Searched refs:perms (Results 1 - 25 of 61) sorted by relevance

123

/linux-master/security/selinux/include/
H A Davc_ss.h18 const char *perms[sizeof(u32) * 8 + 1]; member in struct:security_class_mapping
/linux-master/security/apparmor/
H A Dpolicy_compat.c73 * map_old_perms - map old file perms layout to the new layout
100 static void compute_fperms_allow(struct aa_perms *perms, struct aa_dfa *dfa, argument
103 perms->allow |= AA_MAY_GETATTR;
107 perms->allow |= AA_MAY_CHANGE_PROFILE;
109 perms->allow |= AA_MAY_ONEXEC;
115 struct aa_perms perms = { }; local
117 perms.allow = map_old_perms(dfa_user_allow(dfa, state));
118 perms.audit = map_old_perms(dfa_user_audit(dfa, state));
119 perms.quiet = map_old_perms(dfa_user_quiet(dfa, state));
120 perms
130 struct aa_perms perms = { }; local
177 struct aa_perms *perms; local
214 struct aa_perms perms = { }; local
[all...]
H A Dlib.c20 #include "include/perms.h"
279 * aa_audit_perms_cb - generic callback fn for auditing perms
306 * aa_apply_modes_to_perms - apply namespace and profile flags to perms
307 * @profile: that perms where computed from
308 * @perms: perms to apply mode modifiers to
310 * TODO: split into profile and ns based flags for when accumulating perms
312 void aa_apply_modes_to_perms(struct aa_profile *profile, struct aa_perms *perms) argument
316 perms->audit = ALL_PERMS_MASK;
319 perms
337 aa_profile_match_label(struct aa_profile *profile, struct aa_ruleset *rules, struct aa_label *label, int type, u32 request, struct aa_perms *perms) argument
359 struct aa_perms perms; local
388 aa_check_perms(struct aa_profile *profile, struct aa_perms *perms, u32 request, struct apparmor_audit_data *ad, void (*cb)(struct audit_buffer *, void *)) argument
[all...]
H A Dfile.c82 * @perms: the permissions computed for the request (NOT NULL)
95 struct aa_profile *profile, struct aa_perms *perms,
114 u32 mask = perms->audit;
119 /* mask off perms that are not being force audited */
127 ad.request = ad.request & ~perms->allow;
130 if (ad.request & perms->kill)
134 if ((ad.request & perms->quiet) &&
137 ad.request &= ~perms->quiet;
143 ad.denied = ad.request & ~perms->allow;
184 * aa_lookup_fperms - convert dfa compressed perms t
94 aa_audit_file(const struct cred *subj_cred, struct aa_profile *profile, struct aa_perms *perms, const char *op, u32 request, const char *name, const char *target, struct aa_label *tlabel, kuid_t ouid, const char *info, int error) argument
217 aa_str_perms(struct aa_policydb *file_rules, aa_state_t start, const char *name, struct path_cond *cond, struct aa_perms *perms) argument
228 __aa_path_perm(const char *op, const struct cred *subj_cred, struct aa_profile *profile, const char *name, u32 request, struct path_cond *cond, int flags, struct aa_perms *perms) argument
249 profile_path_perm(const char *op, const struct cred *subj_cred, struct aa_profile *profile, const struct path *path, char *buffer, u32 request, struct path_cond *cond, int flags, struct aa_perms *perms) argument
287 struct aa_perms perms = {}; local
335 struct aa_perms lperms = {}, perms; local
490 struct aa_perms perms = {}; local
[all...]
H A Dmount.c126 * @perms: the permissions computed for the request (NOT NULL)
137 struct aa_perms *perms, const char *info, int error)
143 u32 mask = perms->audit;
148 /* mask off perms that are not being force audited */
156 request = request & ~perms->allow;
158 if (request & perms->kill)
162 if ((request & perms->quiet) &&
165 request &= ~perms->quiet;
177 if (data && (perms->audit & AA_AUDIT_DATA))
217 "failed perms chec
132 audit_mount(const struct cred *subj_cred, struct aa_profile *profile, const char *op, const char *name, const char *src_name, const char *type, const char *trans, unsigned long flags, const void *data, u32 request, struct aa_perms *perms, const char *info, int error) argument
224 do_match_mnt(struct aa_policydb *policy, aa_state_t start, const char *mntpnt, const char *devname, const char *type, unsigned long flags, void *data, bool binary, struct aa_perms *perms) argument
310 struct aa_perms perms = { }; local
607 struct aa_perms perms = { }; local
673 struct aa_perms perms = { }; local
[all...]
