/linux-master/security/selinux/include/ |
H A D | security.h | 227 #define security_xperm_set(perms, x) ((perms)[(x) >> 5] |= 1 << ((x)&0x1f)) 228 #define security_xperm_test(perms, x) (1 & ((perms)[(x) >> 5] >> ((x)&0x1f))) 314 char ***perms, u32 *nperms);
|
/linux-master/security/apparmor/ |
H A D | policy_unpack.c | 667 static ssize_t unpack_perms_table(struct aa_ext *e, struct aa_perms **perms) argument 672 AA_BUG(!perms); 674 * policy perms are optional, in which case perms are embedded 677 if (aa_unpack_nameX(e, AA_STRUCT, "perms")) { 685 *perms = kcalloc(size, sizeof(struct aa_perms), GFP_KERNEL); 686 if (!*perms) 689 if (!unpack_perm(e, version, &(*perms)[i])) 697 *perms = NULL; 702 kfree(*perms); [all...] |
H A D | label.c | 1284 * label_compound_match - find perms for full compound label 1285 * @profile: profile to find perms for 1291 * @perms: perms struct to set 1296 * @perms should be preinitialized with allperms OR a previous permission 1303 struct aa_perms *perms) 1319 *perms = allperms; 1331 *perms = *aa_lookup_perms(rules->policy, state); 1332 aa_apply_modes_to_perms(profile, perms); 1333 if ((perms 1299 label_compound_match(struct aa_profile *profile, struct aa_ruleset *rules, struct aa_label *label, aa_state_t state, bool subns, u32 request, struct aa_perms *perms) argument 1359 label_components_match(struct aa_profile *profile, struct aa_ruleset *rules, struct aa_label *label, aa_state_t start, bool subns, u32 request, struct aa_perms *perms) argument 1420 aa_label_match(struct aa_profile *profile, struct aa_ruleset *rules, struct aa_label *label, aa_state_t state, bool subns, u32 request, struct aa_perms *perms) argument [all...] |
H A D | lsm.c | 570 * Private mappings don't require write perms since they don't 638 struct aa_perms perms = { }; local 642 false, request, &perms); 644 perms = *aa_lookup_perms(rules->policy, state); 646 aa_apply_modes_to_perms(profile, &perms); 647 error = aa_check_perms(profile, &perms, request, ad, 1291 * apparmor_socket_sock_rcv_skb - check perms before associating skb to sk 1293 * @skb: skb to check for perms 2182 nullpdb->perms = kcalloc(2, sizeof(struct aa_perms), GFP_KERNEL); 2183 if (!nullpdb->perms) [all...] |
H A D | apparmorfs.c | 612 static void profile_query_cb(struct aa_profile *profile, struct aa_perms *perms, argument 633 return; /* no change to current perms */ 641 aa_perms_accum_raw(perms, &tmp); 763 struct aa_perms perms; local 789 perms = allperms; 792 profile_query_cb(profile, &perms, match_str, match_len); 796 profile_query_cb(profile, &perms, match_str, match_len); 803 perms.allow, perms.deny, perms [all...] |
/linux-master/security/selinux/ss/ |
H A D | avtab.c | 134 /* extended perms may not be unique */ 350 __le32 buf32[ARRAY_SIZE(xperms.perms.p)]; 473 sizeof(u32) * ARRAY_SIZE(xperms.perms.p)); 478 for (i = 0; i < ARRAY_SIZE(xperms.perms.p); i++) 479 xperms.perms.p[i] = le32_to_cpu(buf32[i]); 549 __le32 buf32[ARRAY_SIZE(cur->datum.u.xperms->perms.p)]; 569 for (i = 0; i < ARRAY_SIZE(cur->datum.u.xperms->perms.p); i++) 570 buf32[i] = cpu_to_le32(cur->datum.u.xperms->perms.p[i]); 572 ARRAY_SIZE(cur->datum.u.xperms->perms.p), fp);
|
H A D | avtab.h | 62 * multiple extended perms may be used and the driver field 67 struct extended_perms_data perms; member in struct:avtab_extended_perms
|
