/linux-4.4.14/include/linux/ |
D | moduleparam.h | 72 const u16 perm; member 125 #define module_param(name, type, perm) \ argument 126 module_param_named(name, name, type, perm) 131 #define module_param_unsafe(name, type, perm) \ argument 132 module_param_named_unsafe(name, name, type, perm) 145 #define module_param_named(name, value, type, perm) \ argument 147 module_param_cb(name, ¶m_ops_##type, &value, perm); \ 153 #define module_param_named_unsafe(name, value, type, perm) \ argument 155 module_param_cb_unsafe(name, ¶m_ops_##type, &value, perm); \ 166 #define module_param_cb(name, ops, arg, perm) \ argument [all …]
|
D | vt_kern.h | 175 int perm); 177 int perm, int console); 179 int perm); 180 extern int vt_do_kdskled(int console, int cmd, unsigned long arg, int perm);
|
D | key.h | 154 key_perm_t perm; /* access permissions */ member 213 key_perm_t perm, 272 key_perm_t perm, 287 key_perm_t perm,
|
D | oprofile.h | 131 char const * name, const struct file_operations * fops, int perm);
|
D | security.h | 1522 const struct cred *cred, unsigned perm); 1540 unsigned perm) in security_key_permission() argument
|
D | lsm_hooks.h | 1604 unsigned perm);
|
/linux-4.4.14/drivers/vfio/pci/ |
D | vfio_pci_config.c | 118 struct perm_bits *perm, int offset, __le32 *val); 120 struct perm_bits *perm, int offset, __le32 val); 181 int count, struct perm_bits *perm, in vfio_default_config_read() argument 188 memcpy(&virt, perm->virt + offset, count); in vfio_default_config_read() 207 int count, struct perm_bits *perm, in vfio_default_config_write() argument 212 memcpy(&write, perm->write + offset, count); in vfio_default_config_write() 217 memcpy(&virt, perm->virt + offset, count); in vfio_default_config_write() 254 int count, struct perm_bits *perm, in vfio_direct_config_read() argument 279 int count, struct perm_bits *perm, in vfio_raw_config_write() argument 292 int count, struct perm_bits *perm, in vfio_raw_config_read() argument [all …]
|
/linux-4.4.14/drivers/staging/lustre/lustre/llite/ |
D | remote_perm.c | 159 int ll_update_remote_perm(struct inode *inode, struct mdt_remote_perm *perm) in ll_update_remote_perm() argument 168 if (perm->rp_uid != current->uid || in ll_update_remote_perm() 169 perm->rp_gid != current->gid || in ll_update_remote_perm() 170 perm->rp_fsuid != current->fsuid || in ll_update_remote_perm() 171 perm->rp_fsgid != current->fsgid) { in ll_update_remote_perm() 175 perm->rp_uid, perm->rp_gid, perm->rp_fsuid, in ll_update_remote_perm() 176 perm->rp_fsgid, current->uid, current->gid, in ll_update_remote_perm() 197 head = lli->lli_remote_perms + remote_perm_hashfunc(perm->rp_uid); in ll_update_remote_perm() 201 if (tmp->lrp_uid != perm->rp_uid) in ll_update_remote_perm() 203 if (tmp->lrp_gid != perm->rp_gid) in ll_update_remote_perm() [all …]
|
D | llite_internal.h | 1047 int ll_update_remote_perm(struct inode *inode, struct mdt_remote_perm *perm);
|
/linux-4.4.14/security/tomoyo/ |
D | file.c | 255 if (acl->perm & (1 << r->param.path.operation)) { in tomoyo_check_path_acl() 277 return (acl->perm & (1 << r->param.path_number.operation)) && in tomoyo_check_path_number_acl() 297 return (acl->perm & (1 << r->param.path2.operation)) && in tomoyo_check_path2_acl() 316 return (acl->perm & (1 << r->param.mkdev.operation)) && in tomoyo_check_mkdev_acl() 357 ->perm; in tomoyo_merge_path_acl() 358 u16 perm = *a_perm; in tomoyo_merge_path_acl() local 359 const u16 b_perm = container_of(b, struct tomoyo_path_acl, head)->perm; in tomoyo_merge_path_acl() 361 perm &= ~b_perm; in tomoyo_merge_path_acl() 363 perm |= b_perm; in tomoyo_merge_path_acl() 364 *a_perm = perm; in tomoyo_merge_path_acl() [all …]
|
D | network.c | 234 &container_of(a, struct tomoyo_inet_acl, head)->perm; in tomoyo_merge_inet_acl() 235 u8 perm = *a_perm; in tomoyo_merge_inet_acl() local 236 const u8 b_perm = container_of(b, struct tomoyo_inet_acl, head)->perm; in tomoyo_merge_inet_acl() 239 perm &= ~b_perm; in tomoyo_merge_inet_acl() 241 perm |= b_perm; in tomoyo_merge_inet_acl() 242 *a_perm = perm; in tomoyo_merge_inet_acl() 243 return !perm; in tomoyo_merge_inet_acl() 260 &container_of(a, struct tomoyo_unix_acl, head)->perm; in tomoyo_merge_unix_acl() 261 u8 perm = *a_perm; in tomoyo_merge_unix_acl() local 262 const u8 b_perm = container_of(b, struct tomoyo_unix_acl, head)->perm; in tomoyo_merge_unix_acl() [all …]