H A Dnet.c115 struct aa_perms perms = { }; local
132 perms = *aa_lookup_perms(rules->policy, state);
133 aa_apply_modes_to_perms(profile, &perms);
135 return aa_check_perms(profile, &perms, request, ad, audit_net_cb);
225 struct aa_perms perms = { }; local
242 perms.deny = ALL_PERMS_MASK;
244 perms.allow = ALL_PERMS_MASK;
247 perms.audit = ALL_PERMS_MASK;
251 aa_apply_modes_to_perms(profile, &perms);
253 return aa_check_perms(profile, &perms, reques
[all...]
H A Ddomain.c109 * label_compound_match - find perms for full compound label
110 * @profile: profile to find perms for
116 * @perms: perms struct to set
121 * @perms should be preinitialized with allperms OR a previous permission
127 struct aa_perms *perms)
146 *perms = allperms;
158 *perms = *(aa_lookup_fperms(rules->file, state, &cond));
159 aa_apply_modes_to_perms(profile, perms);
160 if ((perms
124 label_compound_match(struct aa_profile *profile, struct aa_label *label, bool stack, aa_state_t state, bool subns, u32 request, struct aa_perms *perms) argument
186 label_components_match(struct aa_profile *profile, struct aa_label *label, bool stack, aa_state_t start, bool subns, u32 request, struct aa_perms *perms) argument
249 label_match(struct aa_profile *profile, struct aa_label *label, bool stack, aa_state_t state, bool subns, u32 request, struct aa_perms *perms) argument
283 change_profile_perms(struct aa_profile *profile, struct aa_label *target, bool stack, u32 request, aa_state_t start, struct aa_perms *perms) argument
642 struct aa_perms perms = {}; local
742 struct aa_perms perms = {}; local
1183 struct aa_perms perms = {}; local
1290 change_profile_perms_wrapper(const char *op, const char *name, const struct cred *subj_cred, struct aa_profile *profile, struct aa_label *target, bool stack, u32 request, struct aa_perms *perms) argument
1333 struct aa_perms perms = {}; local
[all...]
H A Dipc.c85 struct aa_perms perms; local
98 aa_label_match(profile, rules, peer, state, false, request, &perms);
99 aa_apply_modes_to_perms(profile, &perms);
100 return aa_check_perms(profile, &perms, request, ad, audit_signal_cb);
H A Dtask.c233 struct aa_perms perms = { }; local
238 &perms);
239 aa_apply_modes_to_perms(profile, &perms);
240 return aa_check_perms(profile, &perms, request, ad, audit_ptrace_cb);
320 struct aa_perms perms = { }; local
336 perms = *aa_lookup_perms(rules->policy, state);
337 aa_apply_modes_to_perms(profile, &perms);
338 error = aa_check_perms(profile, &perms, request, ad,
/linux-master/security/apparmor/include/
H A Dfile.h18 #include "perms.h"
40 * @perms: the permission the file was opened with
75 struct aa_profile *profile, struct aa_perms *perms,
84 struct aa_perms *perms);
110 u32 perms = 0; local
113 perms |= MAY_WRITE;
115 perms |= MAY_READ;
117 if ((flags & O_APPEND) && (perms & MAY_WRITE))
118 perms = (perms
[all...]
/linux-master/drivers/net/wireless/rsi/
H A Drsi_debugfs.h36 umode_t perms; member in struct:rsi_dbg_files
/linux-master/tools/testing/selftests/mm/
H A Dmlock2.h18 char perms[5]; local
30 &start, &end, perms, &offset, dev, &inode, path) < 6)
/linux-master/arch/arm/mm/
H A Dinit.c394 static void set_section_perms(struct section_perm *perms, int n, bool set, argument
404 if (!IS_ALIGNED(perms[i].start, SECTION_SIZE) ||
405 !IS_ALIGNED(perms[i].end, SECTION_SIZE)) {
407 perms[i].name, perms[i].start, perms[i].end,
412 for (addr = perms[i].start;
413 addr < perms[i].end;
415 section_update(addr, perms[i].mask,
416 set ? perms[
426 update_sections_early(struct section_perm perms[], int n) argument
[all...]