H A D | services.c | 139 while (p_in->perms[k]) { 141 if (!*p_in->perms[k]) { 145 p_out->perms[k] = string_to_av_perm(pol, p_out->value, 146 p_in->perms[k]); 147 if (!p_out->perms[k]) { 149 p_in->perms[k], p_in->name); 209 if (avd->allowed & mapping->perms[i]) 211 if (allow_unknown && !mapping->perms[i]) 217 if (avd->auditallow & mapping->perms[i]) 222 if (avd->auditdeny & mapping->perms[ 3384 char *name = k, **perms = args; local 3394 security_get_permissions(struct selinux_policy *policy, const char *class, char ***perms, u32 *nperms) argument [all...] |
/linux-master/tools/testing/selftests/mqueue/ |
H A D | mq_open_tests.c | 203 int perms = DEFFILEMODE; local 205 if ((queue = mq_open(queue_path, flags, perms, attr)) == -1) 225 int perms = DEFFILEMODE; local 227 if ((queue = mq_open(queue_path, flags, perms, attr)) == -1)
|
H A D | mq_perf_tests.c | 295 int perms = DEFFILEMODE; local 297 queue = mq_open(queue_path, flags, perms, attr);
|
/linux-master/security/selinux/ |
H A D | avc.c | 658 const char *const *perms; local 668 perms = secclass_map[sad->tclass-1].perms; 674 if ((perm & av) && perms[i]) { 675 audit_log_format(ab, " %s", perms[i]); 816 * @perms : Permission mask bits 831 static int avc_update_node(u32 event, u32 perms, u8 driver, u8 xperm, u32 ssid, argument 889 node->ae.avd.allowed |= perms; 895 node->ae.avd.allowed &= ~perms; 898 node->ae.avd.auditallow |= perms; [all...] |
H A D | hooks.c | 1659 u32 perms, 1671 return avc_has_perm(sid, isec->sid, isec->sclass, perms, adp); 1941 u32 perms, 1948 return avc_has_perm(sid, sbsec->sid, SECCLASS_FILESYSTEM, perms, ad); 3082 u32 perms, u32 audited, u32 denied, 3091 return slow_avc_audit(current_sid(), isec->sid, isec->sclass, perms, 3098 u32 perms; local 3117 perms = file_mask_to_av(inode->i_mode, mask); 3124 rc = avc_has_perm_noaudit(sid, isec->sid, isec->sclass, perms, 0, 3126 audited = avc_audit_required(perms, 1657 inode_has_perm(const struct cred *cred, struct inode *inode, u32 perms, struct common_audit_data *adp) argument 1939 superblock_has_perm(const struct cred *cred, const struct super_block *sb, u32 perms, struct common_audit_data *ad) argument 3081 audit_inode_permission(struct inode *inode, u32 perms, u32 audited, u32 denied, int result) argument 4584 sock_has_perm(struct sock *sk, u32 perms) argument 6001 ipc_has_perm(struct kern_ipc_perm *ipc_perms, u32 perms) argument 6060 u32 perms; local 6188 u32 perms; local 6221 u32 perms; local 6267 u32 perms; local 6310 u32 perms; local [all...] |
/linux-master/security/apparmor/include/ |
H A D | policy.h | 30 #include "perms.h" 80 * perms: table of permissions 88 struct aa_perms *perms; member in struct:aa_policydb::__anon648 132 if (!(policy->perms)) 135 return &(policy->perms[index]);
|
H A D | perms.h | 103 * aa_perms_accum_raw - accumulate perms with out masking off overlapping perms 104 * @accum - perms struct to accumulate into 105 * @addend - perms struct to add to @accum 130 * aa_perms_accum - accumulate perms, masking off overlapping perms 131 * @accum - perms struct to accumulate into 132 * @addend - perms struct to add to @accum 210 struct aa_perms *perms); 215 int type, u32 request, struct aa_perms *perms); [all...] |
/linux-master/arch/x86/platform/uv/ |
H A D | bios_uv.c | 136 uv_bios_change_memprotect(u64 paddr, u64 len, enum uv_memprotect perms) argument 139 perms, 0, 0);