|
D | util.c | 1037 u16 perm; in tomoyo_domain_quota_is_ok() local 1043 perm = container_of(ptr, struct tomoyo_path_acl, head) in tomoyo_domain_quota_is_ok() 1044 ->perm; in tomoyo_domain_quota_is_ok() 1047 perm = container_of(ptr, struct tomoyo_path2_acl, head) in tomoyo_domain_quota_is_ok() 1048 ->perm; in tomoyo_domain_quota_is_ok() 1051 perm = container_of(ptr, struct tomoyo_path_number_acl, in tomoyo_domain_quota_is_ok() 1052 head)->perm; in tomoyo_domain_quota_is_ok() 1055 perm = container_of(ptr, struct tomoyo_mkdev_acl, in tomoyo_domain_quota_is_ok() 1056 head)->perm; in tomoyo_domain_quota_is_ok() 1059 perm = container_of(ptr, struct tomoyo_inet_acl, in tomoyo_domain_quota_is_ok() [all …]
|
D | common.c | 1376 const u16 perm = ptr->perm; in tomoyo_print_entry() local 1378 if (!(perm & (1 << bit))) in tomoyo_print_entry() 1405 const u8 perm = ptr->perm; in tomoyo_print_entry() local 1407 if (!(perm & (1 << bit))) in tomoyo_print_entry() 1425 const u8 perm = ptr->perm; in tomoyo_print_entry() local 1427 if (!(perm & (1 << bit))) in tomoyo_print_entry() 1445 const u8 perm = ptr->perm; in tomoyo_print_entry() local 1447 if (!(perm & (1 << bit))) in tomoyo_print_entry() 1467 const u8 perm = ptr->perm; in tomoyo_print_entry() local 1470 if (!(perm & (1 << bit))) in tomoyo_print_entry() [all …]
|
D | tomoyo.c | 234 const unsigned int perm = mode & S_IALLUGO; in tomoyo_path_mknod() local 246 return tomoyo_mkdev_perm(type, &path, perm, dev); in tomoyo_path_mknod() 256 return tomoyo_path_number_perm(type, &path, perm); in tomoyo_path_mknod()
|
D | common.h | 706 u16 perm; /* Bitmask of values in "enum tomoyo_path_acl_index". */ member 717 u8 perm; member 725 u8 perm; /* Bitmask of values in "enum tomoyo_mkdev_acl_index". */ member 737 u8 perm; /* Bitmask of values in "enum tomoyo_path2_acl_index". */ member 761 u8 perm; /* Bitmask of values in "enum tomoyo_network_acl_index" */ member 770 u8 perm; /* Bitmask of values in "enum tomoyo_network_acl_index" */ member
|
D | domain.c | 114 ->perm == 1 << TOMOYO_TYPE_EXECUTE)) in tomoyo_update_domain()
|
/linux-4.4.14/security/keys/ |
D | permission.c | 31 unsigned perm) in key_task_permission() argument 41 kperm = key->perm >> 16; in key_task_permission() 47 if (gid_valid(key->gid) && key->perm & KEY_GRP_ALL) { in key_task_permission() 49 kperm = key->perm >> 8; in key_task_permission() 55 kperm = key->perm >> 8; in key_task_permission() 61 kperm = key->perm; in key_task_permission() 69 kperm |= key->perm >> 24; in key_task_permission() 71 kperm = kperm & perm & KEY_NEED_ALL; in key_task_permission() 73 if (kperm != perm) in key_task_permission() 77 return security_key_permission(key_ref, cred, perm); in key_task_permission()
|
D | internal.h | 157 key_perm_t perm); 174 key_perm_t perm); 179 static inline int key_permission(const key_ref_t key_ref, unsigned perm) in key_permission() argument 181 return key_task_permission(key_ref, current_cred(), perm); in key_permission()
|
D | key.c | 226 key_perm_t perm, unsigned long flags) in key_alloc() argument 293 key->perm = perm; in key_alloc() 778 key_perm_t perm, in key_create_or_update() argument 862 if (perm == KEY_PERM_UNDEF) { in key_create_or_update() 863 perm = KEY_POS_VIEW | KEY_POS_SEARCH | KEY_POS_LINK | KEY_POS_SETATTR; in key_create_or_update() 864 perm |= KEY_USR_VIEW; in key_create_or_update() 867 perm |= KEY_POS_READ; in key_create_or_update() 871 perm |= KEY_POS_WRITE; in key_create_or_update() 876 cred->fsuid, cred->fsgid, cred, perm, flags); in key_create_or_update()
|
D | request_key.c | 338 key_perm_t perm; in construct_alloc_key() local 348 perm = KEY_POS_VIEW | KEY_POS_SEARCH | KEY_POS_LINK | KEY_POS_SETATTR; in construct_alloc_key() 349 perm |= KEY_USR_VIEW; in construct_alloc_key() 351 perm |= KEY_POS_READ; in construct_alloc_key() 354 perm |= KEY_POS_WRITE; in construct_alloc_key() 358 perm, flags); in construct_alloc_key()
