Home
last modified time | relevance | path

Searched refs:perm (Results 1 – 100 of 100) sorted by relevance

/linux-4.4.14/include/linux/
Dmoduleparam.h72 const u16 perm; member
125 #define module_param(name, type, perm) \ argument
126 module_param_named(name, name, type, perm)
131 #define module_param_unsafe(name, type, perm) \ argument
132 module_param_named_unsafe(name, name, type, perm)
145 #define module_param_named(name, value, type, perm) \ argument
147 module_param_cb(name, &param_ops_##type, &value, perm); \
153 #define module_param_named_unsafe(name, value, type, perm) \ argument
155 module_param_cb_unsafe(name, &param_ops_##type, &value, perm); \
166 #define module_param_cb(name, ops, arg, perm) \ argument
[all …]
Dvt_kern.h175 int perm);
177 int perm, int console);
179 int perm);
180 extern int vt_do_kdskled(int console, int cmd, unsigned long arg, int perm);
Dkey.h154 key_perm_t perm; /* access permissions */ member
213 key_perm_t perm,
272 key_perm_t perm,
287 key_perm_t perm,
Doprofile.h131 char const * name, const struct file_operations * fops, int perm);
Dsecurity.h1522 const struct cred *cred, unsigned perm);
1540 unsigned perm) in security_key_permission() argument
Dlsm_hooks.h1604 unsigned perm);
/linux-4.4.14/drivers/vfio/pci/
Dvfio_pci_config.c118 struct perm_bits *perm, int offset, __le32 *val);
120 struct perm_bits *perm, int offset, __le32 val);
181 int count, struct perm_bits *perm, in vfio_default_config_read() argument
188 memcpy(&virt, perm->virt + offset, count); in vfio_default_config_read()
207 int count, struct perm_bits *perm, in vfio_default_config_write() argument
212 memcpy(&write, perm->write + offset, count); in vfio_default_config_write()
217 memcpy(&virt, perm->virt + offset, count); in vfio_default_config_write()
254 int count, struct perm_bits *perm, in vfio_direct_config_read() argument
279 int count, struct perm_bits *perm, in vfio_raw_config_write() argument
292 int count, struct perm_bits *perm, in vfio_raw_config_read() argument
[all …]
/linux-4.4.14/drivers/staging/lustre/lustre/llite/
Dremote_perm.c159 int ll_update_remote_perm(struct inode *inode, struct mdt_remote_perm *perm) in ll_update_remote_perm() argument
168 if (perm->rp_uid != current->uid || in ll_update_remote_perm()
169 perm->rp_gid != current->gid || in ll_update_remote_perm()
170 perm->rp_fsuid != current->fsuid || in ll_update_remote_perm()
171 perm->rp_fsgid != current->fsgid) { in ll_update_remote_perm()
175 perm->rp_uid, perm->rp_gid, perm->rp_fsuid, in ll_update_remote_perm()
176 perm->rp_fsgid, current->uid, current->gid, in ll_update_remote_perm()
197 head = lli->lli_remote_perms + remote_perm_hashfunc(perm->rp_uid); in ll_update_remote_perm()
201 if (tmp->lrp_uid != perm->rp_uid) in ll_update_remote_perm()
203 if (tmp->lrp_gid != perm->rp_gid) in ll_update_remote_perm()
[all …]
Dllite_internal.h1047 int ll_update_remote_perm(struct inode *inode, struct mdt_remote_perm *perm);
/linux-4.4.14/security/tomoyo/
Dfile.c255 if (acl->perm & (1 << r->param.path.operation)) { in tomoyo_check_path_acl()
277 return (acl->perm & (1 << r->param.path_number.operation)) && in tomoyo_check_path_number_acl()
297 return (acl->perm & (1 << r->param.path2.operation)) && in tomoyo_check_path2_acl()
316 return (acl->perm & (1 << r->param.mkdev.operation)) && in tomoyo_check_mkdev_acl()
357 ->perm; in tomoyo_merge_path_acl()
358 u16 perm = *a_perm; in tomoyo_merge_path_acl() local
359 const u16 b_perm = container_of(b, struct tomoyo_path_acl, head)->perm; in tomoyo_merge_path_acl()
