/linux-master/tools/include/linux/ |
H A D | module.h | 5 #define module_param(name, type, perm)
|
/linux-master/include/linux/ |
H A D | moduleparam.h | 73 const u16 perm; member in struct:kernel_param 105 * @perm: visibility in sysfs. 111 * @perm is 0 if the variable is not to appear in sysfs, or 0444 126 #define module_param(name, type, perm) \ 127 module_param_named(name, name, type, perm) 133 * @perm: visibility in sysfs. 135 #define module_param_unsafe(name, type, perm) \ 136 module_param_named_unsafe(name, name, type, perm) 143 * @perm: visibility in sysfs. 149 #define module_param_named(name, value, type, perm) \ [all...] |
H A D | vhost_iotlb.h | 17 u32 perm; member in struct:vhost_iotlb_map 34 u64 addr, unsigned int perm, void *opaque); 36 u64 addr, unsigned int perm);
|
H A D | vt_kern.h | 160 int perm); 161 int vt_do_kdsk_ioctl(int cmd, struct kbentry __user *user_kbe, int perm, 163 int vt_do_kdgkb_ioctl(int cmd, struct kbsentry __user *user_kdgkb, int perm); 164 int vt_do_kdskled(unsigned int console, int cmd, unsigned long arg, int perm);
|
/linux-master/security/integrity/platform_certs/ |
H A D | platform_keyring.c | 29 key_perm_t perm; local 32 perm = (KEY_POS_ALL & ~KEY_POS_SETATTR) | KEY_USR_VIEW; 35 perm);
|
H A D | machine_keyring.c | 26 key_perm_t perm; local 29 perm = (KEY_POS_ALL & ~KEY_POS_SETATTR) | KEY_USR_VIEW; 30 rc = integrity_load_cert(INTEGRITY_KEYRING_MACHINE, source, data, len, perm); 40 data, len, perm);
|
/linux-master/security/keys/ |
H A D | permission.c | 55 kperm = key->perm >> 16; 61 if (gid_valid(key->gid) && key->perm & KEY_GRP_ALL) { 63 kperm = key->perm >> 8; 69 kperm = key->perm >> 8; 75 kperm = key->perm; 83 kperm |= key->perm >> 24;
|
/linux-master/drivers/vfio/pci/ |
H A D | vfio_pci_config.c | 113 struct perm_bits *perm, int offset, __le32 *val); 115 struct perm_bits *perm, int offset, __le32 val); 176 int count, struct perm_bits *perm, 183 memcpy(&virt, perm->virt + offset, count); 202 int count, struct perm_bits *perm, 207 memcpy(&write, perm->write + offset, count); 212 memcpy(&virt, perm->virt + offset, count); 249 int count, struct perm_bits *perm, 274 int count, struct perm_bits *perm, 287 int count, struct perm_bits *perm, 175 vfio_default_config_read(struct vfio_pci_core_device *vdev, int pos, int count, struct perm_bits *perm, int offset, __le32 *val) argument 201 vfio_default_config_write(struct vfio_pci_core_device *vdev, int pos, int count, struct perm_bits *perm, int offset, __le32 val) argument 248 vfio_direct_config_read(struct vfio_pci_core_device *vdev, int pos, int count, struct perm_bits *perm, int offset, __le32 *val) argument 273 vfio_raw_config_write(struct vfio_pci_core_device *vdev, int pos, int count, struct perm_bits *perm, int offset, __le32 val) argument 286 vfio_raw_config_read(struct vfio_pci_core_device *vdev, int pos, int count, struct perm_bits *perm, int offset, __le32 *val) argument 300 vfio_virt_config_write(struct vfio_pci_core_device *vdev, int pos, int count, struct perm_bits *perm, int offset, __le32 val) argument 308 vfio_virt_config_read(struct vfio_pci_core_device *vdev, int pos, int count, struct perm_bits *perm, int offset, __le32 *val) argument 339 free_perm_bits(struct perm_bits *perm) argument 347 alloc_perm_bits(struct perm_bits *perm, int size) argument 521 vfio_basic_config_read(struct vfio_pci_core_device *vdev, int pos, int count, struct perm_bits *perm, int offset, __le32 *val) argument 559 vfio_basic_config_write(struct vfio_pci_core_device *vdev, int pos, int count, struct perm_bits *perm, int offset, __le32 val) argument 652 init_pci_cap_basic_perm(struct perm_bits *perm) argument 715 vfio_pm_config_write(struct vfio_pci_core_device *vdev, int pos, int count, struct perm_bits *perm, int offset, __le32 val) argument 748 init_pci_cap_pm_perm(struct perm_bits *perm) argument 787 vfio_vpd_config_write(struct vfio_pci_core_device *vdev, int pos, int count, struct perm_bits *perm, int offset, __le32 val) argument 832 init_pci_cap_vpd_perm(struct perm_bits *perm) argument 856 init_pci_cap_pcix_perm(struct perm_bits *perm) argument 869 vfio_exp_config_write(struct vfio_pci_core_device *vdev, int pos, int count, struct perm_bits *perm, int offset, __le32 val) argument 929 init_pci_cap_exp_perm(struct perm_bits *perm) argument 953 vfio_af_config_write(struct vfio_pci_core_device *vdev, int pos, int count, struct perm_bits *perm, int offset, __le32 val) argument 990 init_pci_cap_af_perm(struct perm_bits *perm) argument 1003 init_pci_ext_cap_err_perm(struct perm_bits *perm) argument 1057 init_pci_ext_cap_pwr_perm(struct perm_bits *perm) argument 1130 vfio_msi_config_read(struct vfio_pci_core_device *vdev, int pos, int count, struct perm_bits *perm, int offset, __le32 *val) argument 1150 vfio_msi_config_write(struct vfio_pci_core_device *vdev, int pos, int count, struct perm_bits *perm, int offset, __le32 val) argument 1196 init_pci_cap_msi_perm(struct perm_bits *perm, int len, u16 flags) argument 1866 struct perm_bits *perm; local [all...] |
/linux-master/security/tomoyo/ |
H A D | file.c | 258 if (acl->perm & (1 << r->param.path.operation)) { 281 return (acl->perm & (1 << r->param.path_number.operation)) && 302 return (acl->perm & (1 << r->param.path2.operation)) && 322 return (acl->perm & (1 << r->param.mkdev.operation)) && 364 ->perm; 365 u16 perm = READ_ONCE(*a_perm); local 366 const u16 b_perm = container_of(b, struct tomoyo_path_acl, head)->perm; 369 perm &= ~b_perm; 371 perm |= b_perm; 372 WRITE_ONCE(*a_perm, perm); 386 tomoyo_update_path_acl(const u16 perm, struct tomoyo_acl_param *param) argument 440 u8 perm = READ_ONCE(*a_perm); local 462 tomoyo_update_mkdev_acl(const u8 perm, struct tomoyo_acl_param *param) argument 520 u8 perm = READ_ONCE(*a_perm); local 541 tomoyo_update_path2_acl(const u8 perm, struct tomoyo_acl_param *param) argument 658 u8 perm = READ_ONCE(*a_perm); local 678 tomoyo_update_path_number_acl(const u8 perm, struct tomoyo_acl_param *param) argument 1014 u16 perm = 0; local [all...] |
H A D | network.c | 235 &container_of(a, struct tomoyo_inet_acl, head)->perm; 236 u8 perm = READ_ONCE(*a_perm); local 237 const u8 b_perm = container_of(b, struct tomoyo_inet_acl, head)->perm; 240 perm &= ~b_perm; 242 perm |= b_perm; 243 WRITE_ONCE(*a_perm, perm); 244 return !perm; 261 &container_of(a, struct tomoyo_unix_acl, head)->perm; 262 u8 perm = READ_ONCE(*a_perm); local 263 const u8 b_perm = container_of(b, struct tomoyo_unix_acl, head)->perm; [all...] |
H A D | util.c | 1058 u16 perm; local 1063 * Reading perm bitmap might race with tomoyo_merge_*() because 1069 perm = data_race(container_of(ptr, struct tomoyo_path_acl, head)->perm); 1072 perm = data_race(container_of(ptr, struct tomoyo_path2_acl, head)->perm); 1075 perm = data_race(container_of(ptr, struct tomoyo_path_number_acl, head) 1076 ->perm); 1079 perm = data_race(container_of(ptr, struct tomoyo_mkdev_acl, head)->perm); [all...] |
/linux-master/security/integrity/ |
