/kernel/linux/linux-6.6/security/apparmor/ |
H A D | policy_compat.c | 73 * map_old_perms - map old file perms layout to the new layout 100 static void compute_fperms_allow(struct aa_perms *perms, struct aa_dfa *dfa, in compute_fperms_allow() argument 103 perms->allow |= AA_MAY_GETATTR; in compute_fperms_allow() 107 perms->allow |= AA_MAY_CHANGE_PROFILE; in compute_fperms_allow() 109 perms->allow |= AA_MAY_ONEXEC; in compute_fperms_allow() 115 struct aa_perms perms = { }; in compute_fperms_user() local 117 perms.allow = map_old_perms(dfa_user_allow(dfa, state)); in compute_fperms_user() 118 perms.audit = map_old_perms(dfa_user_audit(dfa, state)); in compute_fperms_user() 119 perms.quiet = map_old_perms(dfa_user_quiet(dfa, state)); in compute_fperms_user() 120 perms in compute_fperms_user() 130 struct aa_perms perms = { }; compute_fperms_other() local 176 struct aa_perms *perms; compute_xmatch_perms() local 213 struct aa_perms perms = { }; compute_perms_entry() local [all...] |
H A D | lib.c | 20 #include "include/perms.h" 279 * aa_audit_perms_cb - generic callback fn for auditing perms 306 * aa_apply_modes_to_perms - apply namespace and profile flags to perms 307 * @profile: that perms where computed from 308 * @perms: perms to apply mode modifiers to 310 * TODO: split into profile and ns based flags for when accumulating perms 312 void aa_apply_modes_to_perms(struct aa_profile *profile, struct aa_perms *perms) in aa_apply_modes_to_perms() argument 316 perms->audit = ALL_PERMS_MASK; in aa_apply_modes_to_perms() 319 perms in aa_apply_modes_to_perms() 337 aa_profile_match_label(struct aa_profile *profile, struct aa_ruleset *rules, struct aa_label *label, int type, u32 request, struct aa_perms *perms) aa_profile_match_label() argument 359 struct aa_perms perms; aa_profile_label_perm() local 388 aa_check_perms(struct aa_profile *profile, struct aa_perms *perms, u32 request, struct apparmor_audit_data *ad, void (*cb)(struct audit_buffer *, void *)) aa_check_perms() argument [all...] |
H A D | file.c | 82 * @perms: the permissions computed for the request (NOT NULL) 95 struct aa_profile *profile, struct aa_perms *perms, in aa_audit_file() 114 u32 mask = perms->audit; in aa_audit_file() 119 /* mask off perms that are not being force audited */ in aa_audit_file() 127 ad.request = ad.request & ~perms->allow; in aa_audit_file() 130 if (ad.request & perms->kill) in aa_audit_file() 134 if ((ad.request & perms->quiet) && in aa_audit_file() 137 ad.request &= ~perms->quiet; in aa_audit_file() 143 ad.denied = ad.request & ~perms->allow; in aa_audit_file() 184 * aa_lookup_fperms - convert dfa compressed perms t 94 aa_audit_file(const struct cred *subj_cred, struct aa_profile *profile, struct aa_perms *perms, const char *op, u32 request, const char *name, const char *target, struct aa_label *tlabel, kuid_t ouid, const char *info, int error) aa_audit_file() argument 217 aa_str_perms(struct aa_policydb *file_rules, aa_state_t start, const char *name, struct path_cond *cond, struct aa_perms *perms) aa_str_perms() argument 228 __aa_path_perm(const char *op, const struct cred *subj_cred, struct aa_profile *profile, const char *name, u32 request, struct path_cond *cond, int flags, struct aa_perms *perms) __aa_path_perm() argument 249 profile_path_perm(const char *op, const struct cred *subj_cred, struct aa_profile *profile, const struct path *path, char *buffer, u32 request, struct path_cond *cond, int flags, struct aa_perms *perms) profile_path_perm() argument 287 struct aa_perms perms = {}; aa_path_perm() local 335 struct aa_perms lperms = {}, perms; profile_path_link() local 490 struct aa_perms perms = {}; __file_path_perm() local [all...] |
