/linux-master/security/selinux/include/ |
H A D | avc_ss.h | 18 const char *perms[sizeof(u32) * 8 + 1]; member in struct:security_class_mapping
|
/linux-master/security/apparmor/ |
H A D | policy_compat.c | 73 * map_old_perms - map old file perms layout to the new layout 100 static void compute_fperms_allow(struct aa_perms *perms, struct aa_dfa *dfa, argument 103 perms->allow |= AA_MAY_GETATTR; 107 perms->allow |= AA_MAY_CHANGE_PROFILE; 109 perms->allow |= AA_MAY_ONEXEC; 115 struct aa_perms perms = { }; local 117 perms.allow = map_old_perms(dfa_user_allow(dfa, state)); 118 perms.audit = map_old_perms(dfa_user_audit(dfa, state)); 119 perms.quiet = map_old_perms(dfa_user_quiet(dfa, state)); 120 perms 130 struct aa_perms perms = { }; local 177 struct aa_perms *perms; local 214 struct aa_perms perms = { }; local [all...] |
H A D | lib.c | 20 #include "include/perms.h" 279 * aa_audit_perms_cb - generic callback fn for auditing perms 306 * aa_apply_modes_to_perms - apply namespace and profile flags to perms 307 * @profile: that perms where computed from 308 * @perms: perms to apply mode modifiers to 310 * TODO: split into profile and ns based flags for when accumulating perms 312 void aa_apply_modes_to_perms(struct aa_profile *profile, struct aa_perms *perms) argument 316 perms->audit = ALL_PERMS_MASK; 319 perms 337 aa_profile_match_label(struct aa_profile *profile, struct aa_ruleset *rules, struct aa_label *label, int type, u32 request, struct aa_perms *perms) argument 359 struct aa_perms perms; local 388 aa_check_perms(struct aa_profile *profile, struct aa_perms *perms, u32 request, struct apparmor_audit_data *ad, void (*cb)(struct audit_buffer *, void *)) argument [all...] |
H A D | file.c | 82 * @perms: the permissions computed for the request (NOT NULL) 95 struct aa_profile *profile, struct aa_perms *perms, 114 u32 mask = perms->audit; 119 /* mask off perms that are not being force audited */ 127 ad.request = ad.request & ~perms->allow; 130 if (ad.request & perms->kill) 134 if ((ad.request & perms->quiet) && 137 ad.request &= ~perms->quiet; 143 ad.denied = ad.request & ~perms->allow; 184 * aa_lookup_fperms - convert dfa compressed perms t 94 aa_audit_file(const struct cred *subj_cred, struct aa_profile *profile, struct aa_perms *perms, const char *op, u32 request, const char *name, const char *target, struct aa_label *tlabel, kuid_t ouid, const char *info, int error) argument 217 aa_str_perms(struct aa_policydb *file_rules, aa_state_t start, const char *name, struct path_cond *cond, struct aa_perms *perms) argument 228 __aa_path_perm(const char *op, const struct cred *subj_cred, struct aa_profile *profile, const char *name, u32 request, struct path_cond *cond, int flags, struct aa_perms *perms) argument 249 profile_path_perm(const char *op, const struct cred *subj_cred, struct aa_profile *profile, const struct path *path, char *buffer, u32 request, struct path_cond *cond, int flags, struct aa_perms *perms) argument 287 struct aa_perms perms = {}; local 335 struct aa_perms lperms = {}, perms; local 490 struct aa_perms perms = {}; local [all...] |
