Lines Matching full:allowed

232 /* Is an LSM allowed to be initialized? */
239 /* Not allowed if another exclusive LSM already initialized. */ in lsm_allowed()
1030 * Check whether @mgr is allowed to be the binder context manager.
1040 * security_binder_transaction() - Check if a binder transaction is allowed
1044 * Check whether @from is allowed to invoke a binder transaction call to @to.
1055 * security_binder_transfer_binder() - Check if a binder transfer is allowed
1059 * Check whether @from is allowed to transfer a binder reference to @to.
1070 * security_binder_transfer_file() - Check if a binder file xfer is allowed
1075 * Check whether @from is allowed to transfer @file to @to.
1086 * security_ptrace_access_check() - Check if tracing is allowed
1105 * security_ptrace_traceme() - Check if tracing is allowed
1128 * if the current process is allowed to see the capability sets of the @target
1185 * security_quotactl() - Check if a quotactl() syscall is allowed for this fs
1191 * Check whether the quotactl syscall is allowed for this @sb.
1201 * security_quota_on() - Check if QUOTAON is allowed for a dentry
1204 * Check whether QUOTAON is allowed for @dentry.
1214 * security_syslog() - Check if accessing the kernel message ring is allowed
1229 * security_settime64() - Check if changing the system time is allowed
1244 * security_vm_enough_memory_mm() - Check if allocating a new mem map is allowed
1515 * security_sb_mnt_opts_compat() - Check if new mount options are allowed
1519 * Determine if the new mount options in @mnt_opts are allowed given the
1549 * security_sb_kern_mount() - Check if a kernel mount is allowed
1552 * Mount this @sb if allowed by permissions.
1576 * security_sb_statfs() - Check if accessing fs stats is allowed
1707 * security_path_notify() - Check if setting a watch is allowed
1922 * security_path_mknod() - Check if creating a special file is allowed
1957 * security_path_mkdir() - Check if creating a new directory is allowed
1976 * security_path_rmdir() - Check if removing a directory is allowed
1992 * security_path_unlink() - Check if removing a hard link is allowed
2009 * security_path_symlink() - Check if creating a symbolic link is allowed
2027 * security_path_link - Check if creating a hard link is allowed
2045 * security_path_rename() - Check if renaming a file is allowed
2071 * security_path_truncate() - Check if truncating a file is allowed
2088 * security_path_chmod() - Check if changing the file's mode is allowed
2106 * security_path_chown() - Check if changing the file's owner/group is allowed
2123 * security_path_chroot() - Check if changing the root directory is allowed
2137 * security_inode_create() - Check if creating a file is allowed
2171 * security_inode_link() - Check if creating a hard link is allowed
2189 * security_inode_unlink() - Check if removing a hard link is allowed
2205 * security_inode_symlink() - Check if creating a symbolic link is allowed
2223 * security_inode_mkdir() - Check if creating a new directory is allowed
2242 * security_inode_rmdir() - Check if removing a directory is allowed
2258 * security_inode_mknod() - Check if creating a special file is allowed
2280 * security_inode_rename() - Check if renaming a file is allowed
2312 * security_inode_readlink() - Check if reading a symbolic link is allowed
2327 * security_inode_follow_link() - Check if following a symbolic link is allowed
2346 * security_inode_permission() - Check if accessing an inode is allowed
2367 * security_inode_setattr() - Check if setting file attributes is allowed
2405 * security_inode_getattr() - Check if getting file attributes is allowed
2420 * security_inode_setxattr() - Check if setting file xattrs is allowed
2466 * security_inode_set_acl() - Check if setting posix acls is allowed
2504 * security_inode_get_acl() - Check if reading posix acls is allowed
2523 * security_inode_remove_acl() - Check if removing a posix acl is allowed
2577 * security_inode_getxattr() - Check if xattr access is allowed
2594 * security_inode_listxattr() - Check if listing xattrs is allowed
2610 * security_inode_removexattr() - Check if removing an xattr is allowed
2665 * security_inode_file_setattr() - check if setting fsxattr is allowed
2680 * security_inode_file_getattr() - check if retrieving fsxattr is allowed
2968 * security_file_ioctl() - Check if an ioctl is allowed
2987 * security_file_ioctl_compat() - Check if an ioctl is allowed in compat mode
3038 * security_mmap_file() - Check if mmap'ing a file is allowed
3056 * security_mmap_addr() - Check if mmap'ing an address is allowed
3069 * security_file_mprotect() - Check if changing memory protections is allowed
3085 * security_file_lock() - Check if a file lock is allowed
3100 * security_file_fcntl() - Check if fcntl() op is allowed
3135 * security_file_send_sigiotask() - Check if sending SIGIO/SIGURG is allowed
3155 * security_file_receive() - Check if receiving a file via IPC is allowed
3204 * security_file_truncate() - Check if truncating a file is allowed
3395 * security_kernel_module_request() - Check if loading a module is allowed
3540 * security_task_setpgid() - Check if setting the pgid is allowed
3555 * security_task_getpgid() - Check if getting the pgid is allowed
3569 * security_task_getsid() - Check if getting the session id is allowed
3611 * security_task_setnice() - Check if setting a task's nice value is allowed
3625 * security_task_setioprio() - Check if setting a task's ioprio is allowed
3639 * security_task_getioprio() - Check if getting a task's ioprio is allowed
3652 * security_task_prlimit() - Check if get/setting resources limits is allowed
3669 * security_task_setrlimit() - Check if setting a new rlimit value is allowed
3687 * security_task_setscheduler() - Check if setting sched policy/param is allowed
3701 * security_task_getscheduler() - Check if getting scheduling info is allowed
3714 * security_task_movememory() - Check if moving memory is allowed
3727 * security_task_kill() - Check if sending a signal is allowed
3748 * security_task_prctl() - Check if a prctl op is allowed
3793 * security_create_user_ns() - Check if creating a new userns is allowed
3806 * security_ipc_permission() - Check if sysv ipc access is allowed
3902 * security_msg_queue_associate() - Check if a msg queue operation is allowed
3918 * security_msg_queue_msgctl() - Check if a msg queue operation is allowed
3933 * security_msg_queue_msgsnd() - Check if sending a sysv ipc message is allowed
3950 * security_msg_queue_msgrcv() - Check if receiving a sysv ipc msg is allowed
4005 * security_shm_associate() - Check if a sysv shm operation is allowed
4022 * security_shm_shmctl() - Check if a sysv shm operation is allowed
4037 * security_shm_shmat() - Check if a sysv shm attach operation is allowed
4089 * security_sem_associate() - Check if a sysv semaphore operation is allowed
4105 * security_sem_semctl() - Check if a sysv semaphore operation is allowed
4120 * security_sem_semop() - Check if a sysv semaphore operation is allowed
4142 * Fill in @inode security information for a @dentry if allowed.
