/linux-master/security/selinux/ss/ |
H A D | constraint.h | 4 * order for one or more permissions to be granted. 59 u32 permissions; /* constrained permissions */ member in struct:constraint_node 60 struct constraint_expr *expr; /* constraint on permissions */
|
H A D | policydb.h | 33 * in the configuration data: individual permissions, 46 struct symtab permissions; /* common permissions */ member in struct:common_datum 54 struct symtab permissions; /* class-specific permission symbol table */ member in struct:class_datum
|
H A D | policydb.c | 193 hashtab_map(&comdatum->permissions.table, perm_destroy, NULL); 194 hashtab_destroy(&comdatum->permissions.table); 222 hashtab_map(&cladatum->permissions.table, perm_destroy, NULL); 223 hashtab_destroy(&cladatum->permissions.table); 1166 rc = symtab_init(&comdatum->permissions, nel); 1169 comdatum->permissions.nprim = le32_to_cpu(buf[2]); 1176 rc = perm_read(p, &comdatum->permissions, fp); 1237 c->permissions = le32_to_cpu(buf[0]); 1330 rc = symtab_init(&cladatum->permissions, nel); 1333 cladatum->permissions [all...] |
H A D | services.c | 24 * Added validation of kernel classes and permissions 28 * Added support for bounds domain and audit messaged on masked permissions 161 pr_info("SELinux: the above unknown classes and permissions will be %s\n", 440 * security_dump_masked_av - dumps masked permissions during 459 u32 permissions, 473 if (!permissions) 482 hashtab_map(&common_dat->permissions.table, 486 if (hashtab_map(&tclass_dat->permissions.table, 512 if ((mask & permissions) == 0) 529 * security_boundary_permission - drops violated permissions 455 security_dump_masked_av(struct policydb *policydb, struct context *scontext, struct context *tcontext, u16 tclass, u32 permissions, const char *reason) argument [all...] |
/linux-master/arch/x86/include/uapi/asm/ |
H A D | sgx.h | 91 * @permissions:new permission bits for pages in range described by @offset 99 __u64 permissions; member in struct:sgx_enclave_restrict_permissions
|
/linux-master/fs/hfsplus/ |
H A D | inode.c | 517 hfsplus_get_perms(inode, &folder->permissions, 1); 546 hfsplus_get_perms(inode, &file->permissions, 0); 549 if (file->permissions.dev) 551 be32_to_cpu(file->permissions.dev)); 561 be32_to_cpu(file->permissions.dev)); 609 hfsplus_cat_set_perms(inode, &folder->permissions); 638 hfsplus_cat_set_perms(inode, &file->permissions); 640 (file->permissions.rootflags | 641 file->permissions.userflags))
|
H A D | hfsplus_raw.h | 74 /* POSIX permissions */ 262 struct hfsplus_perm permissions; member in struct:hfsplus_cat_folder 298 struct hfsplus_perm permissions; member in struct:hfsplus_cat_file
|
H A D | catalog.c | 124 hfsplus_cat_set_perms(inode, &folder->permissions); 143 hfsplus_cat_set_perms(inode, &file->permissions); 156 (file->permissions.rootflags | 157 file->permissions.userflags)) 169 file->permissions.dev =
|
H A D | dir.c | 100 be32_to_cpu(entry.file.permissions.dev); 234 mode = be16_to_cpu(entry.file.permissions.mode);
|
/linux-master/net/ |
H A D | sysctl_net.c | 75 .permissions = net_ctl_permissions,
|
/linux-master/ipc/ |
H A D | mq_sysctl.c | 115 .permissions = mq_permissions,
|
H A D | ipc_sysctl.c | 243 .permissions = ipc_permissions,
|
/linux-master/kernel/debug/kdb/ |