361 perm &= ~b_perm; in tomoyo_merge_path_acl()
363 perm |= b_perm; in tomoyo_merge_path_acl()
364 *a_perm = perm; in tomoyo_merge_path_acl()
[all …]
Dnetwork.c234 &container_of(a, struct tomoyo_inet_acl, head)->perm; in tomoyo_merge_inet_acl()
235 u8 perm = *a_perm; in tomoyo_merge_inet_acl() local
236 const u8 b_perm = container_of(b, struct tomoyo_inet_acl, head)->perm; in tomoyo_merge_inet_acl()
239 perm &= ~b_perm; in tomoyo_merge_inet_acl()
241 perm |= b_perm; in tomoyo_merge_inet_acl()
242 *a_perm = perm; in tomoyo_merge_inet_acl()
243 return !perm; in tomoyo_merge_inet_acl()
260 &container_of(a, struct tomoyo_unix_acl, head)->perm; in tomoyo_merge_unix_acl()
261 u8 perm = *a_perm; in tomoyo_merge_unix_acl() local
262 const u8 b_perm = container_of(b, struct tomoyo_unix_acl, head)->perm; in tomoyo_merge_unix_acl()
[all …]
Dutil.c1037 u16 perm; in tomoyo_domain_quota_is_ok() local
1043 perm = container_of(ptr, struct tomoyo_path_acl, head) in tomoyo_domain_quota_is_ok()
1044 ->perm; in tomoyo_domain_quota_is_ok()
1047 perm = container_of(ptr, struct tomoyo_path2_acl, head) in tomoyo_domain_quota_is_ok()
1048 ->perm; in tomoyo_domain_quota_is_ok()
1051 perm = container_of(ptr, struct tomoyo_path_number_acl, in tomoyo_domain_quota_is_ok()
1052 head)->perm; in tomoyo_domain_quota_is_ok()
1055 perm = container_of(ptr, struct tomoyo_mkdev_acl, in tomoyo_domain_quota_is_ok()
1056 head)->perm; in tomoyo_domain_quota_is_ok()
1059 perm = container_of(ptr, struct tomoyo_inet_acl, in tomoyo_domain_quota_is_ok()
[all …]
Dcommon.c1376 const u16 perm = ptr->perm; in tomoyo_print_entry() local
1378 if (!(perm & (1 << bit))) in tomoyo_print_entry()
1405 const u8 perm = ptr->perm; in tomoyo_print_entry() local
1407 if (!(perm & (1 << bit))) in tomoyo_print_entry()
1425 const u8 perm = ptr->perm; in tomoyo_print_entry() local
1427 if (!(perm & (1 << bit))) in tomoyo_print_entry()
1445 const u8 perm = ptr->perm; in tomoyo_print_entry() local
1447 if (!(perm & (1 << bit))) in tomoyo_print_entry()
1467 const u8 perm = ptr->perm; in tomoyo_print_entry() local
1470 if (!(perm & (1 << bit))) in tomoyo_print_entry()
[all …]
Dtomoyo.c234 const unsigned int perm = mode & S_IALLUGO; in tomoyo_path_mknod() local
246 return tomoyo_mkdev_perm(type, &path, perm, dev); in tomoyo_path_mknod()
256 return tomoyo_path_number_perm(type, &path, perm); in tomoyo_path_mknod()
Dcommon.h706 u16 perm; /* Bitmask of values in "enum tomoyo_path_acl_index". */ member
717 u8 perm; member
725 u8 perm; /* Bitmask of values in "enum tomoyo_mkdev_acl_index". */ member
737 u8 perm; /* Bitmask of values in "enum tomoyo_path2_acl_index". */ member
761 u8 perm; /* Bitmask of values in "enum tomoyo_network_acl_index" */ member
770 u8 perm; /* Bitmask of values in "enum tomoyo_network_acl_index" */ member
Ddomain.c114 ->perm == 1 << TOMOYO_TYPE_EXECUTE)) in tomoyo_update_domain()
/linux-4.4.14/security/keys/
Dpermission.c31 unsigned perm) in key_task_permission() argument
41 kperm = key->perm >> 16; in key_task_permission()
47 if (gid_valid(key->gid) && key->perm & KEY_GRP_ALL) { in key_task_permission()
49 kperm = key->perm >> 8; in key_task_permission()
55 kperm = key->perm >> 8; in key_task_permission()
61 kperm = key->perm; in key_task_permission()
69 kperm |= key->perm >> 24; in key_task_permission()
71 kperm = kperm & perm & KEY_NEED_ALL; in key_task_permission()
73 if (kperm != perm) in key_task_permission()
77 return security_key_permission(key_ref, cred, perm); in key_task_permission()
Dinternal.h157 key_perm_t perm);