4307 * Read attribute @name for task @p and store it into @value if allowed.
4332 * allowed.
4536 * security_watch_key() - Check if a task is allowed to watch for key events
4539 * Check to see if a process is allowed to watch for event notifications from
4552 * security_netlink_send() - Save info and check if netlink sending is allowed
4562 * allowed to be transmitted.
4570 * security_unix_stream_connect() - Check if a AF_UNIX stream is allowed
4624 * security_socket_create() - Check if creating a new socket is allowed
4665 * security_socket_socketpair() - Check if creating a socketpair is allowed
4681 * security_socket_bind() - Check if a socket bind operation is allowed
4699 * security_socket_connect() - Check if a socket connect operation is allowed
4716 * security_socket_listen() - Check if a socket is allowed to listen
4730 * security_socket_accept() - Check if a socket is allowed to accept connections
4746 * security_socket_sendmsg() - Check if sending a message is allowed
4761 * security_socket_recvmsg() - Check if receiving a message is allowed
4778 * security_socket_getsockname() - Check if reading the socket addr is allowed
4792 * security_socket_getpeername() - Check if reading the peer's addr is allowed
4805 * security_socket_getsockopt() - Check if reading a socket option is allowed
4821 * security_socket_setsockopt() - Check if setting a socket option is allowed
4836 * security_socket_shutdown() - Checks if shutting down the socket is allowed
4851 * security_sock_rcv_skb() - Check if an incoming network packet is allowed
5060 * security_secmark_relabel_packet() - Check if setting a secmark is allowed
5063 * Check if the process should be allowed to relabel packets to @secid.
5134 * security_tun_dev_create() - Check if creating a TUN device is allowed
5147 * security_tun_dev_attach_queue() - Check if attaching a TUN queue is allowed
5283 * security_ib_pkey_access() - Check if access to an IB pkey is allowed
5299 * security_ib_endport_manage_subnet() - Check if SMPs traffic is allowed
5402 * security_xfrm_policy_delete() - Check if deleting a xfrm policy is allowed
5451 * security_xfrm_state_delete() - Check if deleting a xfrm state is allowed
5476 * security_xfrm_policy_lookup() - Check if using a xfrm policy is allowed
5587 * security_key_permission() - Check if a kernel key operation is allowed
5709 * security_bpf() - Check if the bpf syscall operation is allowed
5727 * security_bpf_map() - Check if access to a bpf map is allowed
5742 * security_bpf_prog() - Check if access to a bpf program is allowed
5756 * security_bpf_map_create() - Check if BPF map creation is allowed
5783 * security_bpf_prog_load() - Check if loading of BPF program is allowed
5811 * security_bpf_token_create() - Check if creating of BPF token is allowed
5837 * security_bpf_token_cmd() - Check if BPF token is allowed to delegate
5853 * security_bpf_token_capable() - Check if BPF token is allowed to delegate
5909 * security_locked_down() - Check if a kernel feature is allowed
6004 * security_perf_event_open() - Check if a perf event open is allowed
6007 * Check whether the @type of perf_event_open syscall is allowed.
6054 * security_perf_event_read() - Check if reading a perf event label is allowed
6057 * Read perf_event security info if allowed.
6067 * security_perf_event_write() - Check if writing a perf event label is allowed
6070 * Write perf_event security info if allowed.
6082 * security_uring_override_creds() - Check if overriding creds is allowed
6085 * Check if the current task, executing an io_uring operation, is allowed to
6096 * security_uring_sqpoll() - Check if IORING_SETUP_SQPOLL is allowed
6098 * Check whether the current task is allowed to spawn a io_uring polling thread
6109 * security_uring_cmd() - Check if a io_uring passthrough command is allowed
6112 * Check whether the file_operations uring_cmd is allowed to run.
6122 * security_uring_allowed() - Check if io_uring_setup() is allowed
6124 * Check whether the current task is allowed to call io_uring_setup().