/kernel/linux/linux-6.6/security/selinux/ |
H A D | avc.c | 658 const char *const *perms; in avc_audit_pre_callback() local 668 perms = secclass_map[sad->tclass-1].perms; in avc_audit_pre_callback() 674 if ((perm & av) && perms[i]) { in avc_audit_pre_callback() 675 audit_log_format(ab, " %s", perms[i]); in avc_audit_pre_callback() 816 * @perms : Permission mask bits 831 static int avc_update_node(u32 event, u32 perms, u8 driver, u8 xperm, u32 ssid, in avc_update_node() argument 889 node->ae.avd.allowed |= perms; in avc_update_node() 895 node->ae.avd.allowed &= ~perms; in avc_update_node() 898 node->ae.avd.auditallow |= perms; in avc_update_node() [all...] |
/kernel/linux/linux-5.10/security/selinux/include/ |
H A D | security.h | 263 #define security_xperm_set(perms, x) (perms[x >> 5] |= 1 << (x & 0x1f)) 264 #define security_xperm_test(perms, x) (1 & (perms[x >> 5] >> (x & 0x1f))) 379 char *class, char ***perms, int *nperms);
|
H A D | avc_ss.h | 18 const char *perms[sizeof(u32) * 8 + 1]; member
|
/test/xts/dcts/communication/softbus_standard/common/ |
H A D | socket_common.c | 579 const char *perms[2];
in AddPermission() local 580 perms[0] = OHOS_PERMISSION_DISTRIBUTED_SOFTBUS_CENTER;
in AddPermission() 581 perms[1] = OHOS_PERMISSION_DISTRIBUTED_DATASYNC;
in AddPermission() 587 .perms = perms,
in AddPermission()
|
/third_party/selinux/libsepol/cil/src/ |
H A D | cil_reset_ast.c | 27 int num_common_perms = class->num_perms - class->perms.nprim; in cil_reset_class() 28 cil_symtab_map(&class->perms, __class_reset_perm_values, &num_common_perms); in cil_reset_class() 31 class->num_perms = class->perms.nprim; in cil_reset_class() 49 cil_list_destroy(&cp->perms, CIL_FALSE); in cil_reset_classperms() 218 cil_reset_classperms_list(rule->perms.classperms); in cil_reset_avrule()
|
H A D | cil_binary.c | 1318 static int __cil_perms_to_datum(struct cil_list *perms, class_datum_t *sepol_class, uint32_t *datum) in __cil_perms_to_datum() argument 1326 cil_list_for_each(curr_perm, perms) { in __cil_perms_to_datum() 1402 rc = __cil_perms_to_datum(cp->perms, sepol_class, &data); in __cil_avrule_expand_helper() 1447 cil_list_for_each(i, cp->perms) { in __cil_avrule_expand() 1493 struct cil_list *classperms = cil_avrule->perms.classperms; in __cil_avrule_to_avtab() 1621 xperms->perms[i] |= ~0U; in __avrule_xperm_setrangebits() 1624 xperms->perms[i] |= XPERM_SETBITS(h); in __avrule_xperm_setrangebits() 1627 xperms->perms[i] |= ~0U - XPERM_SETBITS(low); in __avrule_xperm_setrangebits() 1630 xperms->perms[i] |= XPERM_SETBITS(h) - XPERM_SETBITS(low); in __avrule_xperm_setrangebits() 1833 rc = __cil_avrulex_ioctl_to_hashtable(args->avrulex_ioctl_table, kind, sepol_src->s.value, sepol_tgt->s.value, sepol_obj->s.value, permx->perms); in __cil_avrulex_to_hashtable_helper() 2890 cil_constrain_to_policydb_helper(policydb_t *pdb, const struct cil_db *db, struct cil_symtab_datum *class, struct cil_list *perms, struct cil_list *expr) cil_constrain_to_policydb_helper() argument [all...] |
/third_party/selinux/libsepol/src/ |
H A D | optimize.c | 182 return process_xperms(x1->perms, x2->perms); in process_avtab_datum() 185 return xperm_test(x1->driver, x2->perms); in process_avtab_datum() 191 return process_xperms(x1->perms, x2->perms); in process_avtab_datum()
|