174 key_perm_t perm);
179 static inline int key_permission(const key_ref_t key_ref, unsigned perm) in key_permission() argument
181 return key_task_permission(key_ref, current_cred(), perm); in key_permission()
Dkey.c226 key_perm_t perm, unsigned long flags) in key_alloc() argument
293 key->perm = perm; in key_alloc()
778 key_perm_t perm, in key_create_or_update() argument
862 if (perm == KEY_PERM_UNDEF) { in key_create_or_update()
863 perm = KEY_POS_VIEW | KEY_POS_SEARCH | KEY_POS_LINK | KEY_POS_SETATTR; in key_create_or_update()
864 perm |= KEY_USR_VIEW; in key_create_or_update()
867 perm |= KEY_POS_READ; in key_create_or_update()
871 perm |= KEY_POS_WRITE; in key_create_or_update()
876 cred->fsuid, cred->fsgid, cred, perm, flags); in key_create_or_update()
Drequest_key.c338 key_perm_t perm; in construct_alloc_key() local
348 perm = KEY_POS_VIEW | KEY_POS_SEARCH | KEY_POS_LINK | KEY_POS_SETATTR; in construct_alloc_key()
349 perm |= KEY_USR_VIEW; in construct_alloc_key()
351 perm |= KEY_POS_READ; in construct_alloc_key()
354 perm |= KEY_POS_WRITE; in construct_alloc_key()
358 perm, flags); in construct_alloc_key()
Dprocess_keys.c517 key_perm_t perm) in lookup_user_key() argument
703 if (perm) in lookup_user_key()
708 } else if (perm) { in lookup_user_key()
720 ret = key_task_permission(key_ref, ctx.cred, perm); in lookup_user_key()
Dproc.c202 if (key->perm & KEY_POS_VIEW) { in proc_keys_show()
257 key->perm, in proc_keys_show()
Dkeyctl.c596 key->perm); in keyctl_describe_key()
904 long keyctl_setperm_key(key_serial_t id, key_perm_t perm) in keyctl_setperm_key() argument
911 if (perm & ~(KEY_POS_ALL | KEY_USR_ALL | KEY_GRP_ALL | KEY_OTH_ALL)) in keyctl_setperm_key()
929 key->perm = perm; in keyctl_setperm_key()
Dgc.c230 key->perm = 0; in key_garbage_collector()
Dkeyring.c493 const struct cred *cred, key_perm_t perm, in keyring_alloc() argument
500 uid, gid, cred, perm, flags); in keyring_alloc()
/linux-4.4.14/drivers/tty/vt/
Dvt_ioctl.c223 do_fontx_ioctl(int cmd, struct consolefontdesc __user *user_cfd, int perm, struct console_font_op *… in do_fontx_ioctl() argument
233 if (!perm) in do_fontx_ioctl()
263 do_unimap_ioctl(int cmd, struct unimapdesc __user *user_ud, int perm, struct vc_data *vc) in do_unimap_ioctl() argument
275 if (!perm) in do_unimap_ioctl()
279 if (!perm && fg_console != vc->vc_num) in do_unimap_ioctl()
343 int i, perm; in vt_ioctl() local
359 perm = 0; in vt_ioctl()
361 perm = 1; in vt_ioctl()
368 if (!perm) in vt_ioctl()
382 if (!perm) in vt_ioctl()
[all …]
Dkeyboard.c1625 int vt_do_diacrit(unsigned int cmd, void __user *udp, int perm) in vt_do_diacrit() argument
1701 if (!perm) in vt_do_diacrit()
1742 if (!perm) in vt_do_diacrit()
1846 int perm) in vt_do_kbkeycode_ioctl() argument
1860 if (!perm) in vt_do_kbkeycode_ioctl()
1872 int vt_do_kdsk_ioctl(int cmd, struct kbentry __user *user_kbe, int perm, in vt_do_kdsk_ioctl() argument
1884 perm = 0; in vt_do_kdsk_ioctl()
1900 if (!perm) in vt_do_kdsk_ioctl()
1978 int vt_do_kdgkb_ioctl(int cmd, struct kbsentry __user *user_kdgkb, int perm) in vt_do_kdgkb_ioctl() argument
1991 perm = 0; in vt_do_kdgkb_ioctl()
[all …]
/linux-4.4.14/ipc/
Dutil.h142 struct ipc64_perm *perm, int extra_perm);
168 static inline void ipc_lock_object(struct kern_ipc_perm *perm) in ipc_lock_object() argument
170 spin_lock(&perm->lock); in ipc_lock_object()
173 static inline void ipc_unlock_object(struct kern_ipc_perm *perm) in ipc_unlock_object() argument
175 spin_unlock(&perm->lock); in ipc_unlock_object()
