| /linux/include/linux/ |
| H A D | moduleparam.h | 81 const u16 perm; member 134 #define module_param(name, type, perm) \ argument 135 module_param_named(name, name, type, perm) 143 #define module_param_unsafe(name, type, perm) \ argument 144 module_param_named_unsafe(name, name, type, perm) 157 #define module_param_named(name, value, type, perm) \ argument 159 module_param_cb(name, ¶m_ops_##type, &value, perm); \ 169 #define module_param_named_unsafe(name, value, type, perm) \ argument 171 module_param_cb_unsafe(name, ¶m_ops_##type, &value, perm); \ 183 #define module_param_cb(name, ops, arg, perm) \ argument [all …]
|
| H A D | lsm_hook_defs.h | 268 LSM_HOOK(int, 0, msg_queue_alloc_security, struct kern_ipc_perm *perm) 270 struct kern_ipc_perm *perm) 271 LSM_HOOK(int, 0, msg_queue_associate, struct kern_ipc_perm *perm, int msqflg) 272 LSM_HOOK(int, 0, msg_queue_msgctl, struct kern_ipc_perm *perm, int cmd) 273 LSM_HOOK(int, 0, msg_queue_msgsnd, struct kern_ipc_perm *perm, 275 LSM_HOOK(int, 0, msg_queue_msgrcv, struct kern_ipc_perm *perm, 277 LSM_HOOK(int, 0, shm_alloc_security, struct kern_ipc_perm *perm) 278 LSM_HOOK(void, LSM_RET_VOID, shm_free_security, struct kern_ipc_perm *perm) 279 LSM_HOOK(int, 0, shm_associate, struct kern_ipc_perm *perm, int shmflg) 280 LSM_HOOK(int, 0, shm_shmctl, struct kern_ipc_perm *perm, int cmd) [all …]
|
| H A D | vhost_iotlb.h | 17 u32 perm; member 34 u64 addr, unsigned int perm, void *opaque); 36 u64 addr, unsigned int perm);
|
| H A D | vt_kern.h | 160 int perm); 161 int vt_do_kdsk_ioctl(int cmd, struct kbentry __user *user_kbe, int perm, 163 int vt_do_kdgkb_ioctl(int cmd, struct kbsentry __user *user_kdgkb, int perm); 164 int vt_do_kdskled(unsigned int console, int cmd, unsigned long arg, int perm);
|
| /linux/drivers/vfio/pci/ |
| H A D | vfio_pci_config.c | 113 struct perm_bits *perm, int offset, __le32 *val); 115 struct perm_bits *perm, int offset, __le32 val); 176 int count, struct perm_bits *perm, in vfio_default_config_read() argument 183 memcpy(&virt, perm->virt + offset, count); in vfio_default_config_read() 202 int count, struct perm_bits *perm, in vfio_default_config_write() argument 207 memcpy(&write, perm->write + offset, count); in vfio_default_config_write() 212 memcpy(&virt, perm->virt + offset, count); in vfio_default_config_write() 249 int count, struct perm_bits *perm, in vfio_direct_config_read() argument 274 int count, struct perm_bits *perm, in vfio_raw_config_write() argument 287 int count, struct perm_bits *perm, in vfio_raw_config_read() argument [all …]
|
| /linux/security/tomoyo/ |
| H A D | file.c | 258 if (acl->perm & (1 << r->param.path.operation)) { in tomoyo_check_path_acl() 281 return (acl->perm & (1 << r->param.path_number.operation)) && in tomoyo_check_path_number_acl() 302 return (acl->perm & (1 << r->param.path2.operation)) && in tomoyo_check_path2_acl() 322 return (acl->perm & (1 << r->param.mkdev.operation)) && in tomoyo_check_mkdev_acl() 364 ->perm; in tomoyo_merge_path_acl() 365 u16 perm = READ_ONCE(*a_perm); in tomoyo_merge_path_acl() local 366 const u16 b_perm = container_of(b, struct tomoyo_path_acl, head)->perm; in tomoyo_merge_path_acl() 369 perm &= ~b_perm; in tomoyo_merge_path_acl() 371 perm |= b_perm; in tomoyo_merge_path_acl() 372 WRITE_ONCE(*a_perm, perm); in tomoyo_merge_path_acl() [all …]
|