H A D | domain.c | 109 * label_compound_match - find perms for full compound label 110 * @profile: profile to find perms for 116 * @perms: perms struct to set 121 * @perms should be preinitialized with allperms OR a previous permission 127 struct aa_perms *perms) in label_compound_match() 146 *perms = allperms; in label_compound_match() 158 *perms = *(aa_lookup_fperms(&(rules->file), state, &cond)); in label_compound_match() 159 aa_apply_modes_to_perms(profile, perms); in label_compound_match() 160 if ((perms in label_compound_match() 124 label_compound_match(struct aa_profile *profile, struct aa_label *label, bool stack, aa_state_t state, bool subns, u32 request, struct aa_perms *perms) label_compound_match() argument 186 label_components_match(struct aa_profile *profile, struct aa_label *label, bool stack, aa_state_t start, bool subns, u32 request, struct aa_perms *perms) label_components_match() argument 249 label_match(struct aa_profile *profile, struct aa_label *label, bool stack, aa_state_t state, bool subns, u32 request, struct aa_perms *perms) label_match() argument 282 change_profile_perms(struct aa_profile *profile, struct aa_label *target, bool stack, u32 request, aa_state_t start, struct aa_perms *perms) change_profile_perms() argument 640 struct aa_perms perms = {}; profile_transition() local 740 struct aa_perms perms = {}; profile_onexec() local 1181 struct aa_perms perms = {}; aa_change_hat() local 1288 change_profile_perms_wrapper(const char *op, const char *name, const struct cred *subj_cred, struct aa_profile *profile, struct aa_label *target, bool stack, u32 request, struct aa_perms *perms) change_profile_perms_wrapper() argument 1329 struct aa_perms perms = {}; aa_change_profile() local [all...] |
H A D | mount.c | 126 * @perms: the permissions computed for the request (NOT NULL) 137 struct aa_perms *perms, const char *info, int error) in audit_mount() 143 u32 mask = perms->audit; in audit_mount() 148 /* mask off perms that are not being force audited */ in audit_mount() 156 request = request & ~perms->allow; in audit_mount() 158 if (request & perms->kill) in audit_mount() 162 if ((request & perms->quiet) && in audit_mount() 165 request &= ~perms->quiet; in audit_mount() 177 if (data && (perms->audit & AA_AUDIT_DATA)) in audit_mount() 217 "failed perms chec 132 audit_mount(const struct cred *subj_cred, struct aa_profile *profile, const char *op, const char *name, const char *src_name, const char *type, const char *trans, unsigned long flags, const void *data, u32 request, struct aa_perms *perms, const char *info, int error) audit_mount() argument 224 do_match_mnt(struct aa_policydb *policy, aa_state_t start, const char *mntpnt, const char *devname, const char *type, unsigned long flags, void *data, bool binary, struct aa_perms *perms) do_match_mnt() argument 310 struct aa_perms perms = { }; match_mnt_path_str() local 607 struct aa_perms perms = { }; profile_umount() local 673 struct aa_perms perms = { }; build_pivotroot() local [all...] |