|
D | process_keys.c | 517 key_perm_t perm) in lookup_user_key() argument 703 if (perm) in lookup_user_key() 708 } else if (perm) { in lookup_user_key() 720 ret = key_task_permission(key_ref, ctx.cred, perm); in lookup_user_key()
|
D | proc.c | 202 if (key->perm & KEY_POS_VIEW) { in proc_keys_show() 257 key->perm, in proc_keys_show()
|
D | keyctl.c | 596 key->perm); in keyctl_describe_key() 904 long keyctl_setperm_key(key_serial_t id, key_perm_t perm) in keyctl_setperm_key() argument 911 if (perm & ~(KEY_POS_ALL | KEY_USR_ALL | KEY_GRP_ALL | KEY_OTH_ALL)) in keyctl_setperm_key() 929 key->perm = perm; in keyctl_setperm_key()
|
D | gc.c | 230 key->perm = 0; in key_garbage_collector()
|
D | keyring.c | 493 const struct cred *cred, key_perm_t perm, in keyring_alloc() argument 500 uid, gid, cred, perm, flags); in keyring_alloc()
|
/linux-4.4.14/drivers/tty/vt/ |
D | vt_ioctl.c | 223 do_fontx_ioctl(int cmd, struct consolefontdesc __user *user_cfd, int perm, struct console_font_op *… in do_fontx_ioctl() argument 233 if (!perm) in do_fontx_ioctl() 263 do_unimap_ioctl(int cmd, struct unimapdesc __user *user_ud, int perm, struct vc_data *vc) in do_unimap_ioctl() argument 275 if (!perm) in do_unimap_ioctl() 279 if (!perm && fg_console != vc->vc_num) in do_unimap_ioctl() 343 int i, perm; in vt_ioctl() local 359 perm = 0; in vt_ioctl() 361 perm = 1; in vt_ioctl() 368 if (!perm) in vt_ioctl() 382 if (!perm) in vt_ioctl() [all …]
|
D | keyboard.c | 1625 int vt_do_diacrit(unsigned int cmd, void __user *udp, int perm) in vt_do_diacrit() argument 1701 if (!perm) in vt_do_diacrit() 1742 if (!perm) in vt_do_diacrit() 1846 int perm) in vt_do_kbkeycode_ioctl() argument 1860 if (!perm) in vt_do_kbkeycode_ioctl() 1872 int vt_do_kdsk_ioctl(int cmd, struct kbentry __user *user_kbe, int perm, in vt_do_kdsk_ioctl() argument 1884 perm = 0; in vt_do_kdsk_ioctl() 1900 if (!perm) in vt_do_kdsk_ioctl() 1978 int vt_do_kdgkb_ioctl(int cmd, struct kbsentry __user *user_kdgkb, int perm) in vt_do_kdgkb_ioctl() argument 1991 perm = 0; in vt_do_kdgkb_ioctl() [all …]
|
/linux-4.4.14/ipc/ |
D | util.h | 142 struct ipc64_perm *perm, int extra_perm); 168 static inline void ipc_lock_object(struct kern_ipc_perm *perm) in ipc_lock_object() argument 170 spin_lock(&perm->lock); in ipc_lock_object() 173 static inline void ipc_unlock_object(struct kern_ipc_perm *perm) in ipc_unlock_object() argument 175 spin_unlock(&perm->lock); in ipc_unlock_object() 178 static inline void ipc_assert_locked_object(struct kern_ipc_perm *perm) in ipc_assert_locked_object() argument 180 assert_spin_locked(&perm->lock); in ipc_assert_locked_object() 183 static inline void ipc_unlock(struct kern_ipc_perm *perm) in ipc_unlock() argument 185 ipc_unlock_object(perm); in ipc_unlock() 197 static inline bool ipc_valid_object(struct kern_ipc_perm *perm) in ipc_valid_object() argument [all …]
|
D | namespace.c | 73 struct kern_ipc_perm *perm; in free_ipcs() local 82 perm = idr_find(&ids->ipcs_idr, next_id); in free_ipcs() 83 if (perm == NULL) in free_ipcs() 86 ipc_lock_object(perm); in free_ipcs() 87 free(ns, perm); in free_ipcs()
|
D | util.c | 689 struct ipc64_perm *perm, int extra_perm) in ipcctl_pre_down_nolock() argument 703 audit_ipc_set_perm(extra_perm, perm->uid, in ipcctl_pre_down_nolock() 704 perm->gid, perm->mode); in ipcctl_pre_down_nolock()
|
/linux-4.4.14/security/selinux/ |
D | nlmsgtab.c | 28 u32 perm; member 136 static int nlmsg_perm(u16 nlmsg_type, u32 *perm, struct nlmsg_perm *tab, size_t tabsize) in nlmsg_perm() argument 142 *perm = tab[i].perm; in nlmsg_perm() 150 int selinux_nlmsg_lookup(u16 sclass, u16 nlmsg_type, u32 *perm) in selinux_nlmsg_lookup() argument 158 err = nlmsg_perm(nlmsg_type, perm, nlmsg_route_perms, in selinux_nlmsg_lookup() 163 err = nlmsg_perm(nlmsg_type, perm, nlmsg_tcpdiag_perms, in selinux_nlmsg_lookup() 169 err = nlmsg_perm(nlmsg_type, perm, nlmsg_xfrm_perms, in selinux_nlmsg_lookup() 178 *perm = NETLINK_AUDIT_SOCKET__NLMSG_RELAY; in selinux_nlmsg_lookup() 180 err = nlmsg_perm(nlmsg_type, perm, nlmsg_audit_perms, in selinux_nlmsg_lookup()