/kernel/linux/linux-5.10/security/selinux/ss/ |
H A D | avtab.c | 123 /* extended perms may not be unique */ in avtab_insert() 409 __le32 buf32[ARRAY_SIZE(xperms.perms.p)]; in avtab_read_item() 536 rc = next_entry(buf32, fp, sizeof(u32)*ARRAY_SIZE(xperms.perms.p)); in avtab_read_item() 541 for (i = 0; i < ARRAY_SIZE(xperms.perms.p); i++) in avtab_read_item() 542 xperms.perms.p[i] = le32_to_cpu(buf32[i]); in avtab_read_item() 613 __le32 buf32[ARRAY_SIZE(cur->datum.u.xperms->perms.p)]; in avtab_write_item() 632 for (i = 0; i < ARRAY_SIZE(cur->datum.u.xperms->perms.p); i++) in avtab_write_item() 633 buf32[i] = cpu_to_le32(cur->datum.u.xperms->perms.p[i]); in avtab_write_item() 635 ARRAY_SIZE(cur->datum.u.xperms->perms.p), fp); in avtab_write_item()
|
H A D | services.c | 143 while (p_in->perms[k]) { in selinux_set_mapping() 145 if (!*p_in->perms[k]) { in selinux_set_mapping() 149 p_out->perms[k] = string_to_av_perm(pol, p_out->value, in selinux_set_mapping() 150 p_in->perms[k]); in selinux_set_mapping() 151 if (!p_out->perms[k]) { in selinux_set_mapping() 153 p_in->perms[k], p_in->name); in selinux_set_mapping() 213 if (avd->allowed & mapping->perms[i]) in map_decision() 215 if (allow_unknown && !mapping->perms[i]) in map_decision() 221 if (avd->auditallow & mapping->perms[i]) in map_decision() 226 if (avd->auditdeny & mapping->perms[ in map_decision() 3418 char *name = k, **perms = args; get_permissions_callback() local 3428 security_get_permissions(struct selinux_policy *policy, char *class, char ***perms, int *nperms) security_get_permissions() argument [all...] |
/third_party/skia/third_party/externals/swiftshader/third_party/llvm-10.0/llvm/include/llvm/Support/ |
H A D | VirtualFileSystem.h | 53 llvm::sys::fs::perms Perms; 64 llvm::sys::fs::perms Perms); 77 llvm::sys::fs::perms getPermissions() const { return Perms; } in getPermissions() 426 Optional<llvm::sys::fs::perms> Perms, 443 Optional<llvm::sys::fs::perms> Perms = None); 469 Optional<llvm::sys::fs::perms> Perms = None);
|
/third_party/selinux/libselinux/include/selinux/ |
H A D | avc.h | 380 * @perms: permissions 384 * and the permissions @perms, interpreting 385 * @perms based on @tclass. Returns %0 on success or 391 access_vector_t perms, 395 access_vector_t perms);
|
/kernel/linux/linux-6.6/security/selinux/ss/ |
H A D | services.c | 139 while (p_in->perms[k]) { in selinux_set_mapping() 141 if (!*p_in->perms[k]) { in selinux_set_mapping() 145 p_out->perms[k] = string_to_av_perm(pol, p_out->value, in selinux_set_mapping() 146 p_in->perms[k]); in selinux_set_mapping() 147 if (!p_out->perms[k]) { in selinux_set_mapping() 149 p_in->perms[k], p_in->name); in selinux_set_mapping() 209 if (avd->allowed & mapping->perms[i]) in map_decision() 211 if (allow_unknown && !mapping->perms[i]) in map_decision() 217 if (avd->auditallow & mapping->perms[i]) in map_decision() 222 if (avd->auditdeny & mapping->perms[ in map_decision() 3373 char *name = k, **perms = args; get_permissions_callback() local 3383 security_get_permissions(struct selinux_policy *policy, const char *class, char ***perms, u32 *nperms) security_get_permissions() argument [all...] |
/third_party/ntfs-3g/libntfs-3g/ |