H A D | net.c | 115 struct aa_perms perms = { }; in aa_profile_af_perm() local 132 perms = *aa_lookup_perms(&rules->policy, state); in aa_profile_af_perm() 133 aa_apply_modes_to_perms(profile, &perms); in aa_profile_af_perm() 135 return aa_check_perms(profile, &perms, request, ad, audit_net_cb); in aa_profile_af_perm() 225 struct aa_perms perms = { }; in aa_secmark_perm() local 242 perms.deny = ALL_PERMS_MASK; in aa_secmark_perm() 244 perms.allow = ALL_PERMS_MASK; in aa_secmark_perm() 247 perms.audit = ALL_PERMS_MASK; in aa_secmark_perm() 251 aa_apply_modes_to_perms(profile, &perms); in aa_secmark_perm() 253 return aa_check_perms(profile, &perms, reques in aa_secmark_perm() [all...] |
/kernel/linux/linux-5.10/security/apparmor/ |
H A D | file.c | 78 * @perms: the permissions computed for the request (NOT NULL) 90 int aa_audit_file(struct aa_profile *profile, struct aa_perms *perms, in aa_audit_file() argument 109 u32 mask = perms->audit; in aa_audit_file() 114 /* mask off perms that are not being force audited */ in aa_audit_file() 122 aad(&sa)->request = aad(&sa)->request & ~perms->allow; in aa_audit_file() 125 if (aad(&sa)->request & perms->kill) in aa_audit_file() 129 if ((aad(&sa)->request & perms->quiet) && in aa_audit_file() 132 aad(&sa)->request &= ~perms->quiet; in aa_audit_file() 138 aad(&sa)->denied = aad(&sa)->request & ~perms->allow; in aa_audit_file() 176 * map_old_perms - map old file perms layou 221 struct aa_perms perms = { }; aa_compute_fperms() local 255 aa_str_perms(struct aa_dfa *dfa, unsigned int start, const char *name, struct path_cond *cond, struct aa_perms *perms) aa_str_perms() argument 266 __aa_path_perm(const char *op, struct aa_profile *profile, const char *name, u32 request, struct path_cond *cond, int flags, struct aa_perms *perms) __aa_path_perm() argument 282 profile_path_perm(const char *op, struct aa_profile *profile, const struct path *path, char *buffer, u32 request, struct path_cond *cond, int flags, struct aa_perms *perms) profile_path_perm() argument 317 struct aa_perms perms = {}; aa_path_perm() local 362 struct aa_perms lperms = {}, perms; profile_path_link() local 510 struct aa_perms perms = {}; __file_path_perm() local [all...] |
H A D | lib.c | 20 #include "include/perms.h" 258 * aa_audit_perms_cb - generic callback fn for auditing perms 284 * aa_apply_modes_to_perms - apply namespace and profile flags to perms 285 * @profile: that perms where computed from 286 * @perms: perms to apply mode modifiers to 288 * TODO: split into profile and ns based flags for when accumulating perms 290 void aa_apply_modes_to_perms(struct aa_profile *profile, struct aa_perms *perms) in aa_apply_modes_to_perms() argument 294 perms->audit = ALL_PERMS_MASK; in aa_apply_modes_to_perms() 297 perms in aa_apply_modes_to_perms() 325 aa_compute_perms(struct aa_dfa *dfa, unsigned int state, struct aa_perms *perms) aa_compute_perms() argument 381 aa_profile_match_label(struct aa_profile *profile, struct aa_label *label, int type, u32 request, struct aa_perms *perms) aa_profile_match_label() argument 399 struct aa_perms perms; aa_profile_label_perm() local 429 aa_check_perms(struct aa_profile *profile, struct aa_perms *perms, u32 request, struct common_audit_data *sa, void (*cb)(struct audit_buffer *, void *)) aa_check_perms() argument [all...] |
