Home
last modified time | relevance | path

Searched refs:permissions (Results 1 – 25 of 28) sorted by relevance

12

/xen-4.10.0-shim-comet/docs/man/
A Dxenstore-chmod.pod.13 xenstore-chmod - set the permissions of a Xenstore key
11 Sets the permissions of the Xenstore I<KEY>.
39 I<and> the permissions for any domain not explicitly listed in
41 write, and set permissions).
47 Apply the permissions to the key and all its I<children>.
55 Apply the permissions to the key and all its I<parents>.
A Dxenstore-ls.pod.111 List keys, values and permissions of one or more Xenstore I<PATH>s,
22 Show permissions of all the listed keys as comma separated list. The
49 I<and> the permissions for any domain not explicitly listed in
51 write, and set permissions).
A Dxenstore.pod.117 Sets the permissions of keys.
29 List keys, values and permissions.
/xen-4.10.0-shim-comet/tools/flask/policy/modules/
A Ddom0.te5 # While this could be written more briefly using wildcards, the permissions are
6 # listed out to make removing specific permissions simpler.
46 # These permissions allow using the FLASK security server to compute access
/xen-4.10.0-shim-comet/xen/xsm/flask/ss/
A Dconstraint.h56 u32 permissions; /* constrained permissions */ member
A Dpolicydb.h50 struct symtab permissions; /* common permissions */ member
58 struct symtab permissions; /* class-specific permission symbol table */ member
A Dpolicydb.c522 hashtab_map(comdatum->permissions.table, perm_destroy, NULL); in common_destroy()
523 hashtab_destroy(comdatum->permissions.table); in common_destroy()
536 hashtab_map(cladatum->permissions.table, perm_destroy, NULL); in class_destroy()
537 hashtab_destroy(cladatum->permissions.table); in class_destroy()
1014 rc = symtab_init(&comdatum->permissions, PERM_SYMTAB_SIZE); in common_read()
1017 comdatum->permissions.nprim = le32_to_cpu(buf[2]); in common_read()
1033 rc = perm_read(p, comdatum->permissions.table, fp); in common_read()
1076 c->permissions = le32_to_cpu(buf[0]); in read_cons_helper()
1177 rc = symtab_init(&cladatum->permissions, PERM_SYMTAB_SIZE); in class_read()
1180 cladatum->permissions.nprim = le32_to_cpu(buf[3]); in class_read()
[all …]
A Dservices.c301 u32 permissions, in security_dump_masked_av() argument
314 if ( !permissions ) in security_dump_masked_av()
323 hashtab_map(common_dat->permissions.table, in security_dump_masked_av()
327 if ( hashtab_map(tclass_dat->permissions.table, in security_dump_masked_av()
348 if ( (mask & permissions) == 0 ) in security_dump_masked_av()
523 if ( (constraint->permissions & (avd->allowed) ) && in context_struct_compute_av()
526 avd->allowed &= ~(constraint->permissions); in context_struct_compute_av()
1211 perms = &cladatum->permissions; in validate_classes()
/xen-4.10.0-shim-comet/docs/misc/
A Dxenstore.txt6 watch for changes, and set permissions to allow or deny access. There
132 ---------- Database read, write and permissions operations ----------
163 `Permissions' for details of the permissions system.
171 contents change or permissions change) this generates an event
193 Watches are supposed to be restricted by the permissions
199 parent. A notification may omitted if a node's permissions
304 permissions granted to <tdomid> on all other paths. This
A Dxsm-flask.txt188 necessary number of permissions and complicates the XSM hooks. Instead, this is
/xen-4.10.0-shim-comet/tools/flask/policy/policy/
A Dmls81 # and permissions for which MLS enforcement is desired.
/xen-4.10.0-shim-comet/xen/xsm/flask/policy/
A Daccess_vectors80 # This is a continuation of class xen, since only 32 permissions can be
133 # see also the domain2 relabel{from,to,self} permissions
190 # This is a continuation of class domain, since only 32 permissions can be
414 # The {add,remove}_{irq,ioport,iomem,device} permissions use:
/xen-4.10.0-shim-comet/tools/ocaml/xenstored/
A Doxenstored.conf.in36 # the xenstore tree and permissions, together with the content of the
A Dperms.ml42 (* node permissions *)
A Dstore.ml78 (* check if the current node can be accessed by the current connection with rperm permissions *)
/xen-4.10.0-shim-comet/docs/process/
A Dxen-release-management.pandoc235 1. A JIRA (xenproject.atlassian.net) is created and proper permissions granted.
/xen-4.10.0-shim-comet/tools/xenmon/
A DCOPYING121 this License, whose permissions for other licensees extend to the
/xen-4.10.0-shim-comet/xen/
A DCOPYING148 this License, whose permissions for other licensees extend to the
/xen-4.10.0-shim-comet/
A DCOPYING196 this License, whose permissions for other licensees extend to the
/xen-4.10.0-shim-comet/tools/libacpi/
A DCOPYING207 this License, whose permissions for other licensees extend to the
/xen-4.10.0-shim-comet/tools/libxc/
A DCOPYING206 this License, whose permissions for other licensees extend to the
/xen-4.10.0-shim-comet/xen/common/libelf/
A DCOPYING206 this License, whose permissions for other licensees extend to the
/xen-4.10.0-shim-comet/tools/xenstore/
A DCOPYING204 this License, whose permissions for other licensees extend to the
/xen-4.10.0-shim-comet/tools/ocaml/
A DLICENSE89 … distribution of the whole must be on the terms of this License, whose permissions for other licen…
/xen-4.10.0-shim-comet/tools/firmware/vgabios/
A DCOPYING197 this License, whose permissions for other licensees extend to the

Completed in 46 milliseconds

12