Lines Matching defs:access

57  * SMACK64 - for access control,
419 * smk_ptrace_rule_check - helper for ptrace access
425 * Returns 0 on access granted, -error on error
486 * Returns 0 if access is OK, an error code otherwise
503 * Returns 0 if access is OK, an error code otherwise
1015 * if the access rule allows transmutation and the directory
1063 * Returns 0 if access is permitted, an error code otherwise
1107 * You need write access to the thing you're unlinking
1113 * You also need write access to the containing directory
1140 * You need write access to the thing you're removing
1146 * You also need write access to the containing directory
1164 * Read and write access is required on both the old and
1167 * Returns 0 if access is permitted, an error code otherwise
1197 * @mask: the access requested
1201 * Returns 0 if access is permitted, an error code otherwise
1237 * Returns 0 if access is permitted, an error code otherwise
1261 * Returns 0 if access is permitted, an error code otherwise
1287 * Returns 0 if access is permitted, an error code otherwise
1389 * Returns 0 if access is permitted, an error code otherwise
1412 * Returns 0 if access is permitted, an error code otherwise
1471 * Returns 0 if access is permitted, an error code otherwise
1494 * Returns 0 if access is permitted, an error code otherwise
1516 * Returns 0 if access is permitted, an error code otherwise
1636 * Should access checks be done on each read or write?
1652 * isn't used on file access checks, it's for send_sigio.
1705 * Returns 0 if current has lock access, error code otherwise
1731 * for passing information, so they require write access.
1733 * Returns 0 if current has access, error code otherwise
1818 * label verify that the SMACK64MMAP also has access
1824 * Matching labels always allows access.
1841 * possibly have less access.
1849 * can't have as much access as current.
1859 * potential access, too.
1867 * If there is any access available to current that is
1869 * deny access.
1943 * Returns 0 if current has access, error code otherwise
1997 * Allow the open only if the task has read access. There are
2001 * Returns 0 if current has access, error code otherwise
2157 * smk_curacc_on_task - helper to log task related access
2159 * @access: the access requested
2162 * Return 0 if access is permitted
2164 static int smk_curacc_on_task(struct task_struct *p, int access,
2173 rc = smk_curacc(skp, access, &ad);
2174 rc = smk_bu_task(p, access, rc);
2183 * Return 0 if write access is permitted
2191 * smack_task_getpgid - Smack access check for getpgid
2202 * smack_task_getsid - Smack access check for getsid
2244 * Return 0 if write access is permitted
2256 * Return 0 if write access is permitted
2267 * Return 0 if read access is permitted
2278 * Return 0 if read access is permitted
2289 * Return 0 if read access is permitted
2300 * Return 0 if write access is permitted
2314 * Return 0 if write access is permitted
2450 * looks for host based access restrictions
2500 * looks for host based access restrictions
2606 * smk_ipv4_check - Perform IPv4 host access checks
2611 * address and perform any outbound access checks needed.
2650 * smk_ipv6_check - check Smack access
2656 * Check an IPv6 access
2684 * smk_ipv6_port_label - Smack port access table management
2771 * smk_ipv6_port_check - check Smack port access
2992 * smack_socket_connect - connect access check
3101 * smk_curacc_shm : check if current has access on shm
3103 * @access : access requested
3105 * Returns 0 if current has the requested access, error code otherwise
3107 static int smk_curacc_shm(struct kern_ipc_perm *isp, int access)
3117 rc = smk_curacc(ssp, access, &ad);
3118 rc = smk_bu_current("shm", ssp, access, rc);
3123 * smack_shm_associate - Smack access check for shm
3125 * @shmflg: access requested
3127 * Returns 0 if current has the requested access, error code otherwise
3138 * smack_shm_shmctl - Smack access check for shm
3142 * Returns 0 if current has the requested access, error code otherwise
3173 * smack_shm_shmat - Smack access for shmat
3176 * @shmflg: access requested
3178 * Returns 0 if current has the requested access, error code otherwise
3190 * smk_curacc_sem : check if current has access on sem
3192 * @access : access requested
3194 * Returns 0 if current has the requested access, error code otherwise
3196 static int smk_curacc_sem(struct kern_ipc_perm *isp, int access)
3206 rc = smk_curacc(ssp, access, &ad);
3207 rc = smk_bu_current("sem", ssp, access, rc);
3212 * smack_sem_associate - Smack access check for sem
3214 * @semflg: access requested
3216 * Returns 0 if current has the requested access, error code otherwise
3227 * smack_sem_semctl - Smack access check for sem
3231 * Returns 0 if current has the requested access, error code otherwise
3276 * Returns 0 if access is allowed, error code otherwise
3285 * smk_curacc_msq : helper to check if current has access on msq
3287 * @access : access requested
3289 * return 0 if current has access, error otherwise
3291 static int smk_curacc_msq(struct kern_ipc_perm *isp, int access)
3301 rc = smk_curacc(msp, access, &ad);
3302 rc = smk_bu_current("msq", msp, access, rc);
3307 * smack_msg_queue_associate - Smack access check for msg_queue
3309 * @msqflg: access requested
3311 * Returns 0 if current has the requested access, error code otherwise
3322 * smack_msg_queue_msgctl - Smack access check for msg_queue
3326 * Returns 0 if current has the requested access, error code otherwise
3356 * smack_msg_queue_msgsnd - Smack access check for msg_queue
3359 * @msqflg: access requested
3361 * Returns 0 if current has the requested access, error code otherwise
3373 * smack_msg_queue_msgrcv - Smack access check for msg_queue
3380 * Returns 0 if current has read and write access, error code otherwise
3391 * smack_ipc_permission - Smack access for ipc_permission()
3393 * @flag: access requested
3395 * Returns 0 if current has read and write access, error code otherwise
3498 * Socket access is controlled by the socket
3639 * smack_getprocattr - Smack process attribute access
3732 * smack_unix_stream_connect - Smack access on UDS
3737 * Return 0 if a subject with the smack of sock could access
3784 * smack_unix_may_send - Smack access on UDS
3788 * Return 0 if a subject with the smack of sock could access
4057 * smack_socket_sock_rcv_skb - Smack packet delivery access check
4103 * be able to write here. Read access is not required.
4275 * smack_inet_conn_request - Smack access check on connect
4332 * here. Read access is not required.
4424 * smack_key_permission - Smack access on a key
4470 * If the key hasn't been initialized give it access so that
4490 rc = smk_bu_note("key access", tkp, keyp->security, request, rc);
4526 * smack_watch_key - Smack access to watch a key for notifications.
4541 * If the key hasn't been initialized give it access so that
4569 * smack_post_notification - Smack access to post a notification to a queue
4815 * Return 1 if this is the smack access Smack attribute.
4853 * providing access is transmuting use the containing