H A D | mount.c | 124 * @perms: the permissions computed for the request (NOT NULL) 134 struct aa_perms *perms, const char *info, int error) in audit_mount() 140 u32 mask = perms->audit; in audit_mount() 145 /* mask off perms that are not being force audited */ in audit_mount() 153 request = request & ~perms->allow; in audit_mount() 155 if (request & perms->kill) in audit_mount() 159 if ((request & perms->quiet) && in audit_mount() 162 request &= ~perms->quiet; in audit_mount() 173 if (data && (perms->audit & AA_AUDIT_DATA)) in audit_mount() 216 struct aa_perms perms in compute_mnt_perms() local 130 audit_mount(struct aa_profile *profile, const char *op, const char *name, const char *src_name, const char *type, const char *trans, unsigned long flags, const void *data, u32 request, struct aa_perms *perms, const char *info, int error) audit_mount() argument 240 do_match_mnt(struct aa_dfa *dfa, unsigned int start, const char *mntpnt, const char *devname, const char *type, unsigned long flags, void *data, bool binary, struct aa_perms *perms) do_match_mnt() argument 322 struct aa_perms perms = { }; match_mnt_path_str() local 586 struct aa_perms perms = { }; profile_umount() local 647 struct aa_perms perms = { }; build_pivotroot() local [all...] |
H A D | domain.c | 117 * label_compound_match - find perms for full compound label 118 * @profile: profile to find perms for 124 * @perms: perms struct to set 129 * @perms should be preinitialized with allperms OR a previous permission 135 struct aa_perms *perms) in label_compound_match() 152 *perms = allperms; in label_compound_match() 164 *perms = aa_compute_fperms(profile->file.dfa, state, &cond); in label_compound_match() 165 aa_apply_modes_to_perms(profile, perms); in label_compound_match() 166 if ((perms in label_compound_match() 132 label_compound_match(struct aa_profile *profile, struct aa_label *label, bool stack, unsigned int state, bool subns, u32 request, struct aa_perms *perms) label_compound_match() argument 192 label_components_match(struct aa_profile *profile, struct aa_label *label, bool stack, unsigned int start, bool subns, u32 request, struct aa_perms *perms) label_components_match() argument 253 label_match(struct aa_profile *profile, struct aa_label *label, bool stack, unsigned int state, bool subns, u32 request, struct aa_perms *perms) label_match() argument 286 change_profile_perms(struct aa_profile *profile, struct aa_label *target, bool stack, u32 request, unsigned int start, struct aa_perms *perms) change_profile_perms() argument 630 struct aa_perms perms = {}; profile_transition() local 726 struct aa_perms perms = {}; profile_onexec() local 1152 struct aa_perms perms = {}; aa_change_hat() local 1258 change_profile_perms_wrapper(const char *op, const char *name, struct aa_profile *profile, struct aa_label *target, bool stack, u32 request, struct aa_perms *perms) change_profile_perms_wrapper() argument 1295 struct aa_perms perms = {}; aa_change_profile() local [all...] |
H A D | net.c | 111 struct aa_perms perms = { }; in aa_profile_af_perm() local 128 aa_compute_perms(profile->policy.dfa, state, &perms); in aa_profile_af_perm() 129 aa_apply_modes_to_perms(profile, &perms); in aa_profile_af_perm() 131 return aa_check_perms(profile, &perms, request, sa, audit_net_cb); in aa_profile_af_perm() 217 struct aa_perms perms = { }; in aa_secmark_perm() local 232 perms.deny = ALL_PERMS_MASK; in aa_secmark_perm() 234 perms.allow = ALL_PERMS_MASK; in aa_secmark_perm() 237 perms.audit = ALL_PERMS_MASK; in aa_secmark_perm() 241 aa_apply_modes_to_perms(profile, &perms); in aa_secmark_perm() 243 return aa_check_perms(profile, &perms, reques in aa_secmark_perm() [all...] |