178 static inline void ipc_assert_locked_object(struct kern_ipc_perm *perm) in ipc_assert_locked_object() argument
180 assert_spin_locked(&perm->lock); in ipc_assert_locked_object()
183 static inline void ipc_unlock(struct kern_ipc_perm *perm) in ipc_unlock() argument
185 ipc_unlock_object(perm); in ipc_unlock()
197 static inline bool ipc_valid_object(struct kern_ipc_perm *perm) in ipc_valid_object() argument
[all …]
Dnamespace.c73 struct kern_ipc_perm *perm; in free_ipcs() local
82 perm = idr_find(&ids->ipcs_idr, next_id); in free_ipcs()
83 if (perm == NULL) in free_ipcs()
86 ipc_lock_object(perm); in free_ipcs()
87 free(ns, perm); in free_ipcs()
Dutil.c689 struct ipc64_perm *perm, int extra_perm) in ipcctl_pre_down_nolock() argument
703 audit_ipc_set_perm(extra_perm, perm->uid, in ipcctl_pre_down_nolock()
704 perm->gid, perm->mode); in ipcctl_pre_down_nolock()
/linux-4.4.14/security/selinux/
Dnlmsgtab.c28 u32 perm; member
136 static int nlmsg_perm(u16 nlmsg_type, u32 *perm, struct nlmsg_perm *tab, size_t tabsize) in nlmsg_perm() argument
142 *perm = tab[i].perm; in nlmsg_perm()
150 int selinux_nlmsg_lookup(u16 sclass, u16 nlmsg_type, u32 *perm) in selinux_nlmsg_lookup() argument
158 err = nlmsg_perm(nlmsg_type, perm, nlmsg_route_perms, in selinux_nlmsg_lookup()
163 err = nlmsg_perm(nlmsg_type, perm, nlmsg_tcpdiag_perms, in selinux_nlmsg_lookup()
169 err = nlmsg_perm(nlmsg_type, perm, nlmsg_xfrm_perms, in selinux_nlmsg_lookup()
178 *perm = NETLINK_AUDIT_SOCKET__NLMSG_RELAY; in selinux_nlmsg_lookup()
180 err = nlmsg_perm(nlmsg_type, perm, nlmsg_audit_perms, in selinux_nlmsg_lookup()
Davc.c112 int i, perm; in avc_dump_av() local
124 perm = 1; in avc_dump_av()
126 if ((perm & av) && perms[i]) { in avc_dump_av()
128 av &= ~perm; in avc_dump_av()
131 perm <<= 1; in avc_dump_av()
252 u8 perm, u8 which) in avc_xperms_has_perm() argument
258 rc = security_xperm_test(xpd->allowed->p, perm); in avc_xperms_has_perm()
261 rc = security_xperm_test(xpd->auditallow->p, perm); in avc_xperms_has_perm()
264 rc = security_xperm_test(xpd->dontaudit->p, perm); in avc_xperms_has_perm()
269 u8 driver, u8 perm) in avc_xperms_allow_perm() argument
[all …]
Dnetlabel.c376 u32 perm; in selinux_netlbl_sock_rcv_skb() local
394 perm = UDP_SOCKET__RECVFROM; in selinux_netlbl_sock_rcv_skb()
397 perm = TCP_SOCKET__RECVFROM; in selinux_netlbl_sock_rcv_skb()
400 perm = RAWIP_SOCKET__RECVFROM; in selinux_netlbl_sock_rcv_skb()
403 rc = avc_has_perm(sksec->sid, nlbl_sid, sksec->sclass, perm, ad); in selinux_netlbl_sock_rcv_skb()
Dhooks.c1485 u32 perm = 0; in signal_to_av() local
1490 perm = PROCESS__SIGCHLD; in signal_to_av()
1494 perm = PROCESS__SIGKILL; in signal_to_av()
1498 perm = PROCESS__SIGSTOP; in signal_to_av()
1502 perm = PROCESS__SIGNAL; in signal_to_av()
1506 return perm; in signal_to_av()
3479 u32 perm; in selinux_file_send_sigiotask() local
3488 perm = signal_to_av(SIGIO); /* as per send_sigio_to_task */ in selinux_file_send_sigiotask()
3490 perm = signal_to_av(signum); in selinux_file_send_sigiotask()
3493 SECCLASS_PROCESS, perm, NULL); in selinux_file_send_sigiotask()
[all …]
Dselinuxfs.c1519 static inline unsigned long sel_perm_to_ino(u16 class, u32 perm) in sel_perm_to_ino() argument
1521 return (class * (SEL_VEC_MAX + 1) + perm) | SEL_CLASS_INO_OFFSET; in sel_perm_to_ino()
/linux-4.4.14/drivers/memory/tegra/
Dmc.c264 char perm[7]; in tegra_mc_irq() local
303 perm[0] = ' '; in tegra_mc_irq()
304 perm[1] = '['; in tegra_mc_irq()
307 perm[2] = 'R'; in tegra_mc_irq()
309 perm[2] = '-'; in tegra_mc_irq()
312 perm[3] = 'W'; in tegra_mc_irq()