|
D | avc.c | 112 int i, perm; in avc_dump_av() local 124 perm = 1; in avc_dump_av() 126 if ((perm & av) && perms[i]) { in avc_dump_av() 128 av &= ~perm; in avc_dump_av() 131 perm <<= 1; in avc_dump_av() 252 u8 perm, u8 which) in avc_xperms_has_perm() argument 258 rc = security_xperm_test(xpd->allowed->p, perm); in avc_xperms_has_perm() 261 rc = security_xperm_test(xpd->auditallow->p, perm); in avc_xperms_has_perm() 264 rc = security_xperm_test(xpd->dontaudit->p, perm); in avc_xperms_has_perm() 269 u8 driver, u8 perm) in avc_xperms_allow_perm() argument [all …]
|
D | netlabel.c | 376 u32 perm; in selinux_netlbl_sock_rcv_skb() local 394 perm = UDP_SOCKET__RECVFROM; in selinux_netlbl_sock_rcv_skb() 397 perm = TCP_SOCKET__RECVFROM; in selinux_netlbl_sock_rcv_skb() 400 perm = RAWIP_SOCKET__RECVFROM; in selinux_netlbl_sock_rcv_skb() 403 rc = avc_has_perm(sksec->sid, nlbl_sid, sksec->sclass, perm, ad); in selinux_netlbl_sock_rcv_skb()
|
D | hooks.c | 1485 u32 perm = 0; in signal_to_av() local 1490 perm = PROCESS__SIGCHLD; in signal_to_av() 1494 perm = PROCESS__SIGKILL; in signal_to_av() 1498 perm = PROCESS__SIGSTOP; in signal_to_av() 1502 perm = PROCESS__SIGNAL; in signal_to_av() 1506 return perm; in signal_to_av() 3479 u32 perm; in selinux_file_send_sigiotask() local 3488 perm = signal_to_av(SIGIO); /* as per send_sigio_to_task */ in selinux_file_send_sigiotask() 3490 perm = signal_to_av(signum); in selinux_file_send_sigiotask() 3493 SECCLASS_PROCESS, perm, NULL); in selinux_file_send_sigiotask() [all …]
|
D | selinuxfs.c | 1519 static inline unsigned long sel_perm_to_ino(u16 class, u32 perm) in sel_perm_to_ino() argument 1521 return (class * (SEL_VEC_MAX + 1) + perm) | SEL_CLASS_INO_OFFSET; in sel_perm_to_ino()
|
/linux-4.4.14/drivers/memory/tegra/ |
D | mc.c | 264 char perm[7]; in tegra_mc_irq() local 303 perm[0] = ' '; in tegra_mc_irq() 304 perm[1] = '['; in tegra_mc_irq() 307 perm[2] = 'R'; in tegra_mc_irq() 309 perm[2] = '-'; in tegra_mc_irq() 312 perm[3] = 'W'; in tegra_mc_irq() 314 perm[3] = '-'; in tegra_mc_irq() 317 perm[4] = '-'; in tegra_mc_irq() 319 perm[4] = 'S'; in tegra_mc_irq() 321 perm[5] = ']'; in tegra_mc_irq() [all …]
|
/linux-4.4.14/arch/powerpc/platforms/powernv/ |
D | opal-sysparam.c | 162 u8 *perm; in opal_sys_param_init() local 215 perm = kzalloc(sizeof(*perm) * count, GFP_KERNEL); in opal_sys_param_init() 216 if (!perm) { in opal_sys_param_init() 233 if (of_property_read_u8_array(sysparam, "param-perm", perm, count)) { in opal_sys_param_init() 261 switch (perm[i] & 3) { in opal_sys_param_init() 285 kfree(perm); in opal_sys_param_init() 294 kfree(perm); in opal_sys_param_init()
|
/linux-4.4.14/net/ceph/crush/ |
D | crush.c | 48 kfree(b->h.perm); in crush_destroy_bucket_uniform() 57 kfree(b->h.perm); in crush_destroy_bucket_list() 64 kfree(b->h.perm); in crush_destroy_bucket_tree() 74 kfree(b->h.perm); in crush_destroy_bucket_straw() 82 kfree(b->h.perm); in crush_destroy_bucket_straw2()
|
D | mapper.c | 88 bucket->perm[0] = s; in bucket_perm_choose() 94 bucket->perm[i] = i; in bucket_perm_choose() 99 bucket->perm[i] = i; in bucket_perm_choose() 100 bucket->perm[bucket->perm[0]] = 0; in bucket_perm_choose() 106 dprintk(" perm_choose have %d: %d\n", i, bucket->perm[i]); in bucket_perm_choose() 114 unsigned int t = bucket->perm[p + i]; in bucket_perm_choose() 115 bucket->perm[p + i] = bucket->perm[p]; in bucket_perm_choose() 116 bucket->perm[p] = t; in bucket_perm_choose() 123 dprintk(" perm_choose %d: %d\n", i, bucket->perm[i]); in bucket_perm_choose() 125 s = bucket->perm[pr]; in bucket_perm_choose()
|
/linux-4.4.14/arch/x86/ras/ |
D | mce_amd_inj.c | 400 umode_t perm; member 402 { .name = "status", .fops = &status_fops, .perm = S_IRUSR | S_IWUSR }, 403 { .name = "misc", .fops = &misc_fops, .perm = S_IRUSR | S_IWUSR }, 404 { .name = "addr", .fops = &addr_fops, .perm = S_IRUSR | S_IWUSR }, 405 { .name = "bank", .fops = &bank_fops, .perm = S_IRUSR | S_IWUSR }, 406 { .name = "flags", .fops = &flags_fops, .perm = S_IRUSR | S_IWUSR }, 407 { .name = "cpu", .fops = &extcpu_fops, .perm = S_IRUSR | S_IWUSR }, 408 { .name = "README", .fops = &readme_fops, .perm = S_IRUSR | S_IRGRP | S_IROTH }, 425 dfs_fls[i].perm, in init_mce_inject()