/third_party/selinux/libselinux/src/ |
H A D | mapping.c | 23 access_vector_t perms[sizeof(access_vector_t) * 8]; member 83 while (p_in->perms[k]) { in selinux_set_mapping() 85 if (!*p_in->perms[k]) { in selinux_set_mapping() 89 p_out->perms[k] = string_to_av_perm(p_out->value, in selinux_set_mapping() 90 p_in->perms[k]); in selinux_set_mapping() 91 if (!p_out->perms[k]) { in selinux_set_mapping() 94 p_in->perms[k], p_in->name); in selinux_set_mapping() 148 kperm |= current_mapping[tclass].perms[i]; in unmap_perm() 193 if (kperm & current_mapping[tclass].perms[i]) { in map_perm() 195 kperm &= ~current_mapping[tclass].perms[ in map_perm() [all...] |
H A D | avc.c | 43 security_class_t tclass, access_vector_t perms, 49 access_vector_t perms; member 912 access_vector_t perms, in avc_add_callback() 916 security_class_t tclass, access_vector_t perms) in avc_add_callback() 932 c->perms = perms; in avc_add_callback() 945 access_vector_t perms) in avc_update_node() 949 node->ae.avd.allowed |= perms; in avc_update_node() 953 node->ae.avd.allowed &= ~perms; in avc_update_node() 956 node->ae.avd.auditallow |= perms; in avc_update_node() 909 avc_add_callback(int (*callback) (uint32_t event, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, access_vector_t * out_retained), uint32_t events, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms) avc_add_callback() argument 944 avc_update_node(uint32_t event, struct avc_node *node, access_vector_t perms) avc_update_node() argument 970 avc_update_cache(uint32_t event, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms) avc_update_cache() argument 1008 avc_control(uint32_t event, security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, access_vector_t * out_retained) avc_control() argument 1068 avc_ss_grant(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno) avc_ss_grant() argument 1089 avc_ss_try_revoke(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, access_vector_t * out_retained) avc_ss_try_revoke() argument 1109 avc_ss_revoke(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno) avc_ss_revoke() argument 1144 avc_ss_set_auditallow(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, uint32_t enable) avc_ss_set_auditallow() argument 1165 avc_ss_set_auditdeny(security_id_t ssid, security_id_t tsid, security_class_t tclass, access_vector_t perms, uint32_t seqno, uint32_t enable) avc_ss_set_auditdeny() argument [all...] |
/kernel/linux/linux-6.6/security/apparmor/include/ |
H A D | file.h | 18 #include "perms.h" 40 * @perms: the permission the file was opened with 112 struct aa_profile *profile, struct aa_perms *perms, 121 struct aa_perms *perms); 147 u32 perms = 0; in aa_map_file_to_perms() local 150 perms |= MAY_WRITE; in aa_map_file_to_perms() 152 perms |= MAY_READ; in aa_map_file_to_perms() 154 if ((flags & O_APPEND) && (perms & MAY_WRITE)) in aa_map_file_to_perms() 155 perms = (perms in aa_map_file_to_perms() [all...] |
/third_party/selinux/libsepol/src/ |
