Searched refs:perms (Results 26 - 50 of 61) sorted by relevance

123

/linux-master/security/selinux/include/
H A Dsecurity.h227 #define security_xperm_set(perms, x) ((perms)[(x) >> 5] |= 1 << ((x)&0x1f))
228 #define security_xperm_test(perms, x) (1 & ((perms)[(x) >> 5] >> ((x)&0x1f)))
314 char ***perms, u32 *nperms);
/linux-master/security/apparmor/
H A Dpolicy_unpack.c667 static ssize_t unpack_perms_table(struct aa_ext *e, struct aa_perms **perms) argument
672 AA_BUG(!perms);
674 * policy perms are optional, in which case perms are embedded
677 if (aa_unpack_nameX(e, AA_STRUCT, "perms")) {
685 *perms = kcalloc(size, sizeof(struct aa_perms), GFP_KERNEL);
686 if (!*perms)
689 if (!unpack_perm(e, version, &(*perms)[i]))
697 *perms = NULL;
702 kfree(*perms);
[all...]
H A Dlabel.c1284 * label_compound_match - find perms for full compound label
1285 * @profile: profile to find perms for
1291 * @perms: perms struct to set
1296 * @perms should be preinitialized with allperms OR a previous permission
1303 struct aa_perms *perms)
1319 *perms = allperms;
1331 *perms = *aa_lookup_perms(rules->policy, state);
1332 aa_apply_modes_to_perms(profile, perms);
1333 if ((perms
1299 label_compound_match(struct aa_profile *profile, struct aa_ruleset *rules, struct aa_label *label, aa_state_t state, bool subns, u32 request, struct aa_perms *perms) argument
1359 label_components_match(struct aa_profile *profile, struct aa_ruleset *rules, struct aa_label *label, aa_state_t start, bool subns, u32 request, struct aa_perms *perms) argument
1420 aa_label_match(struct aa_profile *profile, struct aa_ruleset *rules, struct aa_label *label, aa_state_t state, bool subns, u32 request, struct aa_perms *perms) argument
[all...]
H A Dlsm.c570 * Private mappings don't require write perms since they don't
638 struct aa_perms perms = { }; local
642 false, request, &perms);
644 perms = *aa_lookup_perms(rules->policy, state);
646 aa_apply_modes_to_perms(profile, &perms);
647 error = aa_check_perms(profile, &perms, request, ad,
1291 * apparmor_socket_sock_rcv_skb - check perms before associating skb to sk
1293 * @skb: skb to check for perms
2182 nullpdb->perms = kcalloc(2, sizeof(struct aa_perms), GFP_KERNEL);
2183 if (!nullpdb->perms)
[all...]
H A Dapparmorfs.c612 static void profile_query_cb(struct aa_profile *profile, struct aa_perms *perms, argument
633 return; /* no change to current perms */
641 aa_perms_accum_raw(perms, &tmp);
763 struct aa_perms perms; local
789 perms = allperms;
792 profile_query_cb(profile, &perms, match_str, match_len);
796 profile_query_cb(profile, &perms, match_str, match_len);
803 perms.allow, perms.deny, perms
[all...]
/linux-master/security/selinux/ss/
H A Davtab.c134 /* extended perms may not be unique */
350 __le32 buf32[ARRAY_SIZE(xperms.perms.p)];
473 sizeof(u32) * ARRAY_SIZE(xperms.perms.p));
478 for (i = 0; i < ARRAY_SIZE(xperms.perms.p); i++)
479 xperms.perms.p[i] = le32_to_cpu(buf32[i]);
549 __le32 buf32[ARRAY_SIZE(cur->datum.u.xperms->perms.p)];
569 for (i = 0; i < ARRAY_SIZE(cur->datum.u.xperms->perms.p); i++)
570 buf32[i] = cpu_to_le32(cur->datum.u.xperms->perms.p[i]);
572 ARRAY_SIZE(cur->datum.u.xperms->perms.p), fp);
H A Davtab.h62 * multiple extended perms may be used and the driver field
67 struct extended_perms_data perms; member in struct:avtab_extended_perms
H A Dservices.c139 while (p_in->perms[k]) {
141 if (!*p_in->perms[k]) {
145 p_out->perms[k] = string_to_av_perm(pol, p_out->value,
146 p_in->perms[k]);
147 if (!p_out->perms[k]) {
149 p_in->perms[k], p_in->name);
209 if (avd->allowed & mapping->perms[i])
211 if (allow_unknown && !mapping->perms[i])
217 if (avd->auditallow & mapping->perms[i])
222 if (avd->auditdeny & mapping->perms[
3384 char *name = k, **perms = args; local
3394 security_get_permissions(struct selinux_policy *policy, const char *class, char ***perms, u32 *nperms) argument
[all...]