| H A D | network.c | 235 &container_of(a, struct tomoyo_inet_acl, head)->perm; in tomoyo_merge_inet_acl() 236 u8 perm = READ_ONCE(*a_perm); in tomoyo_merge_inet_acl() local 237 const u8 b_perm = container_of(b, struct tomoyo_inet_acl, head)->perm; in tomoyo_merge_inet_acl() 240 perm &= ~b_perm; in tomoyo_merge_inet_acl() 242 perm |= b_perm; in tomoyo_merge_inet_acl() 243 WRITE_ONCE(*a_perm, perm); in tomoyo_merge_inet_acl() 244 return !perm; in tomoyo_merge_inet_acl() 261 &container_of(a, struct tomoyo_unix_acl, head)->perm; in tomoyo_merge_unix_acl() 262 u8 perm = READ_ONCE(*a_perm); in tomoyo_merge_unix_acl() local 263 const u8 b_perm = container_of(b, struct tomoyo_unix_acl, head)->perm; in tomoyo_merge_unix_acl() [all …]
|
| H A D | util.c | 1058 u16 perm; in tomoyo_domain_quota_is_ok() local 1069 perm = data_race(container_of(ptr, struct tomoyo_path_acl, head)->perm); in tomoyo_domain_quota_is_ok() 1072 perm = data_race(container_of(ptr, struct tomoyo_path2_acl, head)->perm); in tomoyo_domain_quota_is_ok() 1075 perm = data_race(container_of(ptr, struct tomoyo_path_number_acl, head) in tomoyo_domain_quota_is_ok() 1076 ->perm); in tomoyo_domain_quota_is_ok() 1079 perm = data_race(container_of(ptr, struct tomoyo_mkdev_acl, head)->perm); in tomoyo_domain_quota_is_ok() 1082 perm = data_race(container_of(ptr, struct tomoyo_inet_acl, head)->perm); in tomoyo_domain_quota_is_ok() 1085 perm = data_race(container_of(ptr, struct tomoyo_unix_acl, head)->perm); in tomoyo_domain_quota_is_ok() 1088 perm = 0; in tomoyo_domain_quota_is_ok() 1091 perm = 1; in tomoyo_domain_quota_is_ok() [all …]
|
| /linux/security/integrity/ |
| H A D | digsig.c | 99 key_perm_t perm, in __integrity_init_keyring() argument 106 KGIDT_INIT(0), cred, perm, in __integrity_init_keyring() 128 key_perm_t perm; in integrity_init_keyring() local 131 perm = (KEY_POS_ALL & ~KEY_POS_SETATTR) | KEY_USR_VIEW in integrity_init_keyring() 159 perm |= KEY_USR_WRITE; in integrity_init_keyring() 162 ret = __integrity_init_keyring(id, perm, restriction); in integrity_init_keyring() 169 off_t size, key_perm_t perm) in integrity_add_key() argument 178 NULL, data, size, perm, in integrity_add_key() 199 key_perm_t perm; in integrity_load_x509() local 209 perm = (KEY_POS_ALL & ~KEY_POS_SETATTR) | KEY_USR_VIEW | KEY_USR_READ; in integrity_load_x509() [all …]
|
| /linux/ipc/ |
| H A D | util.h | 183 struct ipc64_perm *perm, int extra_perm); 208 static inline void ipc_lock_object(struct kern_ipc_perm *perm) in ipc_lock_object() argument 210 spin_lock(&perm->lock); in ipc_lock_object() 213 static inline void ipc_unlock_object(struct kern_ipc_perm *perm) in ipc_unlock_object() argument 215 spin_unlock(&perm->lock); in ipc_unlock_object() 218 static inline void ipc_assert_locked_object(struct kern_ipc_perm *perm) in ipc_assert_locked_object() argument 220 assert_spin_locked(&perm->lock); in ipc_assert_locked_object() 223 static inline void ipc_unlock(struct kern_ipc_perm *perm) in ipc_unlock() argument 225 ipc_unlock_object(perm); in ipc_unlock() 237 static inline bool ipc_valid_object(struct kern_ipc_perm *perm) in ipc_valid_object() argument [all …]
|
| H A D | namespace.c | 130 struct kern_ipc_perm *perm; in free_ipcs() local 139 perm = idr_find(&ids->ipcs_idr, next_id); in free_ipcs() 140 if (perm == NULL) in free_ipcs() 143 ipc_lock_object(perm); in free_ipcs() 144 free(ns, perm); in free_ipcs()
|
| /linux/security/keys/ |