H A D | assertion.c | 49 const class_perm_node_t *curperm, uint32_t perms) in report_failure() 57 sepol_av_to_string(p, curperm->tclass, perms)); in report_failure() 63 sepol_av_to_string(p, curperm->tclass, perms)); in report_failure() 69 sepol_av_to_string(p, curperm->tclass, perms)); in report_failure() 99 rc = extended_permissions_and(neverallow->perms, allow->perms); in check_extended_permissions() 102 rc = xperm_test(neverallow->driver, allow->perms); in check_extended_permissions() 105 rc = xperm_test(allow->driver, neverallow->perms); in check_extended_permissions() 108 rc = extended_permissions_and(neverallow->perms, allow->perms); in check_extended_permissions() 47 report_failure(sepol_handle_t *handle, policydb_t *p, const avrule_t *avrule, unsigned int stype, unsigned int ttype, const class_perm_node_t *curperm, uint32_t perms) report_failure() argument 145 report_assertion_extended_permissions(sepol_handle_t *handle, policydb_t *p, const avrule_t *avrule, unsigned int stype, unsigned int ttype, const class_perm_node_t *curperm, uint32_t perms, avtab_key_t *k, avtab_t *avtab) report_assertion_extended_permissions() argument 221 uint32_t perms; report_assertion_avtab_matches() local [all...] |
/kernel/linux/linux-6.6/drivers/s390/crypto/ |
H A D | zcrypt_api.c | 122 struct ap_perms perms; member 167 for (i = 0; i < sizeof(zcdndev->perms.ioctlm) / sizeof(long); i++) in ioctlmask_show() 168 n += sysfs_emit_at(buf, n, "%016lx", zcdndev->perms.ioctlm[i]); in ioctlmask_show() 183 rc = ap_parse_mask_str(buf, zcdndev->perms.ioctlm, in ioctlmask_store() 204 for (i = 0; i < sizeof(zcdndev->perms.apm) / sizeof(long); i++) in apmask_show() 205 n += sysfs_emit_at(buf, n, "%016lx", zcdndev->perms.apm[i]); in apmask_show() 220 rc = ap_parse_mask_str(buf, zcdndev->perms.apm, in apmask_store() 241 for (i = 0; i < sizeof(zcdndev->perms.aqm) / sizeof(long); i++) in aqmask_show() 242 n += sysfs_emit_at(buf, n, "%016lx", zcdndev->perms.aqm[i]); in aqmask_show() 257 rc = ap_parse_mask_str(buf, zcdndev->perms in aqmask_store() 504 struct ap_perms *perms = &ap_perms; zcrypt_open() local 547 zcrypt_check_ioctl(struct ap_perms *perms, unsigned int cmd) zcrypt_check_ioctl() argument 565 zcrypt_check_card(struct ap_perms *perms, int card) zcrypt_check_card() argument 570 zcrypt_check_queue(struct ap_perms *perms, int queue) zcrypt_check_queue() argument 637 zcrypt_rsa_modexpo(struct ap_perms *perms, struct zcrypt_track *tr, struct ica_rsa_modexpo *mex) zcrypt_rsa_modexpo() argument 742 zcrypt_rsa_crt(struct ap_perms *perms, struct zcrypt_track *tr, struct ica_rsa_modexpo_crt *crt) zcrypt_rsa_crt() argument 847 _zcrypt_send_cprb(bool userspace, struct ap_perms *perms, struct zcrypt_track *tr, struct ica_xcRB *xcrb) _zcrypt_send_cprb() argument 1004 _zcrypt_send_ep11_cprb(bool userspace, struct ap_perms *perms, struct zcrypt_track *tr, struct ep11_urb *xcrb) _zcrypt_send_ep11_cprb() argument 1421 icarsamodexpo_ioctl(struct ap_perms *perms, unsigned long arg) icarsamodexpo_ioctl() argument 1453 icarsacrt_ioctl(struct ap_perms *perms, unsigned long arg) icarsacrt_ioctl() argument 1485 zsecsendcprb_ioctl(struct ap_perms *perms, unsigned long arg) zsecsendcprb_ioctl() argument 1518 zsendep11cprb_ioctl(struct ap_perms *perms, unsigned long arg) zsendep11cprb_ioctl() argument 1554 struct ap_perms *perms = zcrypt_unlocked_ioctl() local 1691 trans_modexpo32(struct ap_perms *perms, struct file *filp, unsigned int cmd, unsigned long arg) trans_modexpo32() argument 1741 trans_modexpo_crt32(struct ap_perms *perms, struct file *filp, unsigned int cmd, unsigned long arg) trans_modexpo_crt32() argument 1802 trans_xcrb32(struct ap_perms *perms, struct file *filp, unsigned int cmd, unsigned long arg) trans_xcrb32() argument 1860 struct ap_perms *perms = zcrypt_compat_ioctl() local [all...] |