|
/linux-4.4.14/drivers/s390/char/ |
D | keyboard.c | 333 int cmd, int perm) in do_kdsk_ioctl() argument 360 if (!perm) in do_kdsk_ioctl() 405 int cmd, int perm) in do_kdgkb_ioctl() argument 434 if (!perm) in do_kdgkb_ioctl() 465 int perm; in kbd_ioctl() local 475 perm = current->signal->tty == tty || capable(CAP_SYS_TTY_CONFIG); in kbd_ioctl() 482 return do_kdsk_ioctl(kbd, argp, cmd, perm); in kbd_ioctl() 485 return do_kdgkb_ioctl(kbd, argp, cmd, perm); in kbd_ioctl() 521 if (!perm) in kbd_ioctl() 541 if (!perm) in kbd_ioctl()
|
/linux-4.4.14/sound/core/seq/oss/ |
D | seq_oss_midi.c | 328 int perm; in snd_seq_oss_midi_open() local 341 perm = 0; in snd_seq_oss_midi_open() 343 perm |= PERM_WRITE; in snd_seq_oss_midi_open() 345 perm |= PERM_READ; in snd_seq_oss_midi_open() 346 perm &= mdev->flags; in snd_seq_oss_midi_open() 347 if (perm == 0) { in snd_seq_oss_midi_open() 353 if ((mdev->opened & perm) == perm) { in snd_seq_oss_midi_open() 358 perm &= ~mdev->opened; in snd_seq_oss_midi_open() 362 if (perm & PERM_WRITE) { in snd_seq_oss_midi_open() 369 if (perm & PERM_READ) { in snd_seq_oss_midi_open()
|
/linux-4.4.14/fs/nfsd/ |
D | nfs4acl.c | 66 mask_from_posix(unsigned short perm, unsigned int flags) in mask_from_posix() argument 72 if (perm & ACL_READ) in mask_from_posix() 74 if (perm & ACL_WRITE) in mask_from_posix() 76 if ((perm & ACL_WRITE) && (flags & NFS4_ACL_DIR)) in mask_from_posix() 78 if (perm & ACL_EXECUTE) in mask_from_posix() 84 deny_mask_from_posix(unsigned short perm, u32 flags) in deny_mask_from_posix() argument 88 if (perm & ACL_READ) in deny_mask_from_posix() 90 if (perm & ACL_WRITE) in deny_mask_from_posix() 92 if ((perm & ACL_WRITE) && (flags & NFS4_ACL_DIR)) in deny_mask_from_posix() 94 if (perm & ACL_EXECUTE) in deny_mask_from_posix() [all …]
|
/linux-4.4.14/fs/fat/ |
D | file.c | 324 umode_t mask, perm; in fat_sanitize_mode() local 336 perm = *mode_ptr & ~(S_IFMT | mask); in fat_sanitize_mode() 344 if ((perm & (S_IRUGO | S_IXUGO)) != (inode->i_mode & (S_IRUGO|S_IXUGO))) in fat_sanitize_mode() 347 if ((perm & S_IWUGO) && ((perm & S_IWUGO) != (S_IWUGO & ~mask))) in fat_sanitize_mode() 350 if ((perm & S_IWUGO) != (S_IWUGO & ~mask)) in fat_sanitize_mode() 354 *mode_ptr &= S_IFMT | perm; in fat_sanitize_mode()
|
/linux-4.4.14/fs/9p/ |
D | vfs_inode.c | 643 struct dentry *dentry, char *extension, u32 perm, u8 mode) in v9fs_create() argument 671 err = p9_client_fcreate(ofid, name, perm, mode, extension); in v9fs_create() 677 if (!(perm & P9_DMLINK)) { in v9fs_create() 728 u32 perm = unixmode2p9mode(v9ses, mode); in v9fs_vfs_create() local 732 fid = v9fs_create(v9ses, dir, dentry, NULL, perm, P9_ORDWR); in v9fs_vfs_create() 753 u32 perm; in v9fs_vfs_mkdir() local 760 perm = unixmode2p9mode(v9ses, mode | S_IFDIR); in v9fs_vfs_mkdir() 761 fid = v9fs_create(v9ses, dir, dentry, NULL, perm, P9_OREAD); in v9fs_vfs_mkdir() 850 u32 perm; in v9fs_vfs_atomic_open() local 872 perm = unixmode2p9mode(v9ses, mode); in v9fs_vfs_atomic_open() [all …]
|
D | vfs_dir.c | 68 unsigned long perm = mistat->mode; in dt_type() local 71 if (perm & P9_DMDIR) in dt_type() 73 if (perm & P9_DMSYMLINK) in dt_type()
|
/linux-4.4.14/fs/ceph/ |
D | addr.c | 1626 struct ceph_pool_perm *perm; in __ceph_pool_perm_get() local 1633 perm = rb_entry(*p, struct ceph_pool_perm, node); in __ceph_pool_perm_get() 1634 if (pool < perm->pool) in __ceph_pool_perm_get() 1636 else if (pool > perm->pool) in __ceph_pool_perm_get() 1639 have = perm->perm; in __ceph_pool_perm_get() 1653 perm = rb_entry(parent, struct ceph_pool_perm, node); in __ceph_pool_perm_get() 1654 if (pool < perm->pool) in __ceph_pool_perm_get() 1656 else if (pool > perm->pool) in __ceph_pool_perm_get() 1659 have = perm->perm; in __ceph_pool_perm_get() 1731 perm = kmalloc(sizeof(*perm), GFP_NOFS); in __ceph_pool_perm_get() [all …]
