/security/selinux/ss/ |
D | context.h | 41 static inline int mls_context_cpy(struct context *dst, struct context *src) in mls_context_cpy() argument 45 dst->range.level[0].sens = src->range.level[0].sens; in mls_context_cpy() 46 rc = ebitmap_cpy(&dst->range.level[0].cat, &src->range.level[0].cat); in mls_context_cpy() 50 dst->range.level[1].sens = src->range.level[1].sens; in mls_context_cpy() 51 rc = ebitmap_cpy(&dst->range.level[1].cat, &src->range.level[1].cat); in mls_context_cpy() 61 static inline int mls_context_cpy_low(struct context *dst, struct context *src) in mls_context_cpy_low() argument 65 dst->range.level[0].sens = src->range.level[0].sens; in mls_context_cpy_low() 66 rc = ebitmap_cpy(&dst->range.level[0].cat, &src->range.level[0].cat); in mls_context_cpy_low() 70 dst->range.level[1].sens = src->range.level[0].sens; in mls_context_cpy_low() 71 rc = ebitmap_cpy(&dst->range.level[1].cat, &src->range.level[0].cat); in mls_context_cpy_low() [all …]
|
D | ebitmap.c | 53 int ebitmap_cpy(struct ebitmap *dst, struct ebitmap *src) in ebitmap_cpy() argument 58 n = src->node; in ebitmap_cpy() 77 dst->highbit = src->highbit; in ebitmap_cpy()
|
D | ebitmap.h | 126 int ebitmap_cpy(struct ebitmap *dst, struct ebitmap *src);
|
/security/safesetid/ |
D | lsm.c | 33 kid_t src, kid_t dst) in _setid_policy_lookup() argument 39 hash_for_each_possible(policy->rules, rule, next, __kuid_val(src.uid)) { in _setid_policy_lookup() 40 if (!uid_eq(rule->src_id.uid, src.uid)) in _setid_policy_lookup() 47 hash_for_each_possible(policy->rules, rule, next, __kgid_val(src.gid)) { in _setid_policy_lookup() 48 if (!gid_eq(rule->src_id.gid, src.gid)) in _setid_policy_lookup() 66 static enum sid_policy_type setid_policy_lookup(kid_t src, kid_t dst, enum setid_type new_type) in setid_policy_lookup() argument 84 result = _setid_policy_lookup(pol, src, dst); in setid_policy_lookup()
|
D | lsm.h | 68 kid_t src, kid_t dst);
|
/security/selinux/ |
D | avc.c | 259 struct extended_perms_decision *src) in avc_copy_xperms_decision() argument 261 dest->driver = src->driver; in avc_copy_xperms_decision() 262 dest->used = src->used; in avc_copy_xperms_decision() 264 memcpy(dest->allowed->p, src->allowed->p, in avc_copy_xperms_decision() 265 sizeof(src->allowed->p)); in avc_copy_xperms_decision() 267 memcpy(dest->auditallow->p, src->auditallow->p, in avc_copy_xperms_decision() 268 sizeof(src->auditallow->p)); in avc_copy_xperms_decision() 270 memcpy(dest->dontaudit->p, src->dontaudit->p, in avc_copy_xperms_decision() 271 sizeof(src->dontaudit->p)); in avc_copy_xperms_decision() 280 struct extended_perms_decision *src) in avc_quick_copy_xperms_decision() argument [all …]
|
D | hooks.c | 2863 const struct selinux_mnt_opts *src = src_fc->security; in selinux_fs_context_dup() local 2866 if (!src) in selinux_fs_context_dup() 2875 if (src->fscontext) { in selinux_fs_context_dup() 2876 opts->fscontext = kstrdup(src->fscontext, GFP_KERNEL); in selinux_fs_context_dup() 2880 if (src->context) { in selinux_fs_context_dup() 2881 opts->context = kstrdup(src->context, GFP_KERNEL); in selinux_fs_context_dup() 2885 if (src->rootcontext) { in selinux_fs_context_dup() 2886 opts->rootcontext = kstrdup(src->rootcontext, GFP_KERNEL); in selinux_fs_context_dup() 2890 if (src->defcontext) { in selinux_fs_context_dup() 2891 opts->defcontext = kstrdup(src->defcontext, GFP_KERNEL); in selinux_fs_context_dup() [all …]
|
/security/landlock/ |