314 perm[3] = '-'; in tegra_mc_irq()
317 perm[4] = '-'; in tegra_mc_irq()
319 perm[4] = 'S'; in tegra_mc_irq()
321 perm[5] = ']'; in tegra_mc_irq()
[all …]
/linux-4.4.14/arch/powerpc/platforms/powernv/
Dopal-sysparam.c162 u8 *perm; in opal_sys_param_init() local
215 perm = kzalloc(sizeof(*perm) * count, GFP_KERNEL); in opal_sys_param_init()
216 if (!perm) { in opal_sys_param_init()
233 if (of_property_read_u8_array(sysparam, "param-perm", perm, count)) { in opal_sys_param_init()
261 switch (perm[i] & 3) { in opal_sys_param_init()
285 kfree(perm); in opal_sys_param_init()
294 kfree(perm); in opal_sys_param_init()
/linux-4.4.14/net/ceph/crush/
Dcrush.c48 kfree(b->h.perm); in crush_destroy_bucket_uniform()
57 kfree(b->h.perm); in crush_destroy_bucket_list()
64 kfree(b->h.perm); in crush_destroy_bucket_tree()
74 kfree(b->h.perm); in crush_destroy_bucket_straw()
82 kfree(b->h.perm); in crush_destroy_bucket_straw2()
Dmapper.c88 bucket->perm[0] = s; in bucket_perm_choose()
94 bucket->perm[i] = i; in bucket_perm_choose()
99 bucket->perm[i] = i; in bucket_perm_choose()
100 bucket->perm[bucket->perm[0]] = 0; in bucket_perm_choose()
106 dprintk(" perm_choose have %d: %d\n", i, bucket->perm[i]); in bucket_perm_choose()
114 unsigned int t = bucket->perm[p + i]; in bucket_perm_choose()
115 bucket->perm[p + i] = bucket->perm[p]; in bucket_perm_choose()
116 bucket->perm[p] = t; in bucket_perm_choose()
123 dprintk(" perm_choose %d: %d\n", i, bucket->perm[i]); in bucket_perm_choose()
125 s = bucket->perm[pr]; in bucket_perm_choose()
/linux-4.4.14/arch/x86/ras/
Dmce_amd_inj.c400 umode_t perm; member
402 { .name = "status", .fops = &status_fops, .perm = S_IRUSR | S_IWUSR },
403 { .name = "misc", .fops = &misc_fops, .perm = S_IRUSR | S_IWUSR },
404 { .name = "addr", .fops = &addr_fops, .perm = S_IRUSR | S_IWUSR },
405 { .name = "bank", .fops = &bank_fops, .perm = S_IRUSR | S_IWUSR },
406 { .name = "flags", .fops = &flags_fops, .perm = S_IRUSR | S_IWUSR },
407 { .name = "cpu", .fops = &extcpu_fops, .perm = S_IRUSR | S_IWUSR },
408 { .name = "README", .fops = &readme_fops, .perm = S_IRUSR | S_IRGRP | S_IROTH },
425 dfs_fls[i].perm, in init_mce_inject()
/linux-4.4.14/drivers/s390/char/
Dkeyboard.c333 int cmd, int perm) in do_kdsk_ioctl() argument
360 if (!perm) in do_kdsk_ioctl()
405 int cmd, int perm) in do_kdgkb_ioctl() argument
434 if (!perm) in do_kdgkb_ioctl()
465 int perm; in kbd_ioctl() local
475 perm = current->signal->tty == tty || capable(CAP_SYS_TTY_CONFIG); in kbd_ioctl()
482 return do_kdsk_ioctl(kbd, argp, cmd, perm); in kbd_ioctl()
485 return do_kdgkb_ioctl(kbd, argp, cmd, perm); in kbd_ioctl()
521 if (!perm) in kbd_ioctl()
541 if (!perm) in kbd_ioctl()
/linux-4.4.14/sound/core/seq/oss/
Dseq_oss_midi.c328 int perm; in snd_seq_oss_midi_open() local
341 perm = 0; in snd_seq_oss_midi_open()
343 perm |= PERM_WRITE; in snd_seq_oss_midi_open()
345 perm |= PERM_READ; in snd_seq_oss_midi_open()
346 perm &= mdev->flags; in snd_seq_oss_midi_open()
347 if (perm == 0) { in snd_seq_oss_midi_open()
353 if ((mdev->opened & perm) == perm) { in snd_seq_oss_midi_open()
358 perm &= ~mdev->opened; in snd_seq_oss_midi_open()
362 if (perm & PERM_WRITE) { in snd_seq_oss_midi_open()
369 if (perm & PERM_READ) { in snd_seq_oss_midi_open()
/linux-4.4.14/fs/nfsd/
Dnfs4acl.c66 mask_from_posix(unsigned short perm, unsigned int flags) in mask_from_posix() argument
72 if (perm & ACL_READ) in mask_from_posix()
74 if (perm & ACL_WRITE) in mask_from_posix()
76 if ((perm & ACL_WRITE) && (flags & NFS4_ACL_DIR)) in mask_from_posix()