|
D | mds_client.h | 271 int perm; member
|
/linux-4.4.14/drivers/oprofile/ |
D | oprofilefs.c | 136 const struct file_operations *fops, int perm, void *priv) in __oprofilefs_create_file() argument 147 inode = oprofilefs_get_inode(root->d_sb, S_IFREG | perm); in __oprofilefs_create_file() 207 char const *name, const struct file_operations *fops, int perm) in oprofilefs_create_file_perm() argument 209 return __oprofilefs_create_file(root, name, fops, perm, NULL); in oprofilefs_create_file_perm()
|
/linux-4.4.14/tools/testing/selftests/capabilities/ |
D | test_execve.c | 196 bool eff, bool perm, bool inh, bool ambient) in exec_other_validate_cap() argument 199 (perm ? "1" : "0"), (inh ? "1" : "0"), (ambient ? "1" : "0"), in exec_other_validate_cap() 204 static void exec_validate_cap(bool eff, bool perm, bool inh, bool ambient) in exec_validate_cap() argument 206 exec_other_validate_cap("./validate_cap", eff, perm, inh, ambient); in exec_validate_cap()
|
/linux-4.4.14/tools/lib/lockdep/uinclude/linux/ |
D | module.h | 4 #define module_param(name, type, perm) argument
|
/linux-4.4.14/drivers/staging/wilc1000/ |
D | wilc_debugfs.c | 129 int perm; member 161 info->perm, in wilc_debugfs_init()
|
/linux-4.4.14/drivers/scsi/cxlflash/ |
D | sislite.h | 442 #define SISL_RHT_FP(fmt, perm) (((fmt) << 4) | (perm)) argument
|
D | superpipe.c | 501 static void rht_format1(struct sisl_rht_entry *rhte, u64 lun_id, u32 perm, in rht_format1() argument 525 dummy.fp = SISL_RHT_FP(1U, perm); in rht_format1()
|
/linux-4.4.14/drivers/s390/block/ |
D | dasd_fba.h | 13 unsigned char perm:2; /* Permissions on this extent */ member
|
D | dasd_fba.c | 96 (data->mask).perm = 0x0; in define_extent() 98 (data->mask).perm = 0x1; in define_extent() 100 data->mask.perm = 0x2; in define_extent()
|
D | dasd_eckd.c | 263 data->mask.perm = 0x1; in define_extent() 270 data->mask.perm = 0x02; in define_extent() 282 data->mask.perm = 0x3; in define_extent() 538 dedata->mask.perm = 0x1; in prefix_LRE() 543 dedata->mask.perm = 0x1; in prefix_LRE() 551 dedata->mask.perm = 0x02; in prefix_LRE() 563 dedata->mask.perm = 0x3; in prefix_LRE() 569 dedata->mask.perm = 0x03; in prefix_LRE() 574 dedata->mask.perm = 0x02; in prefix_LRE() 3013 dedata->mask.perm = 0x1; in prepare_itcw() [all …]
|
D | dasd_eckd.h | 142 unsigned char perm:2; /* Permissions on this extent */ member
|
/linux-4.4.14/drivers/infiniband/hw/cxgb3/ |
D | cxio_hal.h | 173 enum tpt_mem_perm perm, u32 zbva, u64 to, u32 len, 176 enum tpt_mem_perm perm, u32 zbva, u64 to, u32 len,
|
D | cxio_hal.c | 699 enum tpt_mem_type type, enum tpt_mem_perm perm, in __cxio_tpt_op() argument 734 tpt.flags_pagesize_qpid = cpu_to_be32(V_TPT_PERM(perm) | in __cxio_tpt_op() 735 ((perm & TPT_MW_BIND) ? F_TPT_MW_BIND_ENABLE : 0) | in __cxio_tpt_op() 791 enum tpt_mem_perm perm, u32 zbva, u64 to, u32 len, in cxio_register_phys_mem() argument 795 return __cxio_tpt_op(rdev_p, 0, stag, 1, pdid, TPT_NON_SHARED_MR, perm, in cxio_register_phys_mem() 800 enum tpt_mem_perm perm, u32 zbva, u64 to, u32 len, in cxio_reregister_phys_mem() argument 803 return __cxio_tpt_op(rdev_p, 0, stag, 1, pdid, TPT_NON_SHARED_MR, perm, in cxio_reregister_phys_mem()
|
/linux-4.4.14/net/dns_resolver/ |
D | dns_query.c | 133 rkey->perm |= KEY_USR_VIEW; in dns_query()
|
/linux-4.4.14/kernel/ |
D | params.c | 671 BUG_ON(!kp->perm); in add_sysfs_param() 710 if ((kp->perm & (S_IWUSR | S_IWGRP | S_IWOTH)) != 0) in add_sysfs_param() 715 mk->mp->attrs[mk->mp->num].mattr.attr.mode = kp->perm; in add_sysfs_param() 751 if (kparam[i].perm == 0) in module_param_sysfs_setup() 876 if (kp->perm == 0) in param_sysfs_builtin()
|
D | audit.c | 1683 kernel_cap_t *perm = &name->fcap.permitted; in audit_log_fcaps() local 1687 if (!cap_isclear(*perm)) { in audit_log_fcaps() 1688 audit_log_cap(ab, "cap_fp", perm); in audit_log_fcaps()
|
/linux-4.4.14/include/linux/crush/ |
D | crush.h | 143 __u32 *perm; member
|
/linux-4.4.14/security/selinux/include/ |
D | avc.h | 161 u8 driver, u8 perm, struct common_audit_data *ad);