H A D | security.c | 1356 int perms; in ntfs_basic_perms() local 1361 perms = pxdesc->mode; in ntfs_basic_perms() 1365 perms = (perms & 07707) in ntfs_basic_perms() 1366 | ((pace->perms & 7) << 3); in ntfs_basic_perms() 1374 perms |= pace->perms & 7; in ntfs_basic_perms() 1377 return (perms); in ntfs_basic_perms() 1939 mode_t perms; in access_check_posix() local 1944 perms in access_check_posix() [all...] |
H A D | xattrs.c | 70 le16 perms; member 166 acl->ace[i].perms = le16_to_cpu(le_acl->ace[i].perms); in le_acl_to_cpu() 188 le_acl->ace[i].perms = cpu_to_le16(acl->ace[i].perms); in cpu_to_le_acl()
|
/kernel/linux/linux-5.10/security/apparmor/ |
H A D | label.c | 1287 * label_compound_match - find perms for full compound label 1288 * @profile: profile to find perms for 1293 * @perms: perms struct to set 1298 * @perms should be preinitialized with allperms OR a previous permission 1304 struct aa_perms *perms) in label_compound_match() 1320 *perms = allperms; in label_compound_match() 1332 aa_compute_perms(profile->policy.dfa, state, perms); in label_compound_match() 1333 aa_apply_modes_to_perms(profile, perms); in label_compound_match() 1334 if ((perms in label_compound_match() 1301 label_compound_match(struct aa_profile *profile, struct aa_label *label, unsigned int state, bool subns, u32 request, struct aa_perms *perms) label_compound_match() argument 1359 label_components_match(struct aa_profile *profile, struct aa_label *label, unsigned int start, bool subns, u32 request, struct aa_perms *perms) label_components_match() argument 1418 aa_label_match(struct aa_profile *profile, struct aa_label *label, unsigned int state, bool subns, u32 request, struct aa_perms *perms) aa_label_match() argument [all...] |
/kernel/linux/linux-6.6/security/apparmor/ |
H A D | label.c | 1283 * label_compound_match - find perms for full compound label 1284 * @profile: profile to find perms for 1289 * @perms: perms struct to set 1294 * @perms should be preinitialized with allperms OR a previous permission 1301 struct aa_perms *perms) in label_compound_match() 1317 *perms = allperms; in label_compound_match() 1329 *perms = *aa_lookup_perms(&rules->policy, state); in label_compound_match() 1330 aa_apply_modes_to_perms(profile, perms); in label_compound_match() 1331 if ((perms in label_compound_match() 1297 label_compound_match(struct aa_profile *profile, struct aa_ruleset *rules, struct aa_label *label, aa_state_t state, bool subns, u32 request, struct aa_perms *perms) label_compound_match() argument 1357 label_components_match(struct aa_profile *profile, struct aa_ruleset *rules, struct aa_label *label, aa_state_t start, bool subns, u32 request, struct aa_perms *perms) label_components_match() argument 1418 aa_label_match(struct aa_profile *profile, struct aa_ruleset *rules, struct aa_label *label, aa_state_t state, bool subns, u32 request, struct aa_perms *perms) aa_label_match() argument [all...] |
/kernel/linux/linux-5.10/fs/hfsplus/ |
H A D | inode.c | 182 struct hfsplus_perm *perms, int dir) in hfsplus_get_perms() 187 mode = be16_to_cpu(perms->mode); in hfsplus_get_perms() 189 i_uid_write(inode, be32_to_cpu(perms->owner)); in hfsplus_get_perms() 193 i_gid_write(inode, be32_to_cpu(perms->group)); in hfsplus_get_perms() 204 HFSPLUS_I(inode)->userflags = perms->userflags; in hfsplus_get_perms() 205 if (perms->rootflags & HFSPLUS_FLG_IMMUTABLE) in hfsplus_get_perms() 209 if (perms->rootflags & HFSPLUS_FLG_APPEND) in hfsplus_get_perms() 181 hfsplus_get_perms(struct inode *inode, struct hfsplus_perm *perms, int dir) hfsplus_get_perms() argument
