• Home
  • Raw
  • Download

Lines Matching full:permission

46  *	Return 0 if the hook is successful and permission is granted.
61 * Return 0 if the hook is successful and permission is granted.
69 * Return 0 if the hook is successful and permission is granted.
119 * Check permission before obtaining filesystem statistics for the @mnt
122 * Return 0 if permission is granted.
124 * Check permission before an object specified by @dev_name is mounted on
135 * Return 0 if permission is granted.
150 * Return 0 if permission is granted.
156 * Check permission before the @mnt file system is unmounted.
159 * Return 0 if permission is granted.
161 * Check permission before pivoting the root filesystem.
165 * Return 0 if permission is granted.
181 * Check permission before a mount is moved.
237 * Check permission to create a regular file.
241 * Return 0 if permission is granted.
243 * Check permission before creating a new hard link to a file.
249 * Return 0 if permission is granted.
251 * Check permission before creating a new hard link to a file.
257 * Return 0 if permission is granted.
259 * Check the permission to remove a hard link to a file.
262 * Return 0 if permission is granted.
264 * Check the permission to remove a hard link to a file.
267 * Return 0 if permission is granted.
269 * Check the permission to create a symbolic link to a file.
274 * Return 0 if permission is granted.
276 * Check the permission to create a symbolic link to a file.
281 * Return 0 if permission is granted.
289 * Return 0 if permission is granted.
297 * Return 0 if permission is granted.
299 * Check the permission to remove a directory.
303 * Return 0 if permission is granted.
305 * Check the permission to remove a directory.
309 * Return 0 if permission is granted.
319 * Return 0 if permission is granted.
328 * Return 0 if permission is granted.
330 * Check for permission to rename a file or directory.
335 * Return 0 if permission is granted.
337 * Check for permission to rename a file or directory.
342 * Return 0 if permission is granted.
344 * Check for permission to change a mode of the file @path. The new
347 * @mode contains the new DAC's permission, which is a bitmask of
349 * Return 0 if permission is granted.
351 * Check for permission to change owner/group of a file or directory.
355 * Return 0 if permission is granted.
357 * Check for permission to change root directory.
359 * Return 0 if permission is granted.
364 * Check the permission to read the symbolic link.
366 * Return 0 if permission is granted.
368 * Check permission to follow a symbolic link when looking up a pathname.
372 * Return 0 if permission is granted.
374 * Check permission before accessing an inode. This hook is called by the
375 * existing Linux permission function, so a security module can use it to
376 * provide additional checking for existing Linux permission checks.
378 * other operations), whereas the file_security_ops permission hook is
381 * @mask contains the permission mask.
382 * Return 0 if permission is granted.
384 * Check permission before setting file attributes. Note that the kernel
390 * Return 0 if permission is granted.
392 * Check permission before truncating a file.
394 * Return 0 if permission is granted.
396 * Check permission before obtaining file attributes.
398 * Return 0 if permission is granted.
400 * Check permission before setting the extended attributes
402 * Return 0 if permission is granted.
407 * Check permission before obtaining the extended attributes
409 * Return 0 if permission is granted.
411 * Check permission before obtaining the list of extended attribute
413 * Return 0 if permission is granted.
415 * Check permission before removing the extended attribute
417 * Return 0 if permission is granted.
506 * Return 0 if permission is granted.
512 * Return 0 if the hook is successful and permission is granted.
520 * Check permission for an ioctl operation on @file. Note that @arg
524 * Return 0 if permission is granted.
528 * Return 0 if permission is granted.
536 * Return 0 if permission is granted.
538 * Check permission for a mmap operation. The @file may be NULL, e,g.
546 * Return 0 if permission is granted.
548 * Check permission before performing file locking operations.
553 * Return 0 if permission is granted.
555 * Check permission before allowing the file operation specified by @cmd
563 * Return 0 if permission is granted.
570 * Check permission for the file owner @fown to send SIGIO or SIGURG to the
578 * Return 0 if permission is granted.
583 * Return 0 if permission is granted.
585 * Save open-time permission checking state for later use upon
643 * Return 0 if permission is granted.
650 * Return 0 if permission is granted.
659 * Return 0 if permission is granted.
669 * Return 0 if permission is granted.
689 * Check permission before setting the process group identifier of the
693 * Return 0 if permission is granted.
695 * Check permission before getting the process group identifier of the
698 * Return 0 if permission is granted.