| H A D | permission.c | 55 kperm = key->perm >> 16; in key_task_permission() 61 if (gid_valid(key->gid) && key->perm & KEY_GRP_ALL) { in key_task_permission() 63 kperm = key->perm >> 8; in key_task_permission() 69 kperm = key->perm >> 8; in key_task_permission() 75 kperm = key->perm; in key_task_permission() 83 kperm |= key->perm >> 24; in key_task_permission()
|
| /linux/security/apparmor/ |
| H A D | policy_unpack.c | 647 static bool unpack_perm(struct aa_ext *e, u32 version, struct aa_perms *perm) in unpack_perm() argument 656 aa_unpack_u32(e, &perm->allow, NULL) && in unpack_perm() 657 aa_unpack_u32(e, &perm->deny, NULL) && in unpack_perm() 658 aa_unpack_u32(e, &perm->subtree, NULL) && in unpack_perm() 659 aa_unpack_u32(e, &perm->cond, NULL) && in unpack_perm() 660 aa_unpack_u32(e, &perm->kill, NULL) && in unpack_perm() 661 aa_unpack_u32(e, &perm->complain, NULL) && in unpack_perm() 662 aa_unpack_u32(e, &perm->prompt, NULL) && in unpack_perm() 663 aa_unpack_u32(e, &perm->audit, NULL) && in unpack_perm() 664 aa_unpack_u32(e, &perm->quiet, NULL) && in unpack_perm() [all …]
|
| /linux/arch/powerpc/platforms/powernv/ |
| H A D | opal-sysparam.c | 149 u8 *perm; in opal_sys_param_init() local 202 perm = kcalloc(count, sizeof(*perm), GFP_KERNEL); in opal_sys_param_init() 203 if (!perm) { in opal_sys_param_init() 220 if (of_property_read_u8_array(sysparam, "param-perm", perm, count)) { in opal_sys_param_init() 248 switch (perm[i] & 3) { in opal_sys_param_init() 272 kfree(perm); in opal_sys_param_init() 281 kfree(perm); in opal_sys_param_init()
|
| /linux/security/integrity/platform_certs/ |
| H A D | machine_keyring.c | 26 key_perm_t perm; in add_to_machine_keyring() local 29 perm = (KEY_POS_ALL & ~KEY_POS_SETATTR) | KEY_USR_VIEW; in add_to_machine_keyring() 30 rc = integrity_load_cert(INTEGRITY_KEYRING_MACHINE, source, data, len, perm); in add_to_machine_keyring() 40 data, len, perm); in add_to_machine_keyring()
|
| H A D | platform_keyring.c | 29 key_perm_t perm; in add_to_platform_keyring() local 32 perm = (KEY_POS_ALL & ~KEY_POS_SETATTR) | KEY_USR_VIEW; in add_to_platform_keyring() 35 perm); in add_to_platform_keyring()
|
| /linux/drivers/vhost/ |
| H A D | iotlb.c | 52 u64 addr, unsigned int perm, in vhost_iotlb_add_range_ctx() argument 66 perm, opaque); in vhost_iotlb_add_range_ctx() 90 map->perm = perm; in vhost_iotlb_add_range_ctx() 105 u64 addr, unsigned int perm) in vhost_iotlb_add_range() argument 108 addr, perm, NULL); in vhost_iotlb_add_range()
|
| /linux/drivers/iommu/amd/ |
| H A D | ppr.c | 67 int perm = 0; in ppr_flag_to_fault_perm() local 70 perm |= IOMMU_FAULT_PERM_READ; in ppr_flag_to_fault_perm() 72 perm |= IOMMU_FAULT_PERM_WRITE; in ppr_flag_to_fault_perm() 74 perm |= IOMMU_FAULT_PERM_EXEC; in ppr_flag_to_fault_perm() 76 perm |= IOMMU_FAULT_PERM_PRIV; in ppr_flag_to_fault_perm() 78 return perm; in ppr_flag_to_fault_perm() 128 event.fault.prm.perm = ppr_flag_to_fault_perm(PPR_FLAGS(raw[0])); in iommu_call_iopf_notifier()
|
| /linux/lib/crc/arm64/ |
| H A D | crc-t10dif-core.S | 88 perm .req v27 150 tbl t5.16b, {\a16\().16b}, perm.16b 377 movi perm.4h, #8, lsl #8 378 orr perm.2s, #1, lsl #16 379 orr perm.2s, #1, lsl #24 380 zip1 perm.16b, perm.16b, perm.16b 381 zip1 perm.16b, perm.16b, perm.16b
|
| /linux/drivers/s390/char/ |