H A D | kdb_main.c | 169 * Update the permissions flags (kdb_cmd_enabled) to match the 221 * Check whether the flags of the current command, the permissions of the kdb 224 static bool kdb_check_flags(kdb_cmdflags_t flags, int permissions, argument 227 /* permissions comes from userspace so needs massaging slightly */ 228 permissions &= KDB_ENABLE_MASK; 229 permissions |= KDB_ENABLE_ALWAYS_SAFE; 233 permissions |= permissions << KDB_ENABLE_NO_ARGS_SHIFT; 237 return permissions & flags;
|
/linux-master/arch/x86/kernel/cpu/sgx/ |
H A D | ioctl.c | 184 * CPU will silently overwrite the permissions as zero, which means 377 * A SECINFO for a TCS is required to always contain zero permissions because 381 * mmap()'s protection bits are capped by the page permissions. For each page 385 * 1. A regular page: PROT_R, PROT_W and PROT_X match the SECINFO permissions. 725 * sgx_enclave_restrict_permissions() - Restrict EPCM permissions 728 * their new permissions. 746 secinfo.flags = modp->permissions & SGX_SECINFO_PERMISSION_MASK; 762 * Changing EPCM permissions is only supported on regular 774 * how EPCM permissions can be relaxed from within the enclave. 775 * ENCLS[EMODPR] can only remove existing EPCM permissions, [all...] |
/linux-master/include/linux/ |
H A D | sysctl.h | 210 int (*permissions)(struct ctl_table_header *head, struct ctl_table *table); member in struct:ctl_table_root
|
/linux-master/drivers/infiniband/hw/efa/ |
H A D | efa_com_cmd.h | 196 /* see permissions field of struct efa_admin_reg_mr_cmd */ 197 u8 permissions; member in struct:efa_com_reg_mr_params
|
H A D | efa_admin_cmds_defs.h | 376 * permissions 377 * 0 : local_write_enable - Local write permissions: 381 * permissions: must be set to enable RDMA write to 383 * 2 : remote_read_enable - Remote read permissions: 387 u8 permissions; member in struct:efa_admin_reg_mr_cmd
|
H A D | efa_com_cmd.c | 241 mr_cmd.permissions = params->permissions;
|
/linux-master/arch/x86/kvm/ |
H A D | mmu.h | 222 fault = (mmu->permissions[index] >> pte_access) & 1;
|
/linux-master/fs/udf/ |
H A D | ecma_167.h | 565 __le32 permissions; member in struct:fileEntry 792 __le32 permissions; member in struct:extendedFileEntry
|
H A D | inode.c | 1486 iinfo->i_extraPerms = le32_to_cpu(fe->permissions) & ~FE_MAPPED_PERMS; 1648 uint32_t permissions; local 1651 permissions = le32_to_cpu(fe->permissions); 1654 mode = ((permissions) & 0007) | 1655 ((permissions >> 2) & 0070) | 1656 ((permissions >> 4) & 0700) | 1754 fe->permissions = cpu_to_le32(udfperms);
|
/linux-master/kernel/ |
H A D | ucount.c | 58 .permissions = set_permissions,
|
/linux-master/arch/alpha/lib/ |
H A D | udiv-qrnnd.S | 11 # In addition to the permissions in the GNU General Public License, the
|
/linux-master/Documentation/sound/cards/ |
H A D | multisound.sh | 558 X * This is Linux-specific, and must be run with root permissions.
|
/linux-master/tools/testing/selftests/sgx/ |
H A D | main.c | 604 * Second page of .data segment is used to test changing PTE permissions. 609 * 2) Change PTE permissions (RW -> RO) of target page within enclave. 612 * 4) Change PTE permissions of target page within enclave back to be RW. 634 * have its permissions manipulated. 665 /* Change PTE permissions of target page within the enclave */ 671 * PTE permissions of target page changed to read-only, EPCM 672 * permissions unchanged (EPCM permissions are RW), attempt to 689 * Change PTE permissions back to enable enclave to write to the 718 * Modifying permissions o [all...] |