/xen-4.10.0-shim-comet/docs/man/ |
A D | xenstore-chmod.pod.1 | 3 xenstore-chmod - set the permissions of a Xenstore key 11 Sets the permissions of the Xenstore I<KEY>. 39 I<and> the permissions for any domain not explicitly listed in 41 write, and set permissions). 47 Apply the permissions to the key and all its I<children>. 55 Apply the permissions to the key and all its I<parents>.
|
A D | xenstore-ls.pod.1 | 11 List keys, values and permissions of one or more Xenstore I<PATH>s, 22 Show permissions of all the listed keys as comma separated list. The 49 I<and> the permissions for any domain not explicitly listed in 51 write, and set permissions).
|
A D | xenstore.pod.1 | 17 Sets the permissions of keys. 29 List keys, values and permissions.
|
/xen-4.10.0-shim-comet/tools/flask/policy/modules/ |
A D | dom0.te | 5 # While this could be written more briefly using wildcards, the permissions are 6 # listed out to make removing specific permissions simpler. 46 # These permissions allow using the FLASK security server to compute access
|
/xen-4.10.0-shim-comet/xen/xsm/flask/ss/ |
A D | constraint.h | 56 u32 permissions; /* constrained permissions */ member
|
A D | policydb.h | 50 struct symtab permissions; /* common permissions */ member 58 struct symtab permissions; /* class-specific permission symbol table */ member
|
A D | policydb.c | 522 hashtab_map(comdatum->permissions.table, perm_destroy, NULL); in common_destroy() 523 hashtab_destroy(comdatum->permissions.table); in common_destroy() 536 hashtab_map(cladatum->permissions.table, perm_destroy, NULL); in class_destroy() 537 hashtab_destroy(cladatum->permissions.table); in class_destroy() 1014 rc = symtab_init(&comdatum->permissions, PERM_SYMTAB_SIZE); in common_read() 1017 comdatum->permissions.nprim = le32_to_cpu(buf[2]); in common_read() 1033 rc = perm_read(p, comdatum->permissions.table, fp); in common_read() 1076 c->permissions = le32_to_cpu(buf[0]); in read_cons_helper() 1177 rc = symtab_init(&cladatum->permissions, PERM_SYMTAB_SIZE); in class_read() 1180 cladatum->permissions.nprim = le32_to_cpu(buf[3]); in class_read() [all …]
|
A D | services.c | 301 u32 permissions, in security_dump_masked_av() argument 314 if ( !permissions ) in security_dump_masked_av() 323 hashtab_map(common_dat->permissions.table, in security_dump_masked_av() 327 if ( hashtab_map(tclass_dat->permissions.table, in security_dump_masked_av() 348 if ( (mask & permissions) == 0 ) in security_dump_masked_av() 523 if ( (constraint->permissions & (avd->allowed) ) && in context_struct_compute_av() 526 avd->allowed &= ~(constraint->permissions); in context_struct_compute_av() 1211 perms = &cladatum->permissions; in validate_classes()
|
/xen-4.10.0-shim-comet/docs/misc/ |
A D | xenstore.txt | 6 watch for changes, and set permissions to allow or deny access. There 132 ---------- Database read, write and permissions operations ---------- 163 `Permissions' for details of the permissions system. 171 contents change or permissions change) this generates an event 193 Watches are supposed to be restricted by the permissions 199 parent. A notification may omitted if a node's permissions 304 permissions granted to <tdomid> on all other paths. This
|
A D | xsm-flask.txt | 188 necessary number of permissions and complicates the XSM hooks. Instead, this is
|
/xen-4.10.0-shim-comet/tools/flask/policy/policy/ |
A D | mls | 81 # and permissions for which MLS enforcement is desired.
|
/xen-4.10.0-shim-comet/xen/xsm/flask/policy/ |
A D | access_vectors | 80 # This is a continuation of class xen, since only 32 permissions can be 133 # see also the domain2 relabel{from,to,self} permissions 190 # This is a continuation of class domain, since only 32 permissions can be 414 # The {add,remove}_{irq,ioport,iomem,device} permissions use:
|
/xen-4.10.0-shim-comet/tools/ocaml/xenstored/ |
A D | oxenstored.conf.in | 36 # the xenstore tree and permissions, together with the content of the
|
A D | perms.ml | 42 (* node permissions *)
|
A D | store.ml | 78 (* check if the current node can be accessed by the current connection with rperm permissions *)
|
/xen-4.10.0-shim-comet/docs/process/ |
A D | xen-release-management.pandoc | 235 1. A JIRA (xenproject.atlassian.net) is created and proper permissions granted.
|
/xen-4.10.0-shim-comet/tools/xenmon/ |
A D | COPYING | 121 this License, whose permissions for other licensees extend to the
|
/xen-4.10.0-shim-comet/xen/ |
A D | COPYING | 148 this License, whose permissions for other licensees extend to the
|
/xen-4.10.0-shim-comet/ |
A D | COPYING | 196 this License, whose permissions for other licensees extend to the
|
/xen-4.10.0-shim-comet/tools/libacpi/ |
A D | COPYING | 207 this License, whose permissions for other licensees extend to the
|
/xen-4.10.0-shim-comet/tools/libxc/ |
A D | COPYING | 206 this License, whose permissions for other licensees extend to the
|
/xen-4.10.0-shim-comet/xen/common/libelf/ |
A D | COPYING | 206 this License, whose permissions for other licensees extend to the
|
/xen-4.10.0-shim-comet/tools/xenstore/ |
A D | COPYING | 204 this License, whose permissions for other licensees extend to the
|
/xen-4.10.0-shim-comet/tools/ocaml/ |
A D | LICENSE | 89 … distribution of the whole must be on the terms of this License, whose permissions for other licen…
|
/xen-4.10.0-shim-comet/tools/firmware/vgabios/ |
A D | COPYING | 197 this License, whose permissions for other licensees extend to the
|