| H A D | keyboard.c | 361 int cmd, int perm) in do_kdsk_ioctl() argument 392 if (!perm) in do_kdsk_ioctl() 437 int cmd, int perm) in do_kdgkb_ioctl() argument 466 if (!perm) in do_kdgkb_ioctl() 483 int perm; in kbd_ioctl() local 493 perm = current->signal->tty == tty || capable(CAP_SYS_TTY_CONFIG); in kbd_ioctl() 500 return do_kdsk_ioctl(kbd, argp, cmd, perm); in kbd_ioctl() 503 return do_kdgkb_ioctl(kbd, argp, cmd, perm); in kbd_ioctl() 539 if (!perm) in kbd_ioctl() 559 if (!perm) in kbd_ioctl()
|
| /linux/security/selinux/ |
| H A D | avc.c | 194 u8 perm, u8 which) in avc_xperms_has_perm() argument 200 rc = security_xperm_test(xpd->allowed->p, perm); in avc_xperms_has_perm() 203 rc = security_xperm_test(xpd->auditallow->p, perm); in avc_xperms_has_perm() 206 rc = security_xperm_test(xpd->dontaudit->p, perm); in avc_xperms_has_perm() 211 u8 driver, u8 base_perm, u8 perm) in avc_xperms_allow_perm() argument 218 security_xperm_set(xpd->allowed->p, perm); in avc_xperms_allow_perm() 270 static inline void avc_quick_copy_xperms_decision(u8 perm, in avc_quick_copy_xperms_decision() argument 278 u8 i = perm >> 5; in avc_quick_copy_xperms_decision() 386 u8 perm, in avc_xperms_audit_required() argument 396 if (avc_xperms_has_perm(xpd, perm, XPERMS_DONTAUDIT)) in avc_xperms_audit_required() [all …]
|
| /linux/drivers/gpu/drm/i915/ |
| H A D | i915_params.c | 44 #define i915_param_named(name, T, perm, desc) \ argument 45 module_param_named(name, i915_modparams.name, T, perm); \ 47 #define i915_param_named_unsafe(name, T, perm, desc) \ argument 48 module_param_named_unsafe(name, i915_modparams.name, T, perm); \
|
| /linux/net/ceph/crush/ |
| H A D | mapper.c | 90 work->perm[0] = s; in bucket_perm_choose() 96 work->perm[i] = i; in bucket_perm_choose() 101 work->perm[i] = i; in bucket_perm_choose() 102 work->perm[work->perm[0]] = 0; in bucket_perm_choose() 108 dprintk(" perm_choose have %d: %d\n", i, work->perm[i]); in bucket_perm_choose() 116 unsigned int t = work->perm[p + i]; in bucket_perm_choose() 117 work->perm[p + i] = work->perm[p]; in bucket_perm_choose() 118 work->perm[p] = t; in bucket_perm_choose() 125 dprintk(" perm_choose %d: %d\n", i, work->perm[i]); in bucket_perm_choose() 127 s = work->perm[pr]; in bucket_perm_choose() [all …]
|
| /linux/drivers/memory/tegra/ |
| H A D | mc.c | 597 char perm[7]; in tegra30_mc_handle_irq() local 683 perm[0] = ' '; in tegra30_mc_handle_irq() 684 perm[1] = '['; in tegra30_mc_handle_irq() 687 perm[2] = 'R'; in tegra30_mc_handle_irq() 689 perm[2] = '-'; in tegra30_mc_handle_irq() 692 perm[3] = 'W'; in tegra30_mc_handle_irq() 694 perm[3] = '-'; in tegra30_mc_handle_irq() 697 perm[4] = '-'; in tegra30_mc_handle_irq() 699 perm[4] = 'S'; in tegra30_mc_handle_irq() 701 perm[5] = ']'; in tegra30_mc_handle_irq() [all …]
|
| /linux/fs/9p/ |
| H A D | vfs_inode.c | 569 struct dentry *dentry, char *extension, u32 perm, u8 mode) in v9fs_create() argument 594 err = p9_client_fcreate(ofid, name, perm, mode, extension); in v9fs_create() 600 if (!(perm & P9_DMLINK)) { in v9fs_create() 649 u32 perm = unixmode2p9mode(v9ses, mode); in v9fs_vfs_create() local 653 fid = v9fs_create(v9ses, dir, dentry, NULL, perm, P9_ORDWR); in v9fs_vfs_create() 676 u32 perm; in v9fs_vfs_mkdir() local 683 perm = unixmode2p9mode(v9ses, mode | S_IFDIR); in v9fs_vfs_mkdir() 684 fid = v9fs_create(v9ses, dir, dentry, NULL, perm, P9_OREAD); in v9fs_vfs_mkdir() 767 u32 perm; in v9fs_vfs_atomic_open() local 785 perm = unixmode2p9mode(v9ses, mode); in v9fs_vfs_atomic_open() [all …]
|