/linux-master/tools/testing/selftests/mqueue/
H A Dmq_open_tests.c203 int perms = DEFFILEMODE; local
205 if ((queue = mq_open(queue_path, flags, perms, attr)) == -1)
225 int perms = DEFFILEMODE; local
227 if ((queue = mq_open(queue_path, flags, perms, attr)) == -1)
H A Dmq_perf_tests.c295 int perms = DEFFILEMODE; local
297 queue = mq_open(queue_path, flags, perms, attr);
/linux-master/security/selinux/
H A Davc.c658 const char *const *perms; local
668 perms = secclass_map[sad->tclass-1].perms;
674 if ((perm & av) && perms[i]) {
675 audit_log_format(ab, " %s", perms[i]);
816 * @perms : Permission mask bits
831 static int avc_update_node(u32 event, u32 perms, u8 driver, u8 xperm, u32 ssid, argument
889 node->ae.avd.allowed |= perms;
895 node->ae.avd.allowed &= ~perms;
898 node->ae.avd.auditallow |= perms;
[all...]
H A Dhooks.c1659 u32 perms,
1671 return avc_has_perm(sid, isec->sid, isec->sclass, perms, adp);
1941 u32 perms,
1948 return avc_has_perm(sid, sbsec->sid, SECCLASS_FILESYSTEM, perms, ad);
3082 u32 perms, u32 audited, u32 denied,
3091 return slow_avc_audit(current_sid(), isec->sid, isec->sclass, perms,
3098 u32 perms; local
3117 perms = file_mask_to_av(inode->i_mode, mask);
3124 rc = avc_has_perm_noaudit(sid, isec->sid, isec->sclass, perms, 0,
3126 audited = avc_audit_required(perms,
1657 inode_has_perm(const struct cred *cred, struct inode *inode, u32 perms, struct common_audit_data *adp) argument
1939 superblock_has_perm(const struct cred *cred, const struct super_block *sb, u32 perms, struct common_audit_data *ad) argument
3081 audit_inode_permission(struct inode *inode, u32 perms, u32 audited, u32 denied, int result) argument
4584 sock_has_perm(struct sock *sk, u32 perms) argument
6001 ipc_has_perm(struct kern_ipc_perm *ipc_perms, u32 perms) argument
6060 u32 perms; local
6188 u32 perms; local
6221 u32 perms; local
6267 u32 perms; local
6310 u32 perms; local
[all...]
/linux-master/security/apparmor/include/
H A Dpolicy.h30 #include "perms.h"
80 * perms: table of permissions
88 struct aa_perms *perms; member in struct:aa_policydb::__anon648
132 if (!(policy->perms))
135 return &(policy->perms[index]);
H A Dperms.h103 * aa_perms_accum_raw - accumulate perms with out masking off overlapping perms
104 * @accum - perms struct to accumulate into
105 * @addend - perms struct to add to @accum
130 * aa_perms_accum - accumulate perms, masking off overlapping perms
131 * @accum - perms struct to accumulate into
132 * @addend - perms struct to add to @accum
210 struct aa_perms *perms);
215 int type, u32 request, struct aa_perms *perms);
[all...]