D | ruleset.c | 262 struct landlock_ruleset *const src) in merge_ruleset() argument 269 if (WARN_ON_ONCE(!src)) in merge_ruleset() 277 mutex_lock_nested(&src->lock, SINGLE_DEPTH_NESTING); in merge_ruleset() 280 if (WARN_ON_ONCE(src->num_layers != 1 || dst->num_layers < 1)) { in merge_ruleset() 284 dst->fs_access_masks[dst->num_layers - 1] = src->fs_access_masks[0]; in merge_ruleset() 287 rbtree_postorder_for_each_entry_safe(walker_rule, next_rule, &src->root, in merge_ruleset() 309 mutex_unlock(&src->lock); in merge_ruleset()
|
D | syscalls.c | 48 const size_t ksize_min, const void __user *const src, in copy_min_struct_from_user() argument 53 if (!src) in copy_min_struct_from_user() 65 return copy_struct_from_user(dst, ksize, src, usize); in copy_min_struct_from_user()
|
/security/apparmor/ |
D | Makefile | 101 $(src)/Makefile 104 $(src)/Makefile 108 $(src)/Makefile
|
D | policy_unpack.c | 206 static void *kvmemdup(const void *src, size_t len) in kvmemdup() argument 211 memcpy(p, src, len); in kvmemdup() 1063 static int deflate_compress(const char *src, size_t slen, char **dst, in deflate_compress() argument 1094 strm.next_in = src; in deflate_compress()
|
D | apparmorfs.c | 1298 static int deflate_decompress(char *src, size_t slen, char *dst, size_t dlen) in deflate_decompress() argument 1306 memcpy(dst, src, slen); in deflate_decompress() 1316 strm.next_in = src; in deflate_decompress()
|
/security/tomoyo/ |
D | Makefile | 7 $(objtree)/scripts/bin2c <$(firstword $(wildcard $(obj)/policy/$(1).conf $(srctree)/$(src)/policy/$… 13 $(obj)/builtin-policy.h: $(wildcard $(obj)/policy/*.conf $(srctree)/$(src)/policy/*.conf.default) F…
|
D | util.c | 384 bool tomoyo_str_starts(char **src, const char *find) in tomoyo_str_starts() argument 387 char *tmp = *src; in tomoyo_str_starts() 392 *src = tmp; in tomoyo_str_starts()
|
D | common.h | 953 bool tomoyo_str_starts(char **src, const char *find);
|
/security/keys/trusted-keys/ |
D | trusted_tpm2.c | 33 u8 *src, u32 len) in tpm2_key_encode() argument 42 priv_len = get_unaligned_be16(src) + 2; in tpm2_key_encode() 43 priv = src; in tpm2_key_encode() 45 src += priv_len; in tpm2_key_encode() 47 pub_len = get_unaligned_be16(src) + 2; in tpm2_key_encode() 48 pub = src; in tpm2_key_encode()
|
/security/keys/ |
D | dh.c | 143 static int kdf_ctr(struct kdf_sdesc *sdesc, const u8 *src, unsigned int slen, in kdf_ctr() argument 177 if (src && slen) { in kdf_ctr() 178 err = crypto_shash_update(desc, src, slen); in kdf_ctr()
|
/security/integrity/evm/ |
D | evm_crypto.c | 186 static void dump_security_xattr(const char *prefix, const void *src, in dump_security_xattr() argument 196 p = bin2hex(p, src, count); in dump_security_xattr()
|
/security/smack/ |
D | smack_lsm.c | 623 struct smack_mnt_opts *dst, *src = src_fc->security; in smack_fs_context_dup() local 625 if (!src) in smack_fs_context_dup() 633 if (src->fsdefault) { in smack_fs_context_dup() 634 dst->fsdefault = kstrdup(src->fsdefault, GFP_KERNEL); in smack_fs_context_dup() 638 if (src->fsfloor) { in smack_fs_context_dup() 639 dst->fsfloor = kstrdup(src->fsfloor, GFP_KERNEL); in smack_fs_context_dup() 643 if (src->fshat) { in smack_fs_context_dup() 644 dst->fshat = kstrdup(src->fshat, GFP_KERNEL); in smack_fs_context_dup() 648 if (src->fsroot) { in smack_fs_context_dup() 649 dst->fsroot = kstrdup(src->fsroot, GFP_KERNEL); in smack_fs_context_dup() [all …]
|
/security/integrity/ima/ |
D | ima_policy.c | 281 static struct ima_rule_opt_list *ima_alloc_rule_opt_list(const substring_t *src) in ima_alloc_rule_opt_list() argument 289 src_copy = match_strdup(src); in ima_alloc_rule_opt_list()
|
/security/ |
D | security.c | 1485 int security_inode_copy_up(struct dentry *src, struct cred **new) in security_inode_copy_up() argument 1487 return call_int_hook(inode_copy_up, 0, src, new); in security_inode_copy_up()
|