Lines Matching full:permissions
41 * new program. This hook may also optionally check permissions
54 * hook may also optionally check permissions (e.g. for transitions
152 * Mount this @sb if allowed by permissions.
292 * Check permissions to create a new directory in the existing directory
300 * Check permissions to create a new directory in the existing directory
320 * Check permissions when creating a special file (or a socket or a fifo
330 * Check permissions when creating a file. Note that this hook is called
370 * Check permissions before setting a watch on events as defined by @mask,
500 * Check file permissions before accessing an open file. This hook is
503 * operations, e.g. to revalidate permissions on use to support privilege
508 * Caveat: Although this hook can be used to revalidate permissions for
510 * address the revalidation of permissions for memory-mapped files.
514 * @mask contains the requested permissions.
535 * Check permissions for a mmap operation at @addr.
539 * Check permissions for a mmap operation. The @file may be NULL, e.g.
547 * Check permissions before changing memory access permissions.
803 * Check permissions before establishing a Unix domain stream connection
810 * Check permissions before connecting or sending datagrams from @sock to
819 * space is mediated by the typical file permissions (and caught by the mknod
829 * Check permissions prior to creating a new socket.
850 * Check permissions before creating a fresh pair of sockets.
905 * Check permissions before retrieving the options associated with socket
912 * Check permissions before setting the options associated with socket
926 * Check permissions on incoming network packets. This hook is distinct
994 * Check permissions prior to creating a new TUN device.
996 * Check permissions prior to attaching to a TUN device queue.
1017 * Validiate permissions required for each address associated with sock
1043 * Check permissions to send and receive SMPs on a end port.
1143 * @perm describes the combination of permissions required of this key.
1160 * Check permissions for access to IPC
1188 * @perm contains the IPC permissions of the message queue.
1192 * @perm contains the IPC permissions of the message queue.
1198 * @perm contains the IPC permissions of the message queue.
1203 * is to be performed on the message queue with permissions @perm.
1205 * @perm contains the IPC permissions of the msg queue. May be NULL.
1210 * queue with permissions @perm.
1211 * @perm contains the IPC permissions of the message queue.
1220 * @perm contains the IPC permissions of the message queue.
1233 * @perm contains the IPC permissions of the shared memory structure.
1237 * @perm contains the IPC permissions of the shared memory structure.
1243 * @perm contains the IPC permissions of the shared memory structure.
1248 * @cmd is to be performed on the shared memory region with permissions @perm.
1250 * @perm contains the IPC permissions of the shared memory structure.
1254 * Check permissions prior to allowing the shmat system call to attach the
1255 * shared memory segment with permissions @perm to the data segment of the
1257 * @perm contains the IPC permissions of the shared memory structure.
1268 * @perm contains the IPC permissions of the semaphore.
1272 * @perm contains the IPC permissions of the semaphore.
1278 * @perm contains the IPC permissions of the semaphore.
1285 * @perm contains the IPC permissions of the semaphore. May be NULL.
1289 * Check permissions before performing operations on members of the
1292 * @perm contains the IPC permissions of the semaphore.
1379 * Check permissions for allocating a new virtual mapping.