry *src, struct cred **new) in security_inode_copy_up() argument
1356 return call_int_hook(inode_copy_up, 0, src, new); in security_inode_copy_up()