Lines Matching full:permissions
41 * new program. This hook may also optionally check permissions
54 * hook may also optionally check permissions (e.g. for transitions
152 * Mount this @sb if allowed by permissions.
283 * Check permissions to create a new directory in the existing directory
291 * Check permissions to create a new directory in the existing directory
311 * Check permissions when creating a special file (or a socket or a fifo
321 * Check permissions when creating a file. Note that this hook is called
361 * Check permissions before setting a watch on events as defined by @mask,
491 * Check file permissions before accessing an open file. This hook is
494 * operations, e.g. to revalidate permissions on use to support privilege
499 * Caveat: Although this hook can be used to revalidate permissions for
501 * address the revalidation of permissions for memory-mapped files.
505 * @mask contains the requested permissions.
526 * Check permissions for a mmap operation at @addr.
530 * Check permissions for a mmap operation. The @file may be NULL, e.g.
542 * Check permissions before changing memory access permissions.
798 * Check permissions before establishing a Unix domain stream connection
805 * Check permissions before connecting or sending datagrams from @sock to
814 * space is mediated by the typical file permissions (and caught by the mknod
824 * Check permissions prior to creating a new socket.
845 * Check permissions before creating a fresh pair of sockets.
900 * Check permissions before retrieving the options associated with socket
907 * Check permissions before setting the options associated with socket
921 * Check permissions on incoming network packets. This hook is distinct
989 * Check permissions prior to creating a new TUN device.
991 * Check permissions prior to attaching to a TUN device queue.
1012 * Validiate permissions required for each address associated with sock
1038 * Check permissions to send and receive SMPs on a end port.
1138 * @perm describes the combination of permissions required of this key.
1155 * Check permissions for access to IPC
1183 * @perm contains the IPC permissions of the message queue.
1187 * @perm contains the IPC permissions of the message queue.
1193 * @perm contains the IPC permissions of the message queue.
1198 * is to be performed on the message queue with permissions @perm.
1200 * @perm contains the IPC permissions of the msg queue. May be NULL.
1205 * queue with permissions @perm.
1206 * @perm contains the IPC permissions of the message queue.
1215 * @perm contains the IPC permissions of the message queue.
1228 * @perm contains the IPC permissions of the shared memory structure.
1232 * @perm contains the IPC permissions of the shared memory structure.
1238 * @perm contains the IPC permissions of the shared memory structure.
1243 * @cmd is to be performed on the shared memory region with permissions @perm.
1245 * @perm contains the IPC permissions of the shared memory structure.
1249 * Check permissions prior to allowing the shmat system call to attach the
1250 * shared memory segment with permissions @perm to the data segment of the
1252 * @perm contains the IPC permissions of the shared memory structure.
1263 * @perm contains the IPC permissions of the semaphore.
1267 * @perm contains the IPC permissions of the semaphore.
1273 * @perm contains the IPC permissions of the semaphore.
1280 * @perm contains the IPC permissions of the semaphore. May be NULL.
1284 * Check permissions before performing operations on members of the
1287 * @perm contains the IPC permissions of the semaphore.
1374 * Check permissions for allocating a new virtual mapping.