700 * Check permission before getting the session identifier of the process
703 * Return 0 if permission is granted.
710 * Check permission before setting the nice value of @p to @nice.
713 * Return 0 if permission is granted.
715 * Check permission before setting the ioprio value of @p to @ioprio.
718 * Return 0 if permission is granted.
720 * Check permission before getting the ioprio value of @p.
722 * Return 0 if permission is granted.
724 * Check permission before getting and/or setting the resource limits of
730 * Return 0 if permission is granted.
732 * Check permission before setting the resource limits of process @p
738 * Return 0 if permission is granted.
740 * Check permission before setting scheduling policy and/or parameters of
743 * Return 0 if permission is granted.
745 * Check permission before obtaining scheduling information for process
748 * Return 0 if permission is granted.
750 * Check permission before moving memory owned by process @p.
752 * Return 0 if permission is granted.
754 * Check permission before sending signal @sig to @p. @info can be NULL,
765 * Return 0 if permission is granted.
767 * Check permission before performing a process control operation on the
785 * Save security information for a netlink message so that permission
803 * Return 0 if permission is granted.
809 * Return 0 if permission is granted.
815 * and permission hooks in inode_security_ops), binding and connecting to
829 * Return 0 if permission is granted.
848 * Return 0 if permission is granted and the connection was established.
850 * Check permission before socket protocol layer bind operation is
856 * Return 0 if permission is granted.
858 * Check permission before socket protocol layer connect operation
863 * Return 0 if permission is granted.
865 * Check permission before socket protocol layer listen operation.
868 * Return 0 if permission is granted.
870 * Check permission before accepting a new connection. Note that the new
875 * Return 0 if permission is granted.
877 * Check permission before transmitting a message to another socket.
881 * Return 0 if permission is granted.
883 * Check permission before receiving a message from a socket.
888 * Return 0 if permission is granted.
890 * Check permission before the local address (name) of the socket object
893 * Return 0 if permission is granted.
895 * Check permission before the remote address (name) of a socket object
898 * Return 0 if permission is granted.
905 * Return 0 if permission is granted.
912 * Return 0 if permission is granted.
914 * Checks permission before all or part of a connection on the socket
919 * Return 0 if permission is granted.
1033 * Check permission to access a pkey when modifing a QP.
1104 * Check permission when a flow selects a xfrm_policy for processing
1107 * Return 0 if permission is granted, -ESRCH otherwise, or -errno
1127 * Return 0 if permission is granted, -ve error otherwise.
1139 * Return 0 if permission is granted, -ve error otherwise.
1156 * @ipcp contains the kernel IPC permission structure
1157 * @flag contains the desired (requested) permission set
1158 * Return 0 if permission is granted.
1161 * @ipcp contains the kernel IPC permission structure.
1172 * Return 0 if operation was successful and permission is granted.
1184 * Return 0 if operation was successful and permission is granted.
1189 * Check permission when a message queue is requested through the
1195 * Return 0 if permission is granted.
1197 * Check permission when a message control operation specified by @cmd
1202 * Return 0 if permission is granted.
1204 * Check permission before a message, @msg, is enqueued on the message
1209 * Return 0 if permission is granted.
1211 * Check permission before a message, @msg, is removed from the message
1220 * Return 0 if permission is granted.
1229 * Return 0 if operation was successful and permission is granted.
1234 * Check permission when a shared memory region is requested through the
1240 * Return 0 if permission is granted.
1242 * Check permission when a shared memory control operation specified by
1247 * Return 0 if permission is granted.
1255 * Return 0 if permission is granted.
1264 * Return 0 if operation was successful and permission is granted.
1269 * Check permission when a semaphore is requested through the semget
1275 * Return 0 if permission is granted.
1277 * Check permission when a semaphore operation specified by @cmd is to be
1282 * Return 0 if permission is granted.
1291 * Return 0 if permission is granted.
1296 * Return 0 if permission is granted.
1313 * Check permission before allowing the current process to trace the
1322 * Return 0 if permission is granted.
1324 * Check that the @parent process has sufficient permission to trace the
1328 * Return 0 if permission is granted.
1331 * the @target process. The hook may also perform permission checking to
1347 * Return 0 and update @new if permission is granted.
1361 * Check permission before accessing the kernel message ring or changing
1365 * Return 0 if permission is granted.
1367 * Check permission to change the system time.
1372 * Return 0 if permission is granted.
1377 * Return 0 if permission is granted.