78 if (perm & ACL_EXECUTE) in mask_from_posix()
84 deny_mask_from_posix(unsigned short perm, u32 flags) in deny_mask_from_posix() argument
88 if (perm & ACL_READ) in deny_mask_from_posix()
90 if (perm & ACL_WRITE) in deny_mask_from_posix()
92 if ((perm & ACL_WRITE) && (flags & NFS4_ACL_DIR)) in deny_mask_from_posix()
94 if (perm & ACL_EXECUTE) in deny_mask_from_posix()
[all …]
/linux-4.4.14/fs/fat/
Dfile.c324 umode_t mask, perm; in fat_sanitize_mode() local
336 perm = *mode_ptr & ~(S_IFMT | mask); in fat_sanitize_mode()
344 if ((perm & (S_IRUGO | S_IXUGO)) != (inode->i_mode & (S_IRUGO|S_IXUGO))) in fat_sanitize_mode()
347 if ((perm & S_IWUGO) && ((perm & S_IWUGO) != (S_IWUGO & ~mask))) in fat_sanitize_mode()
350 if ((perm & S_IWUGO) != (S_IWUGO & ~mask)) in fat_sanitize_mode()
354 *mode_ptr &= S_IFMT | perm; in fat_sanitize_mode()
/linux-4.4.14/fs/9p/
Dvfs_inode.c643 struct dentry *dentry, char *extension, u32 perm, u8 mode) in v9fs_create() argument
671 err = p9_client_fcreate(ofid, name, perm, mode, extension); in v9fs_create()
677 if (!(perm & P9_DMLINK)) { in v9fs_create()
728 u32 perm = unixmode2p9mode(v9ses, mode); in v9fs_vfs_create() local
732 fid = v9fs_create(v9ses, dir, dentry, NULL, perm, P9_ORDWR); in v9fs_vfs_create()
753 u32 perm; in v9fs_vfs_mkdir() local
760 perm = unixmode2p9mode(v9ses, mode | S_IFDIR); in v9fs_vfs_mkdir()
761 fid = v9fs_create(v9ses, dir, dentry, NULL, perm, P9_OREAD); in v9fs_vfs_mkdir()
850 u32 perm; in v9fs_vfs_atomic_open() local
872 perm = unixmode2p9mode(v9ses, mode); in v9fs_vfs_atomic_open()
[all …]
Dvfs_dir.c68 unsigned long perm = mistat->mode; in dt_type() local
71 if (perm & P9_DMDIR) in dt_type()
73 if (perm & P9_DMSYMLINK) in dt_type()
/linux-4.4.14/fs/ceph/
Daddr.c1626 struct ceph_pool_perm *perm; in __ceph_pool_perm_get() local
1633 perm = rb_entry(*p, struct ceph_pool_perm, node); in __ceph_pool_perm_get()
1634 if (pool < perm->pool) in __ceph_pool_perm_get()
1636 else if (pool > perm->pool) in __ceph_pool_perm_get()
1639 have = perm->perm; in __ceph_pool_perm_get()
1653 perm = rb_entry(parent, struct ceph_pool_perm, node); in __ceph_pool_perm_get()
1654 if (pool < perm->pool) in __ceph_pool_perm_get()
1656 else if (pool > perm->pool) in __ceph_pool_perm_get()
1659 have = perm->perm; in __ceph_pool_perm_get()
1731 perm = kmalloc(sizeof(*perm), GFP_NOFS); in __ceph_pool_perm_get()
[all …]
Dmds_client.h271 int perm; member
/linux-4.4.14/drivers/oprofile/
Doprofilefs.c136 const struct file_operations *fops, int perm, void *priv) in __oprofilefs_create_file() argument
147 inode = oprofilefs_get_inode(root->d_sb, S_IFREG | perm); in __oprofilefs_create_file()
207 char const *name, const struct file_operations *fops, int perm) in oprofilefs_create_file_perm() argument
209 return __oprofilefs_create_file(root, name, fops, perm, NULL); in oprofilefs_create_file_perm()
/linux-4.4.14/tools/testing/selftests/capabilities/
Dtest_execve.c196 bool eff, bool perm, bool inh, bool ambient) in exec_other_validate_cap() argument
199 (perm ? "1" : "0"), (inh ? "1" : "0"), (ambient ? "1" : "0"), in exec_other_validate_cap()
204 static void exec_validate_cap(bool eff, bool perm, bool inh, bool ambient) in exec_validate_cap() argument
206 exec_other_validate_cap("./validate_cap", eff, perm, inh, ambient); in exec_validate_cap()
/linux-4.4.14/tools/lib/lockdep/uinclude/linux/
Dmodule.h4 #define module_param(name, type, perm) argument
/linux-4.4.14/drivers/staging/wilc1000/
Dwilc_debugfs.c129 int perm; member
161 info->perm, in wilc_debugfs_init()