|
D | security.h | 266 extern int selinux_nlmsg_lookup(u16 sclass, u16 nlmsg_type, u32 *perm);
|
/linux-4.4.14/sound/core/seq/ |
D | seq_clientmgr.c | 2490 #define FLAG_PERM_RD(perm) ((perm) & SNDRV_SEQ_PORT_CAP_READ ? ((perm) & SNDRV_SEQ_PORT_CAP_SUBS_RE… argument 2491 #define FLAG_PERM_WR(perm) ((perm) & SNDRV_SEQ_PORT_CAP_WRITE ? ((perm) & SNDRV_SEQ_PORT_CAP_SUBS_W… argument 2492 #define FLAG_PERM_EX(perm) ((perm) & SNDRV_SEQ_PORT_CAP_NO_EXPORT ? '-' : 'e') argument 2494 #define FLAG_PERM_DUPLEX(perm) ((perm) & SNDRV_SEQ_PORT_CAP_DUPLEX ? 'X' : '-') argument
|
/linux-4.4.14/security/smack/ |
D | smackfs.c | 287 int perm = 0; in smk_perm_from_str() local 296 perm |= MAY_READ; in smk_perm_from_str() 300 perm |= MAY_WRITE; in smk_perm_from_str() 304 perm |= MAY_EXEC; in smk_perm_from_str() 308 perm |= MAY_APPEND; in smk_perm_from_str() 312 perm |= MAY_TRANSMUTE; in smk_perm_from_str() 316 perm |= MAY_LOCK; in smk_perm_from_str() 320 perm |= MAY_BRINGUP; in smk_perm_from_str() 323 return perm; in smk_perm_from_str()
|
D | smack_lsm.c | 4310 const struct cred *cred, unsigned perm) in smack_key_permission() argument 4337 if (perm & KEY_NEED_READ) in smack_key_permission() 4339 if (perm & (KEY_NEED_WRITE | KEY_NEED_LINK | KEY_NEED_SETATTR)) in smack_key_permission()
|
/linux-4.4.14/arch/sparc/mm/ |
D | iommu.c | 54 #define MKIOPTE(pfn, perm) (((((pfn)<<8) & IOPTE_PAGE) | (perm)) & ~IOPTE_WAZ) argument
|
/linux-4.4.14/drivers/net/fddi/skfp/h/ |
D | fplustm.h | 225 u_char perm ; /* flag: permanent */ member
|
/linux-4.4.14/drivers/net/wireless/libertas/ |
D | debugfs.c | 701 umode_t perm; member 762 files->perm, in lbs_debugfs_init_one() 775 files->perm, in lbs_debugfs_init_one() 788 files->perm, in lbs_debugfs_init_one()
|
/linux-4.4.14/include/net/9p/ |
D | client.h | 230 int p9_client_fcreate(struct p9_fid *fid, char *name, u32 perm, int mode,
|
/linux-4.4.14/scripts/ |
D | gen_initramfs_list.sh | 206 cat "$1" | while read type dir file perm ; do
|
/linux-4.4.14/security/apparmor/ |
D | domain.c | 151 u32 perm = dfa_user_allow(profile->xmatch, state); in __attach_match() local 153 if (perm & MAY_EXEC) { in __attach_match()
|
/linux-4.4.14/Documentation/DocBook/ |
D | kernel-api.xml.db | 291 API-kernel-to-ipc64-perm 292 API-ipc64-perm-to-ipc-perm 297 API-ipc-update-perm 578 API---audit-ipc-set-perm
|
/linux-4.4.14/drivers/ata/ |
D | libata-transport.c | 689 #define SETUP_TEMPLATE(attrb, field, perm, test) \ argument 691 i->private_##attrb[count].attr.mode = perm; \
|
/linux-4.4.14/arch/powerpc/kvm/ |
D | book3s_hv_rm_mmu.c | 976 unsigned int perm = hpte_get_skey_perm(gr, vcpu->arch.amr); in kvmppc_hpte_hv_fault() local 978 perm >>= 1; in kvmppc_hpte_hv_fault() 979 if (perm & 1) in kvmppc_hpte_hv_fault()
|
/linux-4.4.14/fs/ |
D | block_dev.c | 1175 int perm = 0; in __blkdev_get() local 1178 perm |= MAY_READ; in __blkdev_get() 1180 perm |= MAY_WRITE; in __blkdev_get() 1185 ret = devcgroup_inode_permission(bdev->bd_inode, perm); in __blkdev_get()
|
/linux-4.4.14/drivers/net/wireless/brcm80211/brcmsmac/ |
D | mac80211_if.c | 1102 u8 perm[ETH_ALEN]; in brcms_attach() local 1158 memcpy(perm, &wl->pub->cur_etheraddr, ETH_ALEN); in brcms_attach() 1159 if (WARN_ON(!is_valid_ether_addr(perm))) in brcms_attach() 1161 SET_IEEE80211_PERM_ADDR(hw, perm); in brcms_attach()
|
/linux-4.4.14/drivers/staging/lustre/lustre/mdc/ |
D | mdc_locks.c | 688 struct mdt_remote_perm *perm; in mdc_finish_enqueue() local 691 perm = req_capsule_server_swab_get(pill, &RMF_ACL, in mdc_finish_enqueue() 693 if (perm == NULL) in mdc_finish_enqueue()
|
D | mdc_request.c | 153 struct mdt_remote_perm *perm; in mdc_getattr_common() local 156 perm = req_capsule_server_swab_get(pill, &RMF_ACL, in mdc_getattr_common() 158 if (perm == NULL) in mdc_getattr_common()
|
/linux-4.4.14/Documentation/security/ |