H A D | mount.c | 126 * @perms: the permissions computed for the request (NOT NULL) 137 struct aa_perms *perms, const char *info, int error) 143 u32 mask = perms->audit; 148 /* mask off perms that are not being force audited */ 156 request = request & ~perms->allow; 158 if (request & perms->kill) 162 if ((request & perms->quiet) && 165 request &= ~perms->quiet; 177 if (data && (perms->audit & AA_AUDIT_DATA)) 217 "failed perms chec 132 audit_mount(const struct cred *subj_cred, struct aa_profile *profile, const char *op, const char *name, const char *src_name, const char *type, const char *trans, unsigned long flags, const void *data, u32 request, struct aa_perms *perms, const char *info, int error) argument 224 do_match_mnt(struct aa_policydb *policy, aa_state_t start, const char *mntpnt, const char *devname, const char *type, unsigned long flags, void *data, bool binary, struct aa_perms *perms) argument 310 struct aa_perms perms = { }; local 607 struct aa_perms perms = { }; local 673 struct aa_perms perms = { }; local [all...] |
H A D | net.c | 115 struct aa_perms perms = { }; local 132 perms = *aa_lookup_perms(rules->policy, state); 133 aa_apply_modes_to_perms(profile, &perms); 135 return aa_check_perms(profile, &perms, request, ad, audit_net_cb); 225 struct aa_perms perms = { }; local 242 perms.deny = ALL_PERMS_MASK; 244 perms.allow = ALL_PERMS_MASK; 247 perms.audit = ALL_PERMS_MASK; 251 aa_apply_modes_to_perms(profile, &perms); 253 return aa_check_perms(profile, &perms, reques [all...] |
H A D | domain.c | 109 * label_compound_match - find perms for full compound label 110 * @profile: profile to find perms for 116 * @perms: perms struct to set 121 * @perms should be preinitialized with allperms OR a previous permission 127 struct aa_perms *perms) 146 *perms = allperms; 158 *perms = *(aa_lookup_fperms(rules->file, state, &cond)); 159 aa_apply_modes_to_perms(profile, perms); 160 if ((perms 124 label_compound_match(struct aa_profile *profile, struct aa_label *label, bool stack, aa_state_t state, bool subns, u32 request, struct aa_perms *perms) argument 186 label_components_match(struct aa_profile *profile, struct aa_label *label, bool stack, aa_state_t start, bool subns, u32 request, struct aa_perms *perms) argument 249 label_match(struct aa_profile *profile, struct aa_label *label, bool stack, aa_state_t state, bool subns, u32 request, struct aa_perms *perms) argument 283 change_profile_perms(struct aa_profile *profile, struct aa_label *target, bool stack, u32 request, aa_state_t start, struct aa_perms *perms) argument 642 struct aa_perms perms = {}; local 742 struct aa_perms perms = {}; local 1183 struct aa_perms perms = {}; local 1290 change_profile_perms_wrapper(const char *op, const char *name, const struct cred *subj_cred, struct aa_profile *profile, struct aa_label *target, bool stack, u32 request, struct aa_perms *perms) argument 1333 struct aa_perms perms = {}; local [all...] |
H A D | ipc.c | 85 struct aa_perms perms; local 98 aa_label_match(profile, rules, peer, state, false, request, &perms); 99 aa_apply_modes_to_perms(profile, &perms); 100 return aa_check_perms(profile, &perms, request, ad, audit_signal_cb);
|
H A D | task.c | 233 struct aa_perms perms = { }; local 238 &perms); 239 aa_apply_modes_to_perms(profile, &perms); 240 return aa_check_perms(profile, &perms, request, ad, audit_ptrace_cb); 320 struct aa_perms perms = { }; local 336 perms = *aa_lookup_perms(rules->policy, state); 337 aa_apply_modes_to_perms(profile, &perms); 338 error = aa_check_perms(profile, &perms, request, ad,
|
/linux-master/security/apparmor/include/ |
H A D | file.h | 18 #include "perms.h" 40 * @perms: the permission the file was opened with 75 struct aa_profile *profile, struct aa_perms *perms, 84 struct aa_perms *perms); 110 u32 perms = 0; local 113 perms |= MAY_WRITE; 115 perms |= MAY_READ; 117 if ((flags & O_APPEND) && (perms & MAY_WRITE)) 118 perms = (perms [all...] |
