Searched refs:permissions (Results 1 - 25 of 29) sorted by relevance

12

/linux-master/security/selinux/ss/
H A Dconstraint.h4 * order for one or more permissions to be granted.
59 u32 permissions; /* constrained permissions */ member in struct:constraint_node
60 struct constraint_expr *expr; /* constraint on permissions */
H A Dpolicydb.h33 * in the configuration data: individual permissions,
46 struct symtab permissions; /* common permissions */ member in struct:common_datum
54 struct symtab permissions; /* class-specific permission symbol table */ member in struct:class_datum
H A Dpolicydb.c193 hashtab_map(&comdatum->permissions.table, perm_destroy, NULL);
194 hashtab_destroy(&comdatum->permissions.table);
222 hashtab_map(&cladatum->permissions.table, perm_destroy, NULL);
223 hashtab_destroy(&cladatum->permissions.table);
1166 rc = symtab_init(&comdatum->permissions, nel);
1169 comdatum->permissions.nprim = le32_to_cpu(buf[2]);
1176 rc = perm_read(p, &comdatum->permissions, fp);
1237 c->permissions = le32_to_cpu(buf[0]);
1330 rc = symtab_init(&cladatum->permissions, nel);
1333 cladatum->permissions
[all...]
H A Dservices.c24 * Added validation of kernel classes and permissions
28 * Added support for bounds domain and audit messaged on masked permissions
161 pr_info("SELinux: the above unknown classes and permissions will be %s\n",
440 * security_dump_masked_av - dumps masked permissions during
459 u32 permissions,
473 if (!permissions)
482 hashtab_map(&common_dat->permissions.table,
486 if (hashtab_map(&tclass_dat->permissions.table,
512 if ((mask & permissions) == 0)
529 * security_boundary_permission - drops violated permissions
455 security_dump_masked_av(struct policydb *policydb, struct context *scontext, struct context *tcontext, u16 tclass, u32 permissions, const char *reason) argument
[all...]
/linux-master/arch/x86/include/uapi/asm/
H A Dsgx.h91 * @permissions:new permission bits for pages in range described by @offset
99 __u64 permissions; member in struct:sgx_enclave_restrict_permissions
/linux-master/fs/hfsplus/
H A Dinode.c517 hfsplus_get_perms(inode, &folder->permissions, 1);
546 hfsplus_get_perms(inode, &file->permissions, 0);
549 if (file->permissions.dev)
551 be32_to_cpu(file->permissions.dev));
561 be32_to_cpu(file->permissions.dev));
609 hfsplus_cat_set_perms(inode, &folder->permissions);
638 hfsplus_cat_set_perms(inode, &file->permissions);
640 (file->permissions.rootflags |
641 file->permissions.userflags))
H A Dhfsplus_raw.h74 /* POSIX permissions */
262 struct hfsplus_perm permissions; member in struct:hfsplus_cat_folder
298 struct hfsplus_perm permissions; member in struct:hfsplus_cat_file
H A Dcatalog.c124 hfsplus_cat_set_perms(inode, &folder->permissions);
143 hfsplus_cat_set_perms(inode, &file->permissions);
156 (file->permissions.rootflags |
157 file->permissions.userflags))
169 file->permissions.dev =
H A Ddir.c100 be32_to_cpu(entry.file.permissions.dev);
234 mode = be16_to_cpu(entry.file.permissions.mode);
/linux-master/net/
H A Dsysctl_net.c75 .permissions = net_ctl_permissions,
/linux-master/ipc/
H A Dmq_sysctl.c115 .permissions = mq_permissions,
H A Dipc_sysctl.c243 .permissions = ipc_permissions,
/linux-master/kernel/debug/kdb/
H A Dkdb_main.c169 * Update the permissions flags (kdb_cmd_enabled) to match the
221 * Check whether the flags of the current command, the permissions of the kdb
224 static bool kdb_check_flags(kdb_cmdflags_t flags, int permissions, argument
227 /* permissions comes from userspace so needs massaging slightly */
228 permissions &= KDB_ENABLE_MASK;
229 permissions |= KDB_ENABLE_ALWAYS_SAFE;
233 permissions |= permissions << KDB_ENABLE_NO_ARGS_SHIFT;
237 return permissions & flags;
/linux-master/arch/x86/kernel/cpu/sgx/
H A Dioctl.c184 * CPU will silently overwrite the permissions as zero, which means
377 * A SECINFO for a TCS is required to always contain zero permissions because
381 * mmap()'s protection bits are capped by the page permissions. For each page
385 * 1. A regular page: PROT_R, PROT_W and PROT_X match the SECINFO permissions.
725 * sgx_enclave_restrict_permissions() - Restrict EPCM permissions
728 * their new permissions.
746 secinfo.flags = modp->permissions & SGX_SECINFO_PERMISSION_MASK;
762 * Changing EPCM permissions is only supported on regular
774 * how EPCM permissions can be relaxed from within the enclave.
775 * ENCLS[EMODPR] can only remove existing EPCM permissions,
[all...]
/linux-master/include/linux/
H A Dsysctl.h210 int (*permissions)(struct ctl_table_header *head, struct ctl_table *table); member in struct:ctl_table_root
/linux-master/drivers/infiniband/hw/efa/
H A Defa_com_cmd.h196 /* see permissions field of struct efa_admin_reg_mr_cmd */
197 u8 permissions; member in struct:efa_com_reg_mr_params
H A Defa_admin_cmds_defs.h376 * permissions
377 * 0 : local_write_enable - Local write permissions:
381 * permissions: must be set to enable RDMA write to
383 * 2 : remote_read_enable - Remote read permissions:
387 u8 permissions; member in struct:efa_admin_reg_mr_cmd
H A Defa_com_cmd.c241 mr_cmd.permissions = params->permissions;
/linux-master/arch/x86/kvm/
H A Dmmu.h222 fault = (mmu->permissions[index] >> pte_access) & 1;
/linux-master/fs/udf/
H A Decma_167.h565 __le32 permissions; member in struct:fileEntry
792 __le32 permissions; member in struct:extendedFileEntry
H A Dinode.c1486 iinfo->i_extraPerms = le32_to_cpu(fe->permissions) & ~FE_MAPPED_PERMS;
1648 uint32_t permissions; local
1651 permissions = le32_to_cpu(fe->permissions);
1654 mode = ((permissions) & 0007) |
1655 ((permissions >> 2) & 0070) |
1656 ((permissions >> 4) & 0700) |
1754 fe->permissions = cpu_to_le32(udfperms);
/linux-master/kernel/
H A Ducount.c58 .permissions = set_permissions,
/linux-master/arch/alpha/lib/
H A Dudiv-qrnnd.S11 # In addition to the permissions in the GNU General Public License, the
/linux-master/Documentation/sound/cards/
H A Dmultisound.sh558 X * This is Linux-specific, and must be run with root permissions.
/linux-master/tools/testing/selftests/sgx/
H A Dmain.c604 * Second page of .data segment is used to test changing PTE permissions.
609 * 2) Change PTE permissions (RW -> RO) of target page within enclave.
612 * 4) Change PTE permissions of target page within enclave back to be RW.
634 * have its permissions manipulated.
665 /* Change PTE permissions of target page within the enclave */
671 * PTE permissions of target page changed to read-only, EPCM
672 * permissions unchanged (EPCM permissions are RW), attempt to
689 * Change PTE permissions back to enable enclave to write to the
718 * Modifying permissions o
[all...]

Completed in 343 milliseconds

12