Home
last modified time | relevance | path

Searched refs:src (Results 1 – 21 of 21) sorted by relevance

/security/selinux/ss/
Dcontext.h41 static inline int mls_context_cpy(struct context *dst, struct context *src) in mls_context_cpy() argument
45 dst->range.level[0].sens = src->range.level[0].sens; in mls_context_cpy()
46 rc = ebitmap_cpy(&dst->range.level[0].cat, &src->range.level[0].cat); in mls_context_cpy()
50 dst->range.level[1].sens = src->range.level[1].sens; in mls_context_cpy()
51 rc = ebitmap_cpy(&dst->range.level[1].cat, &src->range.level[1].cat); in mls_context_cpy()
61 static inline int mls_context_cpy_low(struct context *dst, struct context *src) in mls_context_cpy_low() argument
65 dst->range.level[0].sens = src->range.level[0].sens; in mls_context_cpy_low()
66 rc = ebitmap_cpy(&dst->range.level[0].cat, &src->range.level[0].cat); in mls_context_cpy_low()
70 dst->range.level[1].sens = src->range.level[0].sens; in mls_context_cpy_low()
71 rc = ebitmap_cpy(&dst->range.level[1].cat, &src->range.level[0].cat); in mls_context_cpy_low()
[all …]
Debitmap.c53 int ebitmap_cpy(struct ebitmap *dst, struct ebitmap *src) in ebitmap_cpy() argument
58 n = src->node; in ebitmap_cpy()
77 dst->highbit = src->highbit; in ebitmap_cpy()
Debitmap.h126 int ebitmap_cpy(struct ebitmap *dst, struct ebitmap *src);
/security/safesetid/
Dlsm.c33 kid_t src, kid_t dst) in _setid_policy_lookup() argument
39 hash_for_each_possible(policy->rules, rule, next, __kuid_val(src.uid)) { in _setid_policy_lookup()
40 if (!uid_eq(rule->src_id.uid, src.uid)) in _setid_policy_lookup()
47 hash_for_each_possible(policy->rules, rule, next, __kgid_val(src.gid)) { in _setid_policy_lookup()
48 if (!gid_eq(rule->src_id.gid, src.gid)) in _setid_policy_lookup()
66 static enum sid_policy_type setid_policy_lookup(kid_t src, kid_t dst, enum setid_type new_type) in setid_policy_lookup() argument
84 result = _setid_policy_lookup(pol, src, dst); in setid_policy_lookup()
Dlsm.h68 kid_t src, kid_t dst);
/security/selinux/
Davc.c259 struct extended_perms_decision *src) in avc_copy_xperms_decision() argument
261 dest->driver = src->driver; in avc_copy_xperms_decision()
262 dest->used = src->used; in avc_copy_xperms_decision()
264 memcpy(dest->allowed->p, src->allowed->p, in avc_copy_xperms_decision()
265 sizeof(src->allowed->p)); in avc_copy_xperms_decision()
267 memcpy(dest->auditallow->p, src->auditallow->p, in avc_copy_xperms_decision()
268 sizeof(src->auditallow->p)); in avc_copy_xperms_decision()
270 memcpy(dest->dontaudit->p, src->dontaudit->p, in avc_copy_xperms_decision()
271 sizeof(src->dontaudit->p)); in avc_copy_xperms_decision()
280 struct extended_perms_decision *src) in avc_quick_copy_xperms_decision() argument
[all …]
Dhooks.c2863 const struct selinux_mnt_opts *src = src_fc->security; in selinux_fs_context_dup() local
2866 if (!src) in selinux_fs_context_dup()
2875 if (src->fscontext) { in selinux_fs_context_dup()
2876 opts->fscontext = kstrdup(src->fscontext, GFP_KERNEL); in selinux_fs_context_dup()
2880 if (src->context) { in selinux_fs_context_dup()
2881 opts->context = kstrdup(src->context, GFP_KERNEL); in selinux_fs_context_dup()
2885 if (src->rootcontext) { in selinux_fs_context_dup()
2886 opts->rootcontext = kstrdup(src->rootcontext, GFP_KERNEL); in selinux_fs_context_dup()
2890 if (src->defcontext) { in selinux_fs_context_dup()
2891 opts->defcontext = kstrdup(src->defcontext, GFP_KERNEL); in selinux_fs_context_dup()
[all …]
/security/landlock/
Druleset.c262 struct landlock_ruleset *const src) in merge_ruleset() argument
269 if (WARN_ON_ONCE(!src)) in merge_ruleset()