|
/linux-master/fs/hfsplus/ |
H A D | inode.c | 183 struct hfsplus_perm *perms, int dir) 188 mode = be16_to_cpu(perms->mode); 190 i_uid_write(inode, be32_to_cpu(perms->owner)); 194 i_gid_write(inode, be32_to_cpu(perms->group)); 205 HFSPLUS_I(inode)->userflags = perms->userflags; 206 if (perms->rootflags & HFSPLUS_FLG_IMMUTABLE) 210 if (perms->rootflags & HFSPLUS_FLG_APPEND) 182 hfsplus_get_perms(struct inode *inode, struct hfsplus_perm *perms, int dir) argument
|
/linux-master/fs/smb/server/ |
H A D | smbacl.h | 148 struct smb_sid sid; /* ie UUID of user or group who gets these perms */ 170 struct posix_ace_state perms; member in struct:posix_user_ace_state
|
H A D | smbacl.c | 141 ksmbd_debug(SMB, "all perms\n"); 311 pace->e_perm = state->users->aces[i].perms.allow; 322 pace->e_perm = state->groups->aces[i].perms.allow; 505 acl_state.users->aces[acl_state.users->n++].perms.allow = 510 default_acl_state.users->aces[default_acl_state.users->n++].perms.allow = 520 acl_state.users->aces[acl_state.users->n++].perms.allow = 525 default_acl_state.users->aces[default_acl_state.users->n++].perms.allow = 533 acl_state.groups->aces[acl_state.groups->n++].perms.allow = 538 default_acl_state.groups->aces[default_acl_state.groups->n++].perms.allow =
|
/linux-master/drivers/usb/gadget/function/ |
H A D | f_fs.c | 1847 struct ffs_file_perms *perms) 1857 inode->i_mode = perms->mode; 1858 inode->i_uid = perms->uid; 1859 inode->i_gid = perms->gid; 1902 struct ffs_file_perms perms; member in struct:ffs_sb_fill_data 1925 data->perms.mode = data->root_mode; 1929 &data->perms); 1978 data->perms.mode = (result.uint_32 & 0666) | S_IFREG; 1982 data->perms.mode = (result.uint_32 & 0666) | S_IFREG; 1986 data->perms 1844 ffs_sb_make_inode(struct super_block *sb, void *data, const struct file_operations *fops, const struct inode_operations *iops, struct ffs_file_perms *perms) argument [all...] |
/linux-master/fs/orangefs/ |
H A D | protocol.h | 229 __u32 perms; member in struct:ORANGEFS_sys_attr_s
|
/linux-master/drivers/infiniband/hw/cxgb4/ |
H A D | mem.c | 399 mhp->attr.perms : 0, 460 mhp->attr.perms = c4iw_ib_to_tpt_access(acc); 469 FW_RI_STAG_NSMR, mhp->attr.perms, 573 mhp->attr.perms = c4iw_ib_to_tpt_access(acc);
|
/linux-master/drivers/net/wireless/rsi/ |
H A D | rsi_91x_debugfs.c | 303 files->perms,
|
/linux-master/arch/arm64/kvm/hyp/nvhe/ |
H A D | mem_protect.c | 760 enum kvm_pgtable_prot perms) 764 if (perms != PAGE_HYP) 798 enum kvm_pgtable_prot perms) 803 prot = pkvm_mkstate(perms, PKVM_PAGE_SHARED_BORROWED); 759 hyp_ack_share(u64 addr, const struct pkvm_mem_transition *tx, enum kvm_pgtable_prot perms) argument 797 hyp_complete_share(u64 addr, const struct pkvm_mem_transition *tx, enum kvm_pgtable_prot perms) argument
|
/linux-master/drivers/remoteproc/ |
H A D | qcom_q6v5_mss.c | 426 int perms = 0; local 436 next[perms].vmid = QCOM_SCM_VMID_HLOS; 437 next[perms].perm = QCOM_SCM_PERM_RWX; 438 perms++; 442 next[perms].vmid = QCOM_SCM_VMID_MSS_MSA; 443 next[perms].perm = QCOM_SCM_PERM_RW; 444 perms++; 448 current_perm, next, perms);
|
/linux-master/drivers/scsi/cxlflash/ |
H A D | vlun.c | 573 /* select both ports, use r/w perms from RHT */ 1204 u32 perms; local 1276 perms = ctxi_dst->rht_perms; 1299 SISL_RHT_FP_CLONE(ctxi_src->rht_start[i].fp, perms);
|