/security/selinux/ss/ |
D | context.h | 42 static inline int mls_context_cpy(struct context *dst, struct context *src) in mls_context_cpy() argument 46 dst->range.level[0].sens = src->range.level[0].sens; in mls_context_cpy() 47 rc = ebitmap_cpy(&dst->range.level[0].cat, &src->range.level[0].cat); in mls_context_cpy() 51 dst->range.level[1].sens = src->range.level[1].sens; in mls_context_cpy() 52 rc = ebitmap_cpy(&dst->range.level[1].cat, &src->range.level[1].cat); in mls_context_cpy() 62 static inline int mls_context_cpy_low(struct context *dst, struct context *src) in mls_context_cpy_low() argument 66 dst->range.level[0].sens = src->range.level[0].sens; in mls_context_cpy_low() 67 rc = ebitmap_cpy(&dst->range.level[0].cat, &src->range.level[0].cat); in mls_context_cpy_low() 71 dst->range.level[1].sens = src->range.level[0].sens; in mls_context_cpy_low() 72 rc = ebitmap_cpy(&dst->range.level[1].cat, &src->range.level[0].cat); in mls_context_cpy_low() [all …]
|
D | ebitmap.c | 52 int ebitmap_cpy(struct ebitmap *dst, struct ebitmap *src) in ebitmap_cpy() argument 57 n = src->node; in ebitmap_cpy() 76 dst->highbit = src->highbit; in ebitmap_cpy()
|
D | ebitmap.h | 126 int ebitmap_cpy(struct ebitmap *dst, struct ebitmap *src);
|
/security/safesetid/ |
D | lsm.c | 31 kuid_t src, kuid_t dst) in _setuid_policy_lookup() argument 36 hash_for_each_possible(policy->rules, rule, next, __kuid_val(src)) { in _setuid_policy_lookup() 37 if (!uid_eq(rule->src_uid, src)) in _setuid_policy_lookup() 50 static enum sid_policy_type setuid_policy_lookup(kuid_t src, kuid_t dst) in setuid_policy_lookup() argument 58 result = _setuid_policy_lookup(pol, src, dst); in setuid_policy_lookup()
|
D | lsm.h | 49 kuid_t src, kuid_t dst);
|
/security/selinux/ |
D | avc.c | 253 struct extended_perms_decision *src) in avc_copy_xperms_decision() argument 255 dest->driver = src->driver; in avc_copy_xperms_decision() 256 dest->used = src->used; in avc_copy_xperms_decision() 258 memcpy(dest->allowed->p, src->allowed->p, in avc_copy_xperms_decision() 259 sizeof(src->allowed->p)); in avc_copy_xperms_decision() 261 memcpy(dest->auditallow->p, src->auditallow->p, in avc_copy_xperms_decision() 262 sizeof(src->auditallow->p)); in avc_copy_xperms_decision() 264 memcpy(dest->dontaudit->p, src->dontaudit->p, in avc_copy_xperms_decision() 265 sizeof(src->dontaudit->p)); in avc_copy_xperms_decision() 274 struct extended_perms_decision *src) in avc_quick_copy_xperms_decision() argument [all …]
|
D | Makefile | 25 $(obj)/flask.h: $(src)/include/classmap.h FORCE
|
D | hooks.c | 2784 const struct selinux_mnt_opts *src = src_fc->security; in selinux_fs_context_dup() local 2787 if (!src) in selinux_fs_context_dup() 2796 if (src->fscontext) { in selinux_fs_context_dup() 2797 opts->fscontext = kstrdup(src->fscontext, GFP_KERNEL); in selinux_fs_context_dup() 2801 if (src->context) { in selinux_fs_context_dup() 2802 opts->context = kstrdup(src->context, GFP_KERNEL); in selinux_fs_context_dup() 2806 if (src->rootcontext) { in selinux_fs_context_dup() 2807 opts->rootcontext = kstrdup(src->rootcontext, GFP_KERNEL); in selinux_fs_context_dup() 2811 if (src->defcontext) { in selinux_fs_context_dup() 2812 opts->defcontext = kstrdup(src->defcontext, GFP_KERNEL); in selinux_fs_context_dup() [all …]
|
/security/apparmor/ |
D | Makefile | 101 $(src)/Makefile 104 $(src)/Makefile 108 $(src)/Makefile
|
D | policy_unpack.c | 203 static void *kvmemdup(const void *src, size_t len) in kvmemdup() argument 208 memcpy(p, src, len); in kvmemdup()
|
/security/tomoyo/ |
D | Makefile | 7 $(objtree)/scripts/bin2c <$(firstword $(wildcard $(obj)/policy/$(1).conf $(srctree)/$(src)/policy/$… 13 $(obj)/builtin-policy.h: $(wildcard $(obj)/policy/*.conf $(src)/policy/*.conf.default) FORCE
|
D | util.c | 382 bool tomoyo_str_starts(char **src, const char *find) in tomoyo_str_starts() argument 385 char *tmp = *src; in tomoyo_str_starts() 390 *src = tmp; in tomoyo_str_starts()
|
D | common.h | 953 bool tomoyo_str_starts(char **src, const char *find);
|
/security/keys/ |
D | dh.c | 143 static int kdf_ctr(struct kdf_sdesc *sdesc, const u8 *src, unsigned int slen, in kdf_ctr() argument 177 if (src && slen) { in kdf_ctr() 178 err = crypto_shash_update(desc, src, slen); in kdf_ctr()
|
/security/smack/ |
D | smack_lsm.c | 645 struct smack_mnt_opts *dst, *src = src_fc->security; in smack_fs_context_dup() local 647 if (!src) in smack_fs_context_dup() 655 if (src->fsdefault) { in smack_fs_context_dup() 656 dst->fsdefault = kstrdup(src->fsdefault, GFP_KERNEL); in smack_fs_context_dup() 660 if (src->fsfloor) { in smack_fs_context_dup() 661 dst->fsfloor = kstrdup(src->fsfloor, GFP_KERNEL); in smack_fs_context_dup() 665 if (src->fshat) { in smack_fs_context_dup() 666 dst->fshat = kstrdup(src->fshat, GFP_KERNEL); in smack_fs_context_dup() 670 if (src->fsroot) { in smack_fs_context_dup() 671 dst->fsroot = kstrdup(src->fsroot, GFP_KERNEL); in smack_fs_context_dup() [all …]
|
/security/ |
D | security.c | 1354 int security_inode_copy_up(struct dentry *src, struct cred **new) in security_inode_copy_up() argument 1356 return call_int_hook(inode_copy_up, 0, src, new); in security_inode_copy_up()
|