| /security/selinux/ss/ |
| A D | context.h | 160 dst->user = src->user; in context_cpy() 161 dst->role = src->role; in context_cpy() 162 dst->type = src->type; in context_cpy() 165 if (!dst->str) in context_cpy() 167 dst->len = src->len; in context_cpy() 169 dst->str = NULL; in context_cpy() 170 dst->len = 0; in context_cpy() 172 rc = mls_context_cpy(dst, src); in context_cpy() 174 kfree(dst->str); in context_cpy() 175 dst->str = NULL; in context_cpy() [all …]
|
| A D | sidtab.c | 273 struct sidtab_entry *dst, *dst_convert; in sidtab_context_to_sid() local 306 dst = sidtab_do_lookup(s, count, 1); in sidtab_context_to_sid() 307 if (!dst) in sidtab_context_to_sid() 310 dst->sid = index_to_sid(count); in sidtab_context_to_sid() 311 dst->hash = hash; in sidtab_context_to_sid() 313 rc = context_cpy(&dst->context, context); in sidtab_context_to_sid() 328 context_destroy(&dst->context); in sidtab_context_to_sid() 336 context_destroy(&dst->context); in sidtab_context_to_sid() 355 hash_add_rcu(s->context_to_sid, &dst->list, dst->hash); in sidtab_context_to_sid()
|
| A D | ebitmap.c | 49 int ebitmap_cpy(struct ebitmap *dst, const struct ebitmap *src) in ebitmap_cpy() argument 54 ebitmap_init(dst); in ebitmap_cpy() 60 ebitmap_destroy(dst); in ebitmap_cpy() 69 dst->node = new; in ebitmap_cpy() 74 dst->highbit = src->highbit; in ebitmap_cpy() 78 int ebitmap_and(struct ebitmap *dst, const struct ebitmap *e1, in ebitmap_and() argument 85 ebitmap_init(dst); in ebitmap_and() 90 rc = ebitmap_set_bit(dst, bit, 1); in ebitmap_and()
|
| A D | hashtab.c | 52 int __hashtab_insert(struct hashtab *h, struct hashtab_node **dst, void *key, in __hashtab_insert() argument 62 newnode->next = *dst; in __hashtab_insert() 63 *dst = newnode; in __hashtab_insert()
|
| A D | ebitmap.h | 124 int ebitmap_cpy(struct ebitmap *dst, const struct ebitmap *src); 125 int ebitmap_and(struct ebitmap *dst, const struct ebitmap *e1,
|
| A D | hashtab.h | 51 int __hashtab_insert(struct hashtab *h, struct hashtab_node **dst, void *key,
|
| A D | avtab.c | 68 struct avtab_node **dst, in avtab_insert_node() argument 91 newnode->next = *dst; in avtab_insert_node() 92 *dst = newnode; in avtab_insert_node()
|
| A D | conditional.c | 250 struct avtab_node **dst; member 316 *data->dst = node_ptr; in cond_insertf() 344 data.dst = &list->nodes[i]; in cond_read_av_list()
|
| A D | policydb.c | 2009 struct filename_trans_datum **dst, *datum, *first = NULL; in filename_trans_read_helper() local 2040 dst = &first; in filename_trans_read_helper() 2048 *dst = datum; in filename_trans_read_helper() 2061 dst = &datum->next; in filename_trans_read_helper()
|
| /security/landlock/ |
| A D | ruleset.c | 312 static int merge_tree(struct landlock_ruleset *const dst, in merge_tree() argument 321 lockdep_assert_held(&dst->lock); in merge_tree() 332 .level = dst->num_layers, in merge_tree() 347 err = insert_rule(dst, id, &layers, ARRAY_SIZE(layers)); in merge_tree() 354 static int merge_ruleset(struct landlock_ruleset *const dst, in merge_ruleset() argument 364 if (WARN_ON_ONCE(!dst || !dst->hierarchy)) in merge_ruleset() 368 mutex_lock(&dst->lock); in merge_ruleset() 376 dst->access_masks[dst->num_layers - 1] = in merge_ruleset() 380 err = merge_tree(dst, src, LANDLOCK_KEY_INODE); in merge_ruleset() 386 err = merge_tree(dst, src, LANDLOCK_KEY_NET_PORT); in merge_ruleset() [all …]
|
| A D | syscalls.c | 64 copy_min_struct_from_user(void *const dst, const size_t ksize, in copy_min_struct_from_user() argument 69 BUILD_BUG_ON(!dst); in copy_min_struct_from_user() 82 return copy_struct_from_user(dst, ksize, src, usize); in copy_min_struct_from_user()
|
| /security/selinux/ |
| A D | xfrm.c | 209 struct dst_entry *dst = skb_dst(skb); in selinux_xfrm_skb_sid_egress() local 212 if (dst == NULL) in selinux_xfrm_skb_sid_egress() 214 x = dst->xfrm; in selinux_xfrm_skb_sid_egress() 435 struct dst_entry *dst; in selinux_xfrm_postroute_last() local 449 dst = skb_dst(skb); in selinux_xfrm_postroute_last() 450 if (dst) { in selinux_xfrm_postroute_last() 453 for (iter = dst; iter != NULL; iter = xfrm_dst_child(iter)) { in selinux_xfrm_postroute_last()
|
| /security/safesetid/ |
| A D | lsm.c | 34 kid_t src, kid_t dst) in _setid_policy_lookup() argument 43 if (uid_eq(rule->dst_id.uid, dst.uid)) in _setid_policy_lookup() 51 if (gid_eq(rule->dst_id.gid, dst.gid)){ in _setid_policy_lookup() 67 static enum sid_policy_type setid_policy_lookup(kid_t src, kid_t dst, enum setid_type new_type) in setid_policy_lookup() argument 85 result = _setid_policy_lookup(pol, src, dst); in setid_policy_lookup()
|
| A D | lsm.h | 68 kid_t src, kid_t dst);
|
| /security/apparmor/ |
| A D | policy_unpack.c | 1347 static int compress_zstd(const char *src, size_t slen, char **dst, size_t *dlen) in compress_zstd() argument 1384 *dst = kvzalloc(out_len, GFP_KERNEL); in compress_zstd() 1385 if (*dst) { in compress_zstd() 1386 memcpy(*dst, out, out_len); in compress_zstd() 1396 *dst = krealloc(out, out_len, GFP_KERNEL); in compress_zstd() 1399 if (!*dst) { in compress_zstd() 1409 *dst = NULL; in compress_zstd()
|
| A D | apparmorfs.c | 1324 static int decompress_zstd(char *src, size_t slen, char *dst, size_t dlen) in decompress_zstd() argument 1343 out_len = zstd_decompress_dctx(ctx, dst, dlen, src, slen); in decompress_zstd() 1355 memcpy(dst, src, slen); in decompress_zstd()
|
| /security/smack/ |
| A D | smack_lsm.c | 671 struct smack_mnt_opts *dst, *src = src_fc->security; in smack_fs_context_dup() local 680 dst = fc->security; in smack_fs_context_dup() 681 dst->fsdefault = src->fsdefault; in smack_fs_context_dup() 682 dst->fsfloor = src->fsfloor; in smack_fs_context_dup() 683 dst->fshat = src->fshat; in smack_fs_context_dup() 684 dst->fsroot = src->fsroot; in smack_fs_context_dup() 685 dst->fstransmute = src->fstransmute; in smack_fs_context_dup()
|