/linux-master/include/linux/
H A Dkernel.h394 #define VERIFY_OCTAL_PERMISSIONS(perms) \
395 (BUILD_BUG_ON_ZERO((perms) < 0) + \
396 BUILD_BUG_ON_ZERO((perms) > 0777) + \
398 BUILD_BUG_ON_ZERO((((perms) >> 6) & 4) < (((perms) >> 3) & 4)) + \
399 BUILD_BUG_ON_ZERO((((perms) >> 3) & 4) < ((perms) & 4)) + \
401 BUILD_BUG_ON_ZERO((((perms) >> 6) & 2) < (((perms) >> 3) & 2)) + \
403 BUILD_BUG_ON_ZERO((perms)
[all...]
/linux-master/security/selinux/ss/
H A Dservices.h17 u32 perms[sizeof(u32) * 8]; /* policy values for permissions */ member in struct:selinux_mapping
/linux-master/drivers/soc/qcom/
H A Drmtfs_mem.c34 u64 perms; member in struct:qcom_rmtfs_mem
174 struct qcom_scm_vmperm perms[NUM_MAX_VMIDS + 1]; local
264 perms[0].vmid = QCOM_SCM_VMID_HLOS;
265 perms[0].perm = QCOM_SCM_PERM_RW;
268 perms[i + 1].vmid = vmid[i];
269 perms[i + 1].perm = QCOM_SCM_PERM_RW;
272 rmtfs_mem->perms = BIT(QCOM_SCM_VMID_HLOS);
274 &rmtfs_mem->perms, perms, num_vmids + 1);
298 if (rmtfs_mem->perms) {
[all...]
/linux-master/scripts/selinux/mdp/
H A Dmdp.c33 const char *perms[sizeof(unsigned) * 8 + 1]; member in struct:security_class_mapping
88 for (j = 0; map->perms[j]; j++)
89 fprintf(fout, "\t%s\n", map->perms[j]);
109 for (j = 0; map->perms[j]; j++)
110 fprintf(fout, "\t%s\n", map->perms[j]);
/linux-master/drivers/s390/crypto/
H A Dzcrypt_api.c120 struct ap_perms perms; member in struct:zcdn_device
165 for (i = 0; i < sizeof(zcdndev->perms.ioctlm) / sizeof(long); i++)
166 n += sysfs_emit_at(buf, n, "%016lx", zcdndev->perms.ioctlm[i]);
181 rc = ap_parse_mask_str(buf, zcdndev->perms.ioctlm,
202 for (i = 0; i < sizeof(zcdndev->perms.apm) / sizeof(long); i++)
203 n += sysfs_emit_at(buf, n, "%016lx", zcdndev->perms.apm[i]);
218 rc = ap_parse_mask_str(buf, zcdndev->perms.apm,
239 for (i = 0; i < sizeof(zcdndev->perms.aqm) / sizeof(long); i++)
240 n += sysfs_emit_at(buf, n, "%016lx", zcdndev->perms.aqm[i]);
255 rc = ap_parse_mask_str(buf, zcdndev->perms
502 struct ap_perms *perms = &ap_perms; local
545 zcrypt_check_ioctl(struct ap_perms *perms, unsigned int cmd) argument
563 zcrypt_check_card(struct ap_perms *perms, int card) argument
568 zcrypt_check_queue(struct ap_perms *perms, int queue) argument
637 zcrypt_rsa_modexpo(struct ap_perms *perms, struct zcrypt_track *tr, struct ica_rsa_modexpo *mex) argument
741 zcrypt_rsa_crt(struct ap_perms *perms, struct zcrypt_track *tr, struct ica_rsa_modexpo_crt *crt) argument
845 _zcrypt_send_cprb(bool userspace, struct ap_perms *perms, struct zcrypt_track *tr, struct ica_xcRB *xcrb) argument
1027 _zcrypt_send_ep11_cprb(bool userspace, struct ap_perms *perms, struct zcrypt_track *tr, struct ep11_urb *xcrb) argument
1468 icarsamodexpo_ioctl(struct ap_perms *perms, unsigned long arg) argument
1497 icarsacrt_ioctl(struct ap_perms *perms, unsigned long arg) argument
1526 zsecsendcprb_ioctl(struct ap_perms *perms, unsigned long arg) argument
1556 zsendep11cprb_ioctl(struct ap_perms *perms, unsigned long arg) argument
1589 struct ap_perms *perms = local
1726 trans_modexpo32(struct ap_perms *perms, struct file *filp, unsigned int cmd, unsigned long arg) argument
1773 trans_modexpo_crt32(struct ap_perms *perms, struct file *filp, unsigned int cmd, unsigned long arg) argument
1831 trans_xcrb32(struct ap_perms *perms, struct file *filp, unsigned int cmd, unsigned long arg) argument
1886 struct ap_perms *perms = local
[all...]