/kernel/linux/linux-5.10/security/apparmor/include/ |
H A D | file.h | 18 #include "perms.h" 39 * @perms: the permission the file was opened with 111 /* FIXME: split perms from dfa and match this to description 159 int aa_audit_file(struct aa_profile *profile, struct aa_perms *perms, 167 * @perms: permission table indexed by the matched state accept entry of @dfa 172 * an index into @perms. If a named exec transition is required it is 178 /* struct perms perms; */ 187 struct aa_perms *perms); 191 int flags, struct aa_perms *perms); 219 u32 perms = 0; aa_map_file_to_perms() local [all...] |
/kernel/linux/linux-6.6/arch/arm/mm/ |
H A D | init.c | 394 static void set_section_perms(struct section_perm *perms, int n, bool set, in set_section_perms() argument 404 if (!IS_ALIGNED(perms[i].start, SECTION_SIZE) || in set_section_perms() 405 !IS_ALIGNED(perms[i].end, SECTION_SIZE)) { in set_section_perms() 407 perms[i].name, perms[i].start, perms[i].end, in set_section_perms() 412 for (addr = perms[i].start; in set_section_perms() 413 addr < perms[i].end; in set_section_perms() 415 section_update(addr, perms[i].mask, in set_section_perms() 416 set ? perms[ in set_section_perms() 426 update_sections_early(struct section_perm perms[], int n) update_sections_early() argument [all...] |
/kernel/linux/linux-6.6/include/linux/ |
H A D | kernel.h | 438 #define VERIFY_OCTAL_PERMISSIONS(perms) \ 439 (BUILD_BUG_ON_ZERO((perms) < 0) + \ 440 BUILD_BUG_ON_ZERO((perms) > 0777) + \ 442 BUILD_BUG_ON_ZERO((((perms) >> 6) & 4) < (((perms) >> 3) & 4)) + \ 443 BUILD_BUG_ON_ZERO((((perms) >> 3) & 4) < ((perms) & 4)) + \ 445 BUILD_BUG_ON_ZERO((((perms) >> 6) & 2) < (((perms) >> 3) & 2)) + \ 447 BUILD_BUG_ON_ZERO((perms) [all...] |
/third_party/skia/third_party/externals/swiftshader/third_party/llvm-subzero/include/llvm/Support/ |
H A D | FileSystem.h | 75 enum perms { enum 99 // Helper functions so that you can use & and | to manipulate perms bits: 100 inline perms operator|(perms l, perms r) { in operator |() 101 return static_cast<perms>(static_cast<unsigned short>(l) | in operator |() 104 inline perms operator&(perms l, perms r) { in operator &() 105 return static_cast<perms>(static_cas in operator &() [all...] |
/kernel/linux/linux-5.10/drivers/s390/crypto/ |
H A D | zcrypt_api.c | 129 struct ap_perms perms; member 175 for (i = 0; i < sizeof(zcdndev->perms.ioctlm) / sizeof(long); i++) in ioctlmask_show() 178 "%016lx", zcdndev->perms.ioctlm[i]); in ioctlmask_show() 195 rc = ap_parse_mask_str(buf, zcdndev->perms.ioctlm, in ioctlmask_store() 217 for (i = 0; i < sizeof(zcdndev->perms.apm) / sizeof(long); i++) in apmask_show() 220 "%016lx", zcdndev->perms.apm[i]); in apmask_show() 237 rc = ap_parse_mask_str(buf, zcdndev->perms.apm, in apmask_store() 259 for (i = 0; i < sizeof(zcdndev->perms.aqm) / sizeof(long); i++) in aqmask_show() 262 "%016lx", zcdndev->perms.aqm[i]); in aqmask_show() 279 rc = ap_parse_mask_str(buf, zcdndev->perms in aqmask_store() 496 struct ap_perms *perms = &ap_perms; zcrypt_open() local 543 zcrypt_check_ioctl(struct ap_perms *perms, unsigned int cmd) zcrypt_check_ioctl() argument 562 zcrypt_check_card(struct ap_perms *perms, int card) zcrypt_check_card() argument 567 zcrypt_check_queue(struct ap_perms *perms, int queue) zcrypt_check_queue() argument 634 zcrypt_rsa_modexpo(struct ap_perms *perms, struct zcrypt_track *tr, struct ica_rsa_modexpo *mex) zcrypt_rsa_modexpo() argument 