Lines Matching defs:request

48 	if (aad(sa)->request & AA_AUDIT_FILE_MASK) {
50 map_mask_to_chr_mask(aad(sa)->request));
58 if (aad(sa)->request & AA_AUDIT_FILE_MASK) {
78 * @perms: the permissions computed for the request (NOT NULL)
80 * @request: permissions requested
91 const char *op, u32 request, const char *name,
99 aad(&sa)->request = request;
115 aad(&sa)->request &= mask;
117 if (likely(!aad(&sa)->request))
122 aad(&sa)->request = aad(&sa)->request & ~perms->allow;
123 AA_BUG(!aad(&sa)->request);
125 if (aad(&sa)->request & perms->kill)
129 if ((aad(&sa)->request & perms->quiet) &&
132 aad(&sa)->request &= ~perms->quiet;
134 if (!aad(&sa)->request)
138 aad(&sa)->denied = aad(&sa)->request & ~perms->allow;
157 const char **name, struct path_cond *cond, u32 request)
167 aa_audit_file(profile, &nullperms, op, request, *name,
267 u32 request, struct path_cond *cond, int flags,
275 if (request & ~perms->allow)
277 return aa_audit_file(profile, perms, op, request, name, NULL, NULL,
283 const struct path *path, char *buffer, u32 request,
295 request);
298 return __aa_path_perm(op, profile, name, request, cond, flags,
308 * @request: requested permissions
309 * @cond: conditional info for this request (NOT NULL)
314 const struct path *path, int flags, u32 request,
328 profile_path_perm(op, profile, path, buffer, request,
364 u32 request = AA_MAY_LINK;
415 request = lperms.allow & ~AA_MAY_LINK;
418 request |= AA_AUDIT_FILE_MASK & (lperms.allow & ~perms.allow);
419 if (request & ~lperms.allow) {
424 request |= MAY_EXEC;
433 return aa_audit_file(profile, &lperms, OP_LINK, request, lname, tname,
485 u32 request)
500 fctx->allow |= request;
507 u32 request, u32 denied, bool in_atomic)
531 request, &cond, flags, &perms));
544 buffer, request, &cond, flags,
549 buffer, request, &cond, flags,
553 update_file_ctx(file_ctx(file), label, request);
562 u32 request, u32 denied)
574 error = aa_sock_file_perm(label, op, request, sock);
578 last_error(error, aa_sock_file_perm(flabel, op, request, sock));
581 update_file_ctx(file_ctx(file), label, request);
591 * @request: requested permissions
597 u32 request, bool in_atomic)
614 * doesn't match or if the request is for more permissions than
620 denied = request & ~fctx->allow;
632 error = __file_path_perm(op, label, flabel, file, request,
636 error = __file_sock_perm(op, label, flabel, file, request,