D | keys.txt | 307 00000001 I----- 39 perm 1f3f0000 0 0 keyring _uid_ses.0: 1/4 308 00000002 I----- 2 perm 1f3f0000 0 0 keyring _uid.0: empty 309 00000007 I----- 1 perm 1f3f0000 0 0 keyring _pid.1: empty 310 0000018d I----- 1 perm 1f3f0000 0 0 keyring _pid.412: empty 311 000004d2 I--Q-- 1 perm 1f3f0000 32 -1 keyring _uid.32: 1/4 312 000004d3 I--Q-- 3 perm 1f3f0000 32 -1 keyring _uid_ses.32: empty 313 00000892 I--QU- 1 perm 1f000000 0 0 user metal:copper: 0 525 long keyctl(KEYCTL_SETPERM, key_serial_t key, key_perm_t perm); 552 <type>;<uid>;<gid>;<perm>;<description> 554 Where type and description are strings, uid and gid are decimal, and perm [all …]
|
/linux-4.4.14/drivers/net/wireless/ |
D | airo.c | 1773 static int writeWepKeyRid(struct airo_info *ai, WepKeyRid *wkr, int perm, int lock) in writeWepKeyRid() argument 1779 if (perm) { in writeWepKeyRid() 5218 u16 keylen, int perm, int lock) in set_wep_key() argument 5234 if (perm) disable_MAC(ai, lock); in set_wep_key() 5235 rc = writeWepKeyRid(ai, &wkr, perm, lock); in set_wep_key() 5236 if (perm) enable_MAC(ai, lock); in set_wep_key() 5240 static int set_wep_tx_idx(struct airo_info *ai, u16 index, int perm, int lock) in set_wep_tx_idx() argument 5250 if (perm) { in set_wep_tx_idx() 5255 rc = writeWepKeyRid(ai, &wkr, perm, lock); in set_wep_tx_idx() 5257 if (perm) in set_wep_tx_idx() [all …]
|
/linux-4.4.14/Documentation/ |
D | module-signing.txt | 181 223c7853 I------ 1 perm 1f030000 0 0 keyring .system_keyring: 1 182 …302d2d52 I------ 1 perm 1f010000 0 0 asymmetri Fedora kernel signing key: d69a84e6bce3…
|
D | gcov.txt | 222 -perm /u+r,g+r | tar cfz $DEST -P -T -
|
/linux-4.4.14/drivers/scsi/ |
D | scsi_transport_sas.c | 1725 #define SETUP_TEMPLATE(attrb, field, perm, test) \ argument 1727 i->private_##attrb[count].attr.mode = perm; \ 1732 #define SETUP_TEMPLATE_RW(attrb, field, perm, test, ro_test, ro_perm) \ argument 1734 i->private_##attrb[count].attr.mode = perm; \
|
D | scsi_transport_iscsi.c | 3941 #define iscsi_session_attr_show(param, perm) \ argument 3950 if (perm && !capable(CAP_SYS_ADMIN)) \ 3955 #define iscsi_session_attr(field, param, perm) \ argument 3956 iscsi_session_attr_show(param, perm) \
|
/linux-4.4.14/arch/sparc/include/asm/ |
D | hypervisor.h | 2672 unsigned long *perm);
|
/linux-4.4.14/drivers/infiniband/hw/cxgb4/ |
D | mem.c | 252 enum fw_ri_stag_type type, enum fw_ri_mem_perms perm, in write_tpt_entry() argument 293 tpt.locread_to_qpid = cpu_to_be32(FW_RI_TPTE_PERM_V(perm) | in write_tpt_entry()
|
/linux-4.4.14/drivers/net/fddi/skfp/ |
D | fplustm.c | 1112 if (!tb->perm) { in mac_clear_multicast() 1172 tb->perm = (can & 0x80) ? 1 : 0 ; in mac_add_multicast()
|
/linux-4.4.14/net/9p/ |
D | client.c | 1319 int p9_client_fcreate(struct p9_fid *fid, char *name, u32 perm, int mode, in p9_client_fcreate() argument 1329 fid->fid, name, perm, mode); in p9_client_fcreate() 1336 req = p9_client_rpc(clnt, P9_TCREATE, "dsdb?s", fid->fid, name, perm, in p9_client_fcreate()
|
/linux-4.4.14/fs/nfs/ |
D | nfs4idmap.c | 313 rkey->perm |= KEY_USR_VIEW; in nfs_idmap_get_key()
|
/linux-4.4.14/net/ceph/ |
D | osdmap.c | 249 b->perm = kcalloc(b->size, sizeof(u32), GFP_NOFS); in crush_decode() 250 if (b->perm == NULL) in crush_decode()
|
/linux-4.4.14/security/ |
D | security.c | 1503 const struct cred *cred, unsigned perm) in security_key_permission() argument 1505 return call_int_hook(key_permission, 0, key_ref, cred, perm); in security_key_permission()
|
/linux-4.4.14/Documentation/crypto/ |
D | asymmetric-keys.txt | 79 1a39e171 I----- 1 perm 3f010000 0 0 asymmetri modsign.0: DSA 5acc2142 []
|
/linux-4.4.14/Documentation/filesystems/ |
D | hpfs.txt | 134 to handle some HPFS386 structures like access control list or extended perm
|
/linux-4.4.14/arch/x86/kvm/ |
D | emulate.c | 2809 u16 tr, io_bitmap_ptr, perm, bit_idx = port & 0x7; in emulator_io_port_access_allowed() local 2827 r = ops->read_std(ctxt, base + io_bitmap_ptr + port/8, &perm, 2, NULL); in emulator_io_port_access_allowed() 2830 if ((perm >> bit_idx) & mask) in emulator_io_port_access_allowed()
|
/linux-4.4.14/drivers/mfd/ |
D | ab8500-debugfs.c | 120 u8 perm; member
|
/linux-4.4.14/Documentation/filesystems/cifs/ |
D | README | 386 perm Client does permission checks (vfs_permission check of uid
|