/linux-master/arch/x86/platform/uv/
H A Dbios_uv.c136 uv_bios_change_memprotect(u64 paddr, u64 len, enum uv_memprotect perms) argument
139 perms, 0, 0);
/linux-master/fs/hfsplus/
H A Dinode.c183 struct hfsplus_perm *perms, int dir)
188 mode = be16_to_cpu(perms->mode);
190 i_uid_write(inode, be32_to_cpu(perms->owner));
194 i_gid_write(inode, be32_to_cpu(perms->group));
205 HFSPLUS_I(inode)->userflags = perms->userflags;
206 if (perms->rootflags & HFSPLUS_FLG_IMMUTABLE)
210 if (perms->rootflags & HFSPLUS_FLG_APPEND)
182 hfsplus_get_perms(struct inode *inode, struct hfsplus_perm *perms, int dir) argument
/linux-master/fs/smb/server/
H A Dsmbacl.h148 struct smb_sid sid; /* ie UUID of user or group who gets these perms */
170 struct posix_ace_state perms; member in struct:posix_user_ace_state
H A Dsmbacl.c141 ksmbd_debug(SMB, "all perms\n");
311 pace->e_perm = state->users->aces[i].perms.allow;
322 pace->e_perm = state->groups->aces[i].perms.allow;
505 acl_state.users->aces[acl_state.users->n++].perms.allow =
510 default_acl_state.users->aces[default_acl_state.users->n++].perms.allow =
520 acl_state.users->aces[acl_state.users->n++].perms.allow =
525 default_acl_state.users->aces[default_acl_state.users->n++].perms.allow =
533 acl_state.groups->aces[acl_state.groups->n++].perms.allow =
538 default_acl_state.groups->aces[default_acl_state.groups->n++].perms.allow =
/linux-master/drivers/usb/gadget/function/
H A Df_fs.c1847 struct ffs_file_perms *perms)
1857 inode->i_mode = perms->mode;
1858 inode->i_uid = perms->uid;
1859 inode->i_gid = perms->gid;
1902 struct ffs_file_perms perms; member in struct:ffs_sb_fill_data
1925 data->perms.mode = data->root_mode;
1929 &data->perms);
1978 data->perms.mode = (result.uint_32 & 0666) | S_IFREG;
1982 data->perms.mode = (result.uint_32 & 0666) | S_IFREG;
1986 data->perms
1844 ffs_sb_make_inode(struct super_block *sb, void *data, const struct file_operations *fops, const struct inode_operations *iops, struct ffs_file_perms *perms) argument
[all...]
/linux-master/fs/orangefs/
H A Dprotocol.h229 __u32 perms; member in struct:ORANGEFS_sys_attr_s
/linux-master/drivers/infiniband/hw/cxgb4/
H A Dmem.c399 mhp->attr.perms : 0,
460 mhp->attr.perms = c4iw_ib_to_tpt_access(acc);
469 FW_RI_STAG_NSMR, mhp->attr.perms,
573 mhp->attr.perms = c4iw_ib_to_tpt_access(acc);
/linux-master/drivers/net/wireless/rsi/
H A Drsi_91x_debugfs.c303 files->perms,
/linux-master/arch/arm64/kvm/hyp/nvhe/
H A Dmem_protect.c760 enum kvm_pgtable_prot perms)
764 if (perms != PAGE_HYP)
798 enum kvm_pgtable_prot perms)
803 prot = pkvm_mkstate(perms, PKVM_PAGE_SHARED_BORROWED);
759 hyp_ack_share(u64 addr, const struct pkvm_mem_transition *tx, enum kvm_pgtable_prot perms) argument
797 hyp_complete_share(u64 addr, const struct pkvm_mem_transition *tx, enum kvm_pgtable_prot perms) argument
/linux-master/drivers/remoteproc/
H A Dqcom_q6v5_mss.c426 int perms = 0; local
436 next[perms].vmid = QCOM_SCM_VMID_HLOS;
437 next[perms].perm = QCOM_SCM_PERM_RWX;
438 perms++;
442 next[perms].vmid = QCOM_SCM_VMID_MSS_MSA;
443 next[perms].perm = QCOM_SCM_PERM_RW;
444 perms++;
448 current_perm, next, perms);
/linux-master/drivers/scsi/cxlflash/
H A Dvlun.c573 /* select both ports, use r/w perms from RHT */
1204 u32 perms; local
1276 perms = ctxi_dst->rht_perms;
1299 SISL_RHT_FP_CLONE(ctxi_src->rht_start[i].fp, perms);

Completed in 270 milliseconds

123