/linux-4.4.14/drivers/scsi/cxlflash/
Dsislite.h442 #define SISL_RHT_FP(fmt, perm) (((fmt) << 4) | (perm)) argument
Dsuperpipe.c501 static void rht_format1(struct sisl_rht_entry *rhte, u64 lun_id, u32 perm, in rht_format1() argument
525 dummy.fp = SISL_RHT_FP(1U, perm); in rht_format1()
/linux-4.4.14/drivers/s390/block/
Ddasd_fba.h13 unsigned char perm:2; /* Permissions on this extent */ member
Ddasd_fba.c96 (data->mask).perm = 0x0; in define_extent()
98 (data->mask).perm = 0x1; in define_extent()
100 data->mask.perm = 0x2; in define_extent()
Ddasd_eckd.c263 data->mask.perm = 0x1; in define_extent()
270 data->mask.perm = 0x02; in define_extent()
282 data->mask.perm = 0x3; in define_extent()
538 dedata->mask.perm = 0x1; in prefix_LRE()
543 dedata->mask.perm = 0x1; in prefix_LRE()
551 dedata->mask.perm = 0x02; in prefix_LRE()
563 dedata->mask.perm = 0x3; in prefix_LRE()
569 dedata->mask.perm = 0x03; in prefix_LRE()
574 dedata->mask.perm = 0x02; in prefix_LRE()
3013 dedata->mask.perm = 0x1; in prepare_itcw()
[all …]
Ddasd_eckd.h142 unsigned char perm:2; /* Permissions on this extent */ member
/linux-4.4.14/drivers/infiniband/hw/cxgb3/
Dcxio_hal.h173 enum tpt_mem_perm perm, u32 zbva, u64 to, u32 len,
176 enum tpt_mem_perm perm, u32 zbva, u64 to, u32 len,
Dcxio_hal.c699 enum tpt_mem_type type, enum tpt_mem_perm perm, in __cxio_tpt_op() argument
734 tpt.flags_pagesize_qpid = cpu_to_be32(V_TPT_PERM(perm) | in __cxio_tpt_op()
735 ((perm & TPT_MW_BIND) ? F_TPT_MW_BIND_ENABLE : 0) | in __cxio_tpt_op()
791 enum tpt_mem_perm perm, u32 zbva, u64 to, u32 len, in cxio_register_phys_mem() argument
795 return __cxio_tpt_op(rdev_p, 0, stag, 1, pdid, TPT_NON_SHARED_MR, perm, in cxio_register_phys_mem()
800 enum tpt_mem_perm perm, u32 zbva, u64 to, u32 len, in cxio_reregister_phys_mem() argument
803 return __cxio_tpt_op(rdev_p, 0, stag, 1, pdid, TPT_NON_SHARED_MR, perm, in cxio_reregister_phys_mem()
/linux-4.4.14/net/dns_resolver/
Ddns_query.c133 rkey->perm |= KEY_USR_VIEW; in dns_query()
/linux-4.4.14/kernel/
Dparams.c671 BUG_ON(!kp->perm); in add_sysfs_param()
710 if ((kp->perm & (S_IWUSR | S_IWGRP | S_IWOTH)) != 0) in add_sysfs_param()
715 mk->mp->attrs[mk->mp->num].mattr.attr.mode = kp->perm; in add_sysfs_param()
751 if (kparam[i].perm == 0) in module_param_sysfs_setup()
876 if (kp->perm == 0) in param_sysfs_builtin()
Daudit.c1683 kernel_cap_t *perm = &name->fcap.permitted; in audit_log_fcaps() local
1687 if (!cap_isclear(*perm)) { in audit_log_fcaps()
1688 audit_log_cap(ab, "cap_fp", perm); in audit_log_fcaps()
/linux-4.4.14/include/linux/crush/
Dcrush.h143 __u32 *perm; member
/linux-4.4.14/security/selinux/include/
Davc.h161 u8 driver, u8 perm, struct common_audit_data *ad);
Dsecurity.h266 extern int selinux_nlmsg_lookup(u16 sclass, u16 nlmsg_type, u32 *perm);
/linux-4.4.14/sound/core/seq/
Dseq_clientmgr.c2490 #define FLAG_PERM_RD(perm) ((perm) & SNDRV_SEQ_PORT_CAP_READ ? ((perm) & SNDRV_SEQ_PORT_CAP_SUBS_RE… argument
2491 #define FLAG_PERM_WR(perm) ((perm) & SNDRV_SEQ_PORT_CAP_WRITE ? ((perm) & SNDRV_SEQ_PORT_CAP_SUBS_W… argument
2492 #define FLAG_PERM_EX(perm) ((perm) & SNDRV_SEQ_PORT_CAP_NO_EXPORT ? '-' : 'e') argument
2494 #define FLAG_PERM_DUPLEX(perm) ((perm) & SNDRV_SEQ_PORT_CAP_DUPLEX ? 'X' : '-') argument
/linux-4.4.14/security/smack/
Dsmackfs.c287 int perm = 0; in smk_perm_from_str() local
296 perm |= MAY_READ; in smk_perm_from_str()
300 perm |= MAY_WRITE; in smk_perm_from_str()
304 perm |= MAY_EXEC; in smk_perm_from_str()
308 perm |= MAY_APPEND; in smk_perm_from_str()
312 perm |= MAY_TRANSMUTE; in smk_perm_from_str()