H A D | digsig.c | 99 key_perm_t perm, 106 KGIDT_INIT(0), cred, perm, 128 key_perm_t perm; local 131 perm = (KEY_POS_ALL & ~KEY_POS_SETATTR) | KEY_USR_VIEW 159 perm |= KEY_USR_WRITE; 162 ret = __integrity_init_keyring(id, perm, restriction); 169 off_t size, key_perm_t perm) 178 NULL, data, size, perm, 199 key_perm_t perm; local 209 perm 98 __integrity_init_keyring(const unsigned int id, key_perm_t perm, struct key_restriction *restriction) argument 168 integrity_add_key(const unsigned int id, const void *data, off_t size, key_perm_t perm) argument 218 integrity_load_cert(const unsigned int id, const char *source, const void *data, size_t len, key_perm_t perm) argument [all...] |
/linux-master/ipc/ |
H A D | util.h | 183 struct ipc64_perm *perm, int extra_perm); 208 static inline void ipc_lock_object(struct kern_ipc_perm *perm) argument 210 spin_lock(&perm->lock); 213 static inline void ipc_unlock_object(struct kern_ipc_perm *perm) argument 215 spin_unlock(&perm->lock); 218 static inline void ipc_assert_locked_object(struct kern_ipc_perm *perm) argument 220 assert_spin_locked(&perm->lock); 223 static inline void ipc_unlock(struct kern_ipc_perm *perm) argument 225 ipc_unlock_object(perm); 237 static inline bool ipc_valid_object(struct kern_ipc_perm *perm) argument [all...] |
H A D | namespace.c | 126 struct kern_ipc_perm *perm; local 135 perm = idr_find(&ids->ipcs_idr, next_id); 136 if (perm == NULL) 139 ipc_lock_object(perm); 140 free(ns, perm);
|
/linux-master/drivers/tty/vt/ |
H A D | vt_ioctl.c | 284 unsigned long arg, bool perm) 293 if (!perm) 307 if (!perm) 377 if (!perm) 397 if (!perm) 420 perm = 0; 421 return vt_do_kbkeycode_ioctl(cmd, up, perm); 425 return vt_do_kdsk_ioctl(cmd, up, perm, console); 429 return vt_do_kdgkb_ioctl(cmd, up, perm); 437 return vt_do_diacrit(cmd, up, perm); 283 vt_k_ioctl(struct tty_struct *tty, unsigned int cmd, unsigned long arg, bool perm) argument 489 do_unimap_ioctl(int cmd, struct unimapdesc __user *user_ud, bool perm, struct vc_data *vc) argument 510 vt_io_ioctl(struct vc_data *vc, unsigned int cmd, void __user *up, bool perm) argument 740 int i, perm; local 1010 compat_kdfontop_ioctl(struct compat_console_font_op __user *fontop, int perm, struct console_font_op *op, struct vc_data *vc) argument 1035 compat_unimap_ioctl(unsigned int cmd, struct compat_unimapdesc __user *user_ud, int perm, struct vc_data *vc) argument 1063 int perm; local [all...] |
/linux-master/security/selinux/ |
H A D | nlmsgtab.c | 25 u32 perm; member in struct:nlmsg_perm 154 static int nlmsg_perm(u16 nlmsg_type, u32 *perm, const struct nlmsg_perm *tab, size_t tabsize) argument 161 *perm = tab[i].perm; 169 int selinux_nlmsg_lookup(u16 sclass, u16 nlmsg_type, u32 *perm) argument 181 err = nlmsg_perm(nlmsg_type, perm, nlmsg_route_perms, 186 err = nlmsg_perm(nlmsg_type, perm, nlmsg_tcpdiag_perms, 196 err = nlmsg_perm(nlmsg_type, perm, nlmsg_xfrm_perms, 205 *perm = NETLINK_AUDIT_SOCKET__NLMSG_RELAY; 207 err = nlmsg_perm(nlmsg_type, perm, nlmsg_audit_perm [all...] |
H A D | avc.c | 199 u8 perm, u8 which) 205 rc = security_xperm_test(xpd->allowed->p, perm); 208 rc = security_xperm_test(xpd->auditallow->p, perm); 211 rc = security_xperm_test(xpd->dontaudit->p, perm); 216 u8 driver, u8 perm) 222 security_xperm_set(xpd->allowed->p, perm); 271 * information relevant to this perm 273 static inline void avc_quick_copy_xperms_decision(u8 perm, argument 281 u8 i = perm >> 5; 388 u8 perm, 198 avc_xperms_has_perm(struct extended_perms_decision *xpd, u8 perm, u8 which) argument 215 avc_xperms_allow_perm(struct avc_xperms_node *xp_node, u8 driver, u8 perm) argument 385 avc_xperms_audit_required(u32 requested, struct av_decision *avd, struct extended_perms_decision *xpd, u8 perm, int result, u32 *deniedp) argument 415 avc_xperms_audit(u32 ssid, u32 tsid, u16 tclass, u32 requested, struct av_decision *avd, struct extended_perms_decision *xpd, u8 perm, int result, struct common_audit_data *ad) argument 657 u32 av = sad->audited, perm; local [all...] |
