Lines Matching defs:access

407  * smk_ptrace_rule_check - helper for ptrace access
413 * Returns 0 on access granted, -error on error
474 * Returns 0 if access is OK, an error code otherwise
491 * Returns 0 if access is OK, an error code otherwise
999 * if the access rule allows transmutation and the directory
1033 * Returns 0 if access is permitted, an error code otherwise
1077 * You need write access to the thing you're unlinking
1083 * You also need write access to the containing directory
1110 * You need write access to the thing you're removing
1116 * You also need write access to the containing directory
1134 * Read and write access is required on both the old and
1137 * Returns 0 if access is permitted, an error code otherwise
1167 * @mask: the access requested
1171 * Returns 0 if access is permitted, an error code otherwise
1207 * Returns 0 if access is permitted, an error code otherwise
1231 * Returns 0 if access is permitted, an error code otherwise
1256 * Returns 0 if access is permitted, an error code otherwise
1356 * Returns 0 if access is permitted, an error code otherwise
1378 * Returns 0 if access is permitted, an error code otherwise
1532 * Should access checks be done on each read or write?
1548 * isn't used on file access checks, it's for send_sigio.
1601 * Returns 0 if current has lock access, error code otherwise
1627 * for passing information, so they require write access.
1629 * Returns 0 if current has access, error code otherwise
1713 * label verify that the SMACK64MMAP also has access
1719 * Matching labels always allows access.
1736 * possibly have less access.
1744 * can't have as much access as current.
1754 * potential access, too.
1762 * If there is any access available to current that is
1764 * deny access.
1838 * Returns 0 if current has access, error code otherwise
1892 * Allow the open only if the task has read access. There are
1896 * Returns 0 if current has access, error code otherwise
2052 * smk_curacc_on_task - helper to log task related access
2054 * @access: the access requested
2057 * Return 0 if access is permitted
2059 static int smk_curacc_on_task(struct task_struct *p, int access,
2068 rc = smk_curacc(skp, access, &ad);
2069 rc = smk_bu_task(p, access, rc);
2078 * Return 0 if write access is permitted
2086 * smack_task_getpgid - Smack access check for getpgid
2097 * smack_task_getsid - Smack access check for getsid
2126 * Return 0 if write access is permitted
2138 * Return 0 if write access is permitted
2149 * Return 0 if read access is permitted
2160 * Return 0 if read access is permitted
2171 * Return 0 if read access is permitted
2182 * Return 0 if write access is permitted
2196 * Return 0 if write access is permitted
2317 * looks for host based access restrictions
2367 * looks for host based access restrictions
2473 * smk_ipv4_check - Perform IPv4 host access checks
2478 * address and perform any outbound access checks needed.
2517 * smk_ipv6_check - check Smack access
2523 * Check an IPv6 access
2551 * smk_ipv6_port_label - Smack port access table management
2639 * smk_ipv6_port_check - check Smack port access
2850 * smack_socket_connect - connect access check
2958 * smk_curacc_shm : check if current has access on shm
2960 * @access : access requested
2962 * Returns 0 if current has the requested access, error code otherwise
2964 static int smk_curacc_shm(struct kern_ipc_perm *isp, int access)
2974 rc = smk_curacc(ssp, access, &ad);
2975 rc = smk_bu_current("shm", ssp, access, rc);
2980 * smack_shm_associate - Smack access check for shm
2982 * @shmflg: access requested
2984 * Returns 0 if current has the requested access, error code otherwise
2995 * smack_shm_shmctl - Smack access check for shm
2999 * Returns 0 if current has the requested access, error code otherwise
3030 * smack_shm_shmat - Smack access for shmat
3033 * @shmflg: access requested
3035 * Returns 0 if current has the requested access, error code otherwise
3047 * smk_curacc_sem : check if current has access on sem
3049 * @access : access requested
3051 * Returns 0 if current has the requested access, error code otherwise
3053 static int smk_curacc_sem(struct kern_ipc_perm *isp, int access)
3063 rc = smk_curacc(ssp, access, &ad);
3064 rc = smk_bu_current("sem", ssp, access, rc);
3069 * smack_sem_associate - Smack access check for sem
3071 * @semflg: access requested
3073 * Returns 0 if current has the requested access, error code otherwise
3084 * smack_sem_shmctl - Smack access check for sem
3088 * Returns 0 if current has the requested access, error code otherwise
3133 * Returns 0 if access is allowed, error code otherwise
3142 * smk_curacc_msq : helper to check if current has access on msq
3144 * @access : access requested
3146 * return 0 if current has access, error otherwise
3148 static int smk_curacc_msq(struct kern_ipc_perm *isp, int access)
3158 rc = smk_curacc(msp, access, &ad);
3159 rc = smk_bu_current("msq", msp, access, rc);
3164 * smack_msg_queue_associate - Smack access check for msg_queue
3166 * @msqflg: access requested
3168 * Returns 0 if current has the requested access, error code otherwise
3179 * smack_msg_queue_msgctl - Smack access check for msg_queue
3183 * Returns 0 if current has the requested access, error code otherwise
3213 * smack_msg_queue_msgsnd - Smack access check for msg_queue
3216 * @msqflg: access requested
3218 * Returns 0 if current has the requested access, error code otherwise
3230 * smack_msg_queue_msgsnd - Smack access check for msg_queue
3237 * Returns 0 if current has read and write access, error code otherwise
3246 * smack_ipc_permission - Smack access for ipc_permission()
3248 * @flag: access requested
3250 * Returns 0 if current has read and write access, error code otherwise
3353 * Socket access is controlled by the socket
3502 * smack_getprocattr - Smack process attribute access
3595 * smack_unix_stream_connect - Smack access on UDS
3600 * Return 0 if a subject with the smack of sock could access
3647 * smack_unix_may_send - Smack access on UDS
3651 * Return 0 if a subject with the smack of sock could access
3921 * smack_socket_sock_rcv_skb - Smack packet delivery access check
3967 * be able to write here. Read access is not required.
4138 * smack_inet_conn_request - Smack access check on connect
4195 * here. Read access is not required.
4287 * smack_key_permission - Smack access on a key
4333 * If the key hasn't been initialized give it access so that
4353 rc = smk_bu_note("key access", tkp, keyp->security, request, rc);
4389 * smack_watch_key - Smack access to watch a key for notifications.
4404 * If the key hasn't been initialized give it access so that
4432 * smack_post_notification - Smack access to post a notification to a queue
4676 * Return 1 if this is the smack access Smack attribute.
4714 * providing access is transmuting use the containing