277 mutex_lock_nested(&src->lock, SINGLE_DEPTH_NESTING); in merge_ruleset()
280 if (WARN_ON_ONCE(src->num_layers != 1 || dst->num_layers < 1)) { in merge_ruleset()
284 dst->fs_access_masks[dst->num_layers - 1] = src->fs_access_masks[0]; in merge_ruleset()
287 rbtree_postorder_for_each_entry_safe(walker_rule, next_rule, &src->root, in merge_ruleset()
309 mutex_unlock(&src->lock); in merge_ruleset()
Dsyscalls.c48 const size_t ksize_min, const void __user *const src, in copy_min_struct_from_user() argument
53 if (!src) in copy_min_struct_from_user()
65 return copy_struct_from_user(dst, ksize, src, usize); in copy_min_struct_from_user()
/security/apparmor/
DMakefile101 $(src)/Makefile
104 $(src)/Makefile
108 $(src)/Makefile
Dpolicy_unpack.c206 static void *kvmemdup(const void *src, size_t len) in kvmemdup() argument
211 memcpy(p, src, len); in kvmemdup()
1063 static int deflate_compress(const char *src, size_t slen, char **dst, in deflate_compress() argument
1094 strm.next_in = src; in deflate_compress()
Dapparmorfs.c1298 static int deflate_decompress(char *src, size_t slen, char *dst, size_t dlen) in deflate_decompress() argument
1306 memcpy(dst, src, slen); in deflate_decompress()
1316 strm.next_in = src; in deflate_decompress()
/security/tomoyo/
DMakefile7 $(objtree)/scripts/bin2c <$(firstword $(wildcard $(obj)/policy/$(1).conf $(srctree)/$(src)/policy/$…
13 $(obj)/builtin-policy.h: $(wildcard $(obj)/policy/*.conf $(srctree)/$(src)/policy/*.conf.default) F…
Dutil.c384 bool tomoyo_str_starts(char **src, const char *find) in tomoyo_str_starts() argument
387 char *tmp = *src; in tomoyo_str_starts()
392 *src = tmp; in tomoyo_str_starts()
Dcommon.h953 bool tomoyo_str_starts(char **src, const char *find);
/security/keys/trusted-keys/
Dtrusted_tpm2.c33 u8 *src, u32 len) in tpm2_key_encode() argument
42 priv_len = get_unaligned_be16(src) + 2; in tpm2_key_encode()
43 priv = src; in tpm2_key_encode()
45 src += priv_len; in tpm2_key_encode()
47 pub_len = get_unaligned_be16(src) + 2; in tpm2_key_encode()
48 pub = src; in tpm2_key_encode()
/security/keys/
Ddh.c143 static int kdf_ctr(struct kdf_sdesc *sdesc, const u8 *src, unsigned int slen, in kdf_ctr() argument
177 if (src && slen) { in kdf_ctr()
178 err = crypto_shash_update(desc, src, slen); in kdf_ctr()
/security/integrity/evm/
Devm_crypto.c186 static void dump_security_xattr(const char *prefix, const void *src, in dump_security_xattr() argument
196 p = bin2hex(p, src, count); in dump_security_xattr()
/security/smack/
Dsmack_lsm.c623 struct smack_mnt_opts *dst, *src = src_fc->security; in smack_fs_context_dup() local
625 if (!src) in smack_fs_context_dup()
633 if (src->fsdefault) { in smack_fs_context_dup()
634 dst->fsdefault = kstrdup(src->fsdefault, GFP_KERNEL); in smack_fs_context_dup()
638 if (src->fsfloor) { in smack_fs_context_dup()
639 dst->fsfloor = kstrdup(src->fsfloor, GFP_KERNEL); in smack_fs_context_dup()
643 if (src->fshat) { in smack_fs_context_dup()
644 dst->fshat = kstrdup(src->fshat, GFP_KERNEL); in smack_fs_context_dup()
648 if (src->fsroot) { in smack_fs_context_dup()
649 dst->fsroot = kstrdup(src->fsroot, GFP_KERNEL); in smack_fs_context_dup()
[all …]
/security/integrity/ima/
Dima_policy.c281 static struct ima_rule_opt_list *ima_alloc_rule_opt_list(const substring_t *src) in ima_alloc_rule_opt_list() argument
289 src_copy = match_strdup(src); in ima_alloc_rule_opt_list()
/security/
Dsecurity.c1485 int security_inode_copy_up(struct dentry *src, struct cred **new) in security_inode_copy_up() argument
1487 return call_int_hook(inode_copy_up, 0, src, new); in security_inode_copy_up()