|
/kernel/linux/linux-6.6/fs/hfsplus/ |
H A D | inode.c | 187 struct hfsplus_perm *perms, int dir) in hfsplus_get_perms() 192 mode = be16_to_cpu(perms->mode); in hfsplus_get_perms() 194 i_uid_write(inode, be32_to_cpu(perms->owner)); in hfsplus_get_perms() 198 i_gid_write(inode, be32_to_cpu(perms->group)); in hfsplus_get_perms() 209 HFSPLUS_I(inode)->userflags = perms->userflags; in hfsplus_get_perms() 210 if (perms->rootflags & HFSPLUS_FLG_IMMUTABLE) in hfsplus_get_perms() 214 if (perms->rootflags & HFSPLUS_FLG_APPEND) in hfsplus_get_perms() 186 hfsplus_get_perms(struct inode *inode, struct hfsplus_perm *perms, int dir) hfsplus_get_perms() argument
|
/third_party/selinux/checkpolicy/test/ |
H A D | dismod.c | 264 cur = avrule->perms; in display_avrule() 276 cur = avrule->perms; in display_avrule() 287 render_access_mask(avrule->perms->data, avrule->perms->tclass, in display_avrule() 290 display_id(policy, fp, SYM_TYPES, avrule->perms->data - 1, ""); in display_avrule() 306 xperms.perms[i] = avrule->xperms->perms[i]; in display_avrule() 559 "<no perms known>"); in display_scope_index() 716 fprintf(out_fp, "Allow unknown classes and perms\n"); in display_handle_unknown() 718 fprintf(out_fp, "Deny unknown classes and perms\ in display_handle_unknown() [all...] |
/kernel/linux/linux-6.6/security/selinux/include/ |
H A D | avc_ss.h | 17 const char *perms[sizeof(u32) * 8 + 1]; member
|
/kernel/linux/linux-5.10/arch/x86/platform/uv/ |
H A D | bios_uv.c | 135 uv_bios_change_memprotect(u64 paddr, u64 len, enum uv_memprotect perms) in uv_bios_change_memprotect() argument 138 perms, 0, 0); in uv_bios_change_memprotect()
|
/test/xts/hats/hdf/external_device_manager/driver_extension_controller/ |
H A D | driver_extension_controller_test.cpp | 73 .perms = nullptr, 84 .perms = nullptr,
|
/kernel/linux/linux-6.6/security/apparmor/include/ |
H A D | perms.h | 100 * aa_perms_accum_raw - accumulate perms with out masking off overlapping perms 101 * @accum - perms struct to accumulate into 102 * @addend - perms struct to add to @accum 127 * aa_perms_accum - accumulate perms, masking off overlapping perms 128 * @accum - perms struct to accumulate into 129 * @addend - perms struct to add to @accum 207 struct aa_perms *perms); 212 int type, u32 request, struct aa_perms *perms); [all...] |
/third_party/selinux/checkpolicy/ |
H A D | policy_define.c | 1681 perm->next = avrule->perms; in define_compute_type_helper() 1682 avrule->perms = perm; in define_compute_type_helper() 2040 class_perm_node_t *perms, *tail = NULL, *cur_perms = NULL; in define_te_avtab_xperms_helper() local 2099 perms = NULL; in define_te_avtab_xperms_helper() 2111 if (!perms) in define_te_avtab_xperms_helper() 2112 perms = cur_perms; in define_te_avtab_xperms_helper() 2143 avrule->perms = perms; in define_te_avtab_xperms_helper() 2167 xperms->perms[i] |= ~0U; in avrule_xperm_setrangebits() 2170 xperms->perms[ in avrule_xperm_setrangebits() 2502 class_perm_node_t *perms, *tail = NULL, *cur_perms = NULL; define_te_avtab_helper() local [all...] |
/kernel/linux/linux-5.10/drivers/net/wireless/rsi/ |
H A D | rsi_debugfs.h | 36 umode_t perms; member
|