/linux-master/drivers/infiniband/sw/siw/
H A Dsiw_mem.c98 mem->perms = rights & IWARP_ACCESS_MASK;
156 * @perms: requested access permissions
161 enum ib_access_flags perms, int len)
174 if ((mem->perms & perms) < perms) {
176 mem->perms, perms);
205 * @perms: requested access permissions
215 enum ib_access_flags perms, u3
160 siw_check_mem(struct ib_pd *pd, struct siw_mem *mem, u64 addr, enum ib_access_flags perms, int len) argument
214 siw_check_sge(struct ib_pd *pd, struct siw_sge *sge, struct siw_mem *mem[], enum ib_access_flags perms, u32 off, int len) argument
[all...]
H A Dsiw_mem.h18 enum ib_access_flags perms, int len);
20 struct siw_mem *mem[], enum ib_access_flags perms,
/linux-master/scripts/selinux/genheaders/
H A Dgenheaders.c15 const char *perms[sizeof(unsigned) * 8 + 1]; member in struct:security_class_mapping
132 for (j = 0; map->perms[j]; j++) {
137 map->name, map->perms[j]);
140 permname = stoupperx(map->perms[j]);
/linux-master/fs/hfsplus/
H A Dcatalog.c81 void hfsplus_cat_set_perms(struct inode *inode, struct hfsplus_perm *perms) argument
84 perms->rootflags |= HFSPLUS_FLG_IMMUTABLE;
86 perms->rootflags &= ~HFSPLUS_FLG_IMMUTABLE;
88 perms->rootflags |= HFSPLUS_FLG_APPEND;
90 perms->rootflags &= ~HFSPLUS_FLG_APPEND;
92 perms->userflags = HFSPLUS_I(inode)->userflags;
93 perms->mode = cpu_to_be16(inode->i_mode);
94 perms->owner = cpu_to_be32(i_uid_read(inode));
95 perms->group = cpu_to_be32(i_gid_read(inode));
98 perms
[all...]
/linux-master/fs/orangefs/
H A Dorangefs-utils.c106 if (attrs->perms & ORANGEFS_O_EXECUTE)
108 if (attrs->perms & ORANGEFS_O_WRITE)
110 if (attrs->perms & ORANGEFS_O_READ)
113 if (attrs->perms & ORANGEFS_G_EXECUTE)
115 if (attrs->perms & ORANGEFS_G_WRITE)
117 if (attrs->perms & ORANGEFS_G_READ)
120 if (attrs->perms & ORANGEFS_U_EXECUTE)
122 if (attrs->perms & ORANGEFS_U_WRITE)
124 if (attrs->perms & ORANGEFS_U_READ)
127 if (attrs->perms
[all...]
/linux-master/fs/nfsd/
H A Dnfs4acl.c431 struct posix_ace_state perms; member in struct:posix_user_ace_state
525 low_mode_from_nfs4(state->users->aces[i].perms.allow,
528 add_to_mask(state, &state->users->aces[i].perms);
539 low_mode_from_nfs4(state->groups->aces[i].perms.allow,
542 add_to_mask(state, &state->groups->aces[i].perms);
581 a->aces[i].perms.allow = state->everyone.allow;
582 a->aces[i].perms.deny = state->everyone.deny;
598 a->aces[i].perms.allow = state->everyone.allow;
599 a->aces[i].perms.deny = state->everyone.deny;
609 deny_bits(&a->aces[i].perms, mas
[all...]
/linux-master/drivers/misc/lkdtm/
H A DMakefile7 lkdtm-$(CONFIG_LKDTM) += perms.o

Completed in 380 milliseconds

123