/linux-master/drivers/vhost/ |
H A D | iotlb.c | 44 * @perm: access permission of this range 52 u64 addr, unsigned int perm, 66 perm, opaque); 90 map->perm = perm; 105 u64 addr, unsigned int perm) 108 addr, perm, NULL); 50 vhost_iotlb_add_range_ctx(struct vhost_iotlb *iotlb, u64 start, u64 last, u64 addr, unsigned int perm, void *opaque) argument 103 vhost_iotlb_add_range(struct vhost_iotlb *iotlb, u64 start, u64 last, u64 addr, unsigned int perm) argument
|
/linux-master/arch/powerpc/platforms/powernv/ |
H A D | opal-sysparam.c | 149 u8 *perm; local 202 perm = kcalloc(count, sizeof(*perm), GFP_KERNEL); 203 if (!perm) { 220 if (of_property_read_u8_array(sysparam, "param-perm", perm, count)) { 221 pr_err("SYSPARAM: Missing property param-perm in the DT\n"); 248 switch (perm[i] & 3) { 272 kfree(perm); 281 kfree(perm); [all...] |
/linux-master/security/apparmor/ |
H A D | policy_unpack.c | 646 static bool unpack_perm(struct aa_ext *e, u32 version, struct aa_perms *perm) argument 651 return aa_unpack_u32(e, &perm->allow, NULL) && 652 aa_unpack_u32(e, &perm->allow, NULL) && 653 aa_unpack_u32(e, &perm->deny, NULL) && 654 aa_unpack_u32(e, &perm->subtree, NULL) && 655 aa_unpack_u32(e, &perm->cond, NULL) && 656 aa_unpack_u32(e, &perm->kill, NULL) && 657 aa_unpack_u32(e, &perm->complain, NULL) && 658 aa_unpack_u32(e, &perm->prompt, NULL) && 659 aa_unpack_u32(e, &perm 1180 verify_perm(struct aa_perms *perm) argument [all...] |
H A D | lib.c | 218 * aa_perm_mask_to_str - convert a perm mask to its short string 226 unsigned int i, perm = 1; local 229 for (i = 0; i < num_chrs; perm <<= 1, i++) { 230 if (mask & perm) { 246 unsigned int i, perm = 1; local 249 for (i = 0; i < 32; perm <<= 1, i++) { 250 if (mask & perm) { 382 * perm masks appropriately.
|
/linux-master/drivers/gpu/drm/i915/ |
H A D | i915_params.c | 44 #define i915_param_named(name, T, perm, desc) \ 45 module_param_named(name, i915_modparams.name, T, perm); \ 47 #define i915_param_named_unsafe(name, T, perm, desc) \ 48 module_param_named_unsafe(name, i915_modparams.name, T, perm); \
|
/linux-master/drivers/gpu/drm/i915/display/ |
H A D | intel_display_params.c | 9 #define intel_display_param_named(name, T, perm, desc) \ 10 module_param_named(name, intel_display_modparams.name, T, perm); \ 12 #define intel_display_param_named_unsafe(name, T, perm, desc) \ 13 module_param_named_unsafe(name, intel_display_modparams.name, T, perm); \
|
/linux-master/drivers/soc/qcom/ |
H A D | rmtfs_mem.c | 265 perms[0].perm = QCOM_SCM_PERM_RW; 269 perms[i + 1].perm = QCOM_SCM_PERM_RW; 296 struct qcom_scm_vmperm perm; local 299 perm.vmid = QCOM_SCM_VMID_HLOS; 300 perm.perm = QCOM_SCM_PERM_RW; 303 &rmtfs_mem->perms, &perm, 1);
|
/linux-master/arch/x86/kernel/fpu/ |
H A D | core.c | 201 u64 perm; local 208 perm = fpuperm->__state_perm; 211 WRITE_ONCE(fpuperm->__state_perm, perm | FPU_GUEST_PERM_LOCKED); 215 gfpu->perm = perm & ~FPU_GUEST_PERM_LOCKED; 236 gfpu->perm = fpu_user_cfg.default_features; 273 * fpu_enable_guest_xfd_features - Check xfeatures against guest perm and enable 277 * Enable all dynamic xfeatures according to guest perm and requested CPUID. 536 fpu->perm.__state_perm = fpu_kernel_cfg.default_features; 537 fpu->perm [all...] |