742 zcrypt_rsa_crt(struct ap_perms *perms, struct zcrypt_track *tr, struct ica_rsa_modexpo_crt *crt) zcrypt_rsa_crt() argument 850 _zcrypt_send_cprb(bool userspace, struct ap_perms *perms, struct zcrypt_track *tr, struct ica_xcRB *xcRB) _zcrypt_send_cprb() argument 1011 _zcrypt_send_ep11_cprb(bool userspace, struct ap_perms *perms, struct zcrypt_track *tr, struct ep11_urb *xcrb) _zcrypt_send_ep11_cprb() argument 1406 icarsamodexpo_ioctl(struct ap_perms *perms, unsigned long arg) icarsamodexpo_ioctl() argument 1451 icarsacrt_ioctl(struct ap_perms *perms, unsigned long arg) icarsacrt_ioctl() argument 1496 zsecsendcprb_ioctl(struct ap_perms *perms, unsigned long arg) zsecsendcprb_ioctl() argument 1542 zsendep11cprb_ioctl(struct ap_perms *perms, unsigned long arg) zsendep11cprb_ioctl() argument 1591 struct ap_perms *perms = zcrypt_unlocked_ioctl() local 1726 trans_modexpo32(struct ap_perms *perms, struct file *filp, unsigned int cmd, unsigned long arg) trans_modexpo32() argument 1776 trans_modexpo_crt32(struct ap_perms *perms, struct file *filp, unsigned int cmd, unsigned long arg) trans_modexpo_crt32() argument 1837 trans_xcRB32(struct ap_perms *perms, struct file *filp, unsigned int cmd, unsigned long arg) trans_xcRB32() argument 1895 struct ap_perms *perms = zcrypt_compat_ioctl() local [all...] |
/third_party/skia/third_party/externals/swiftshader/third_party/llvm-10.0/llvm/include/llvm/Support/ |
H A D | FileSystem.h | 86 enum perms { enum 111 // Helper functions so that you can use & and | to manipulate perms bits: 112 inline perms operator|(perms l, perms r) { in operator |() 113 return static_cast<perms>(static_cast<unsigned short>(l) | in operator |() 116 inline perms operator&(perms l, perms r) { in operator &() 117 return static_cast<perms>(static_cas in operator &() [all...] |
/third_party/ltp/testcases/cve/ |
H A D | cve-2016-10044.c | 33 char perms[8], line[BUFSIZ]; in run() local 47 if (sscanf(line, "%*x-%*x %s", perms) != 1) in run() 49 if (strchr(perms, (int)'x')) in run() 50 tst_res(TFAIL, "AIO mapping is executable: %s!", perms); in run() 52 tst_res(TPASS, "AIO mapping is not executable: %s", perms); in run()
|
/third_party/ntfs-3g/libntfs-3g/ |
H A D | acls.c | 969 int perms; in ntfs_valid_posix() local 1009 perms = pacl->ace[i].perms; in ntfs_valid_posix() 1013 if (perms & ~7) ok = FALSE; in ntfs_valid_posix() 1026 pchk->mode |= perms << 6; in ntfs_valid_posix() 1033 pchk->mode = (pchk->mode & 07707) | (perms << 3); in ntfs_valid_posix() 1040 pchk->mode |= perms; in ntfs_valid_posix() 1050 pchk->mode = (pchk->mode & 07707) | (perms << 3); in ntfs_valid_posix() 1098 mode |= (pace->perms & 7) << 6; in posix_header() 1102 mode = (mode & 07707) | ((pace->perms in posix_header() 1614 u16 perms; build_user_denials() local 1775 u16 perms; build_user_grants() local 1858 u16 perms; build_group_denials_grant() local 2113 u16 perms; buildacls_posix() local 3049 mode_t perms; norm_std_permissions_posix() local 3372 mode_t perms; norm_ownadmin_permissions_posix() local [all...] |
/kernel/linux/linux-5.10/scripts/selinux/genheaders/ |
H A D | genheaders.c | 15 const char *perms[sizeof(unsigned) * 8 + 1]; member 65 for (j = 0; map->perms[j]; j++) in main() 66 map->perms[j] = stoupperx(map->perms[j]); in main() 128 for (j = 0; map->perms[j]; j++) { in main() 131 map->name, map->perms[j]); in main() 135 39-len, map->perms[j], 1U<<j); in main()
|