/linux-master/drivers/net/wireless/rsi/ |
H A D | rsi_debugfs.h | 36 umode_t perms; member in struct:rsi_dbg_files
|
/linux-master/tools/testing/selftests/mm/ |
H A D | mlock2.h | 18 char perms[5]; local 30 &start, &end, perms, &offset, dev, &inode, path) < 6)
|
/linux-master/arch/arm/mm/ |
H A D | init.c | 394 static void set_section_perms(struct section_perm *perms, int n, bool set, argument 404 if (!IS_ALIGNED(perms[i].start, SECTION_SIZE) || 405 !IS_ALIGNED(perms[i].end, SECTION_SIZE)) { 407 perms[i].name, perms[i].start, perms[i].end, 412 for (addr = perms[i].start; 413 addr < perms[i].end; 415 section_update(addr, perms[i].mask, 416 set ? perms[ 426 update_sections_early(struct section_perm perms[], int n) argument [all...] |
/linux-master/include/linux/ |
H A D | kernel.h | 394 #define VERIFY_OCTAL_PERMISSIONS(perms) \ 395 (BUILD_BUG_ON_ZERO((perms) < 0) + \ 396 BUILD_BUG_ON_ZERO((perms) > 0777) + \ 398 BUILD_BUG_ON_ZERO((((perms) >> 6) & 4) < (((perms) >> 3) & 4)) + \ 399 BUILD_BUG_ON_ZERO((((perms) >> 3) & 4) < ((perms) & 4)) + \ 401 BUILD_BUG_ON_ZERO((((perms) >> 6) & 2) < (((perms) >> 3) & 2)) + \ 403 BUILD_BUG_ON_ZERO((perms) [all...] |
/linux-master/security/selinux/ss/ |
H A D | services.h | 17 u32 perms[sizeof(u32) * 8]; /* policy values for permissions */ member in struct:selinux_mapping
|
/linux-master/drivers/soc/qcom/ |
H A D | rmtfs_mem.c | 34 u64 perms; member in struct:qcom_rmtfs_mem 174 struct qcom_scm_vmperm perms[NUM_MAX_VMIDS + 1]; local 264 perms[0].vmid = QCOM_SCM_VMID_HLOS; 265 perms[0].perm = QCOM_SCM_PERM_RW; 268 perms[i + 1].vmid = vmid[i]; 269 perms[i + 1].perm = QCOM_SCM_PERM_RW; 272 rmtfs_mem->perms = BIT(QCOM_SCM_VMID_HLOS); 274 &rmtfs_mem->perms, perms, num_vmids + 1); 298 if (rmtfs_mem->perms) { [all...] |
/linux-master/scripts/selinux/mdp/ |
H A D | mdp.c | 33 const char *perms[sizeof(unsigned) * 8 + 1]; member in struct:security_class_mapping 88 for (j = 0; map->perms[j]; j++) 89 fprintf(fout, "\t%s\n", map->perms[j]); 109 for (j = 0; map->perms[j]; j++) 110 fprintf(fout, "\t%s\n", map->perms[j]);
|
/linux-master/drivers/s390/crypto/ |
H A D | zcrypt_api.c | 120 struct ap_perms perms; member in struct:zcdn_device 165 for (i = 0; i < sizeof(zcdndev->perms.ioctlm) / sizeof(long); i++) 166 n += sysfs_emit_at(buf, n, "%016lx", zcdndev->perms.ioctlm[i]); 181 rc = ap_parse_mask_str(buf, zcdndev->perms.ioctlm, 202 for (i = 0; i < sizeof(zcdndev->perms.apm) / sizeof(long); i++) 203 n += sysfs_emit_at(buf, n, "%016lx", zcdndev->perms.apm[i]); 218 rc = ap_parse_mask_str(buf, zcdndev->perms.apm, 239 for (i = 0; i < sizeof(zcdndev->perms.aqm) / sizeof(long); i++) 240 n += sysfs_emit_at(buf, n, "%016lx", zcdndev->perms.aqm[i]); 255 rc = ap_parse_mask_str(buf, zcdndev->perms 502 struct ap_perms *perms = &ap_perms; local 545 zcrypt_check_ioctl(struct ap_perms *perms, unsigned int cmd) argument 563 zcrypt_check_card(struct ap_perms *perms, int card) argument 568 zcrypt_check_queue(struct ap_perms *perms, int queue) argument 637 zcrypt_rsa_modexpo(struct ap_perms *perms, struct zcrypt_track *tr, struct ica_rsa_modexpo *mex) argument 741 zcrypt_rsa_crt(struct ap_perms *perms, struct zcrypt_track *tr, struct ica_rsa_modexpo_crt *crt) argument 845 _zcrypt_send_cprb(bool userspace, struct ap_perms *perms, struct zcrypt_track *tr, struct ica_xcRB *xcrb) argument 1027 _zcrypt_send_ep11_cprb(bool userspace, struct ap_perms *perms, struct zcrypt_track *tr, struct ep11_urb *xcrb) argument 1468 icarsamodexpo_ioctl(struct ap_perms *perms, unsigned long arg) argument 1497 icarsacrt_ioctl(struct ap_perms *perms, unsigned long arg) argument 1526 zsecsendcprb_ioctl(struct ap_perms *perms, unsigned long arg) argument 1556 zsendep11cprb_ioctl(struct ap_perms *perms, unsigned long arg) argument 1589 struct ap_perms *perms = local 1726 trans_modexpo32(struct ap_perms *perms, struct file *filp, unsigned int cmd, unsigned long arg) argument 1773 trans_modexpo_crt32(struct ap_perms *perms, struct file *filp, unsigned int cmd, unsigned long arg) argument 1831 trans_xcrb32(struct ap_perms *perms, struct file *filp, unsigned int cmd, unsigned long arg) argument 1886 struct ap_perms *perms = local [all...] |
/linux-master/drivers/infiniband/sw/siw/ |
H A D | siw_mem.c | 98 mem->perms = rights & IWARP_ACCESS_MASK; 156 * @perms: requested access permissions 161 enum ib_access_flags perms, int len) 174 if ((mem->perms & perms) < perms) { 176 mem->perms, perms); 205 * @perms: requested access permissions 215 enum ib_access_flags perms, u3 160 siw_check_mem(struct ib_pd *pd, struct siw_mem *mem, u64 addr, enum ib_access_flags perms, int len) argument 214 siw_check_sge(struct ib_pd *pd, struct siw_sge *sge, struct siw_mem *mem[], enum ib_access_flags perms, u32 off, int len) argument [all...] |
H A D | siw_mem.h | 18 enum ib_access_flags perms, int len); 20 struct siw_mem *mem[], enum ib_access_flags perms,
|
/linux-master/scripts/selinux/genheaders/ |
H A D | genheaders.c | 15 const char *perms[sizeof(unsigned) * 8 + 1]; member in struct:security_class_mapping 132 for (j = 0; map->perms[j]; j++) { 137 map->name, map->perms[j]); 140 permname = stoupperx(map->perms[j]);
|
/linux-master/fs/hfsplus/ |
H A D | catalog.c | 81 void hfsplus_cat_set_perms(struct inode *inode, struct hfsplus_perm *perms) argument 84 perms->rootflags |= HFSPLUS_FLG_IMMUTABLE; 86 perms->rootflags &= ~HFSPLUS_FLG_IMMUTABLE; 88 perms->rootflags |= HFSPLUS_FLG_APPEND; 90 perms->rootflags &= ~HFSPLUS_FLG_APPEND; 92 perms->userflags = HFSPLUS_I(inode)->userflags; 93 perms->mode = cpu_to_be16(inode->i_mode); 94 perms->owner = cpu_to_be32(i_uid_read(inode)); 95 perms->group = cpu_to_be32(i_gid_read(inode)); 98 perms [all...] |
/linux-master/fs/orangefs/ |
H A D | orangefs-utils.c | 106 if (attrs->perms & ORANGEFS_O_EXECUTE) 108 if (attrs->perms & ORANGEFS_O_WRITE) 110 if (attrs->perms & ORANGEFS_O_READ) 113 if (attrs->perms & ORANGEFS_G_EXECUTE) 115 if (attrs->perms & ORANGEFS_G_WRITE) 117 if (attrs->perms & ORANGEFS_G_READ) 120 if (attrs->perms & ORANGEFS_U_EXECUTE) 122 if (attrs->perms & ORANGEFS_U_WRITE) 124 if (attrs->perms & ORANGEFS_U_READ) 127 if (attrs->perms [all...] |
/linux-master/fs/nfsd/ |
H A D | nfs4acl.c | 431 struct posix_ace_state perms; member in struct:posix_user_ace_state 525 low_mode_from_nfs4(state->users->aces[i].perms.allow, 528 add_to_mask(state, &state->users->aces[i].perms); 539 low_mode_from_nfs4(state->groups->aces[i].perms.allow, 542 add_to_mask(state, &state->groups->aces[i].perms); 581 a->aces[i].perms.allow = state->everyone.allow; 582 a->aces[i].perms.deny = state->everyone.deny; 598 a->aces[i].perms.allow = state->everyone.allow; 599 a->aces[i].perms.deny = state->everyone.deny; 609 deny_bits(&a->aces[i].perms, mas [all...] |
/linux-master/drivers/misc/lkdtm/ |
H A D | Makefile | 7 lkdtm-$(CONFIG_LKDTM) += perms.o
|