316 perm |= MAY_LOCK; in smk_perm_from_str()
320 perm |= MAY_BRINGUP; in smk_perm_from_str()
323 return perm; in smk_perm_from_str()
Dsmack_lsm.c4310 const struct cred *cred, unsigned perm) in smack_key_permission() argument
4337 if (perm & KEY_NEED_READ) in smack_key_permission()
4339 if (perm & (KEY_NEED_WRITE | KEY_NEED_LINK | KEY_NEED_SETATTR)) in smack_key_permission()
/linux-4.4.14/arch/sparc/mm/
Diommu.c54 #define MKIOPTE(pfn, perm) (((((pfn)<<8) & IOPTE_PAGE) | (perm)) & ~IOPTE_WAZ) argument
/linux-4.4.14/drivers/net/fddi/skfp/h/
Dfplustm.h225 u_char perm ; /* flag: permanent */ member
/linux-4.4.14/drivers/net/wireless/libertas/
Ddebugfs.c701 umode_t perm; member
762 files->perm, in lbs_debugfs_init_one()
775 files->perm, in lbs_debugfs_init_one()
788 files->perm, in lbs_debugfs_init_one()
/linux-4.4.14/include/net/9p/
Dclient.h230 int p9_client_fcreate(struct p9_fid *fid, char *name, u32 perm, int mode,
/linux-4.4.14/scripts/
Dgen_initramfs_list.sh206 cat "$1" | while read type dir file perm ; do
/linux-4.4.14/security/apparmor/
Ddomain.c151 u32 perm = dfa_user_allow(profile->xmatch, state); in __attach_match() local
153 if (perm & MAY_EXEC) { in __attach_match()
/linux-4.4.14/Documentation/DocBook/
Dkernel-api.xml.db291 API-kernel-to-ipc64-perm
292 API-ipc64-perm-to-ipc-perm
297 API-ipc-update-perm
578 API---audit-ipc-set-perm
/linux-4.4.14/drivers/ata/
Dlibata-transport.c689 #define SETUP_TEMPLATE(attrb, field, perm, test) \ argument
691 i->private_##attrb[count].attr.mode = perm; \
/linux-4.4.14/arch/powerpc/kvm/
Dbook3s_hv_rm_mmu.c976 unsigned int perm = hpte_get_skey_perm(gr, vcpu->arch.amr); in kvmppc_hpte_hv_fault() local
978 perm >>= 1; in kvmppc_hpte_hv_fault()
979 if (perm & 1) in kvmppc_hpte_hv_fault()
/linux-4.4.14/fs/
Dblock_dev.c1175 int perm = 0; in __blkdev_get() local
1178 perm |= MAY_READ; in __blkdev_get()
1180 perm |= MAY_WRITE; in __blkdev_get()
1185 ret = devcgroup_inode_permission(bdev->bd_inode, perm); in __blkdev_get()
/linux-4.4.14/drivers/net/wireless/brcm80211/brcmsmac/
Dmac80211_if.c1102 u8 perm[ETH_ALEN]; in brcms_attach() local
1158 memcpy(perm, &wl->pub->cur_etheraddr, ETH_ALEN); in brcms_attach()
1159 if (WARN_ON(!is_valid_ether_addr(perm))) in brcms_attach()
1161 SET_IEEE80211_PERM_ADDR(hw, perm); in brcms_attach()
/linux-4.4.14/drivers/staging/lustre/lustre/mdc/
Dmdc_locks.c688 struct mdt_remote_perm *perm; in mdc_finish_enqueue() local
691 perm = req_capsule_server_swab_get(pill, &RMF_ACL, in mdc_finish_enqueue()
693 if (perm == NULL) in mdc_finish_enqueue()
Dmdc_request.c153 struct mdt_remote_perm *perm; in mdc_getattr_common() local
156 perm = req_capsule_server_swab_get(pill, &RMF_ACL, in mdc_getattr_common()
158 if (perm == NULL) in mdc_getattr_common()
/linux-4.4.14/Documentation/security/
Dkeys.txt307 00000001 I----- 39 perm 1f3f0000 0 0 keyring _uid_ses.0: 1/4
308 00000002 I----- 2 perm 1f3f0000 0 0 keyring _uid.0: empty
309 00000007 I----- 1 perm 1f3f0000 0 0 keyring _pid.1: empty
310 0000018d I----- 1 perm 1f3f0000 0 0 keyring _pid.412: empty
311 000004d2 I--Q-- 1 perm 1f3f0000 32 -1 keyring _uid.32: 1/4
312 000004d3 I--Q-- 3 perm 1f3f0000 32 -1 keyring _uid_ses.32: empty
313 00000892 I--QU- 1 perm 1f000000 0 0 user metal:copper: 0
525 long keyctl(KEYCTL_SETPERM, key_serial_t key, key_perm_t perm);
552 <type>;<uid>;<gid>;<perm>;<description>
554 Where type and description are strings, uid and gid are decimal, and perm
[all …]
/linux-4.4.14/drivers/net/wireless/
Dairo.c1773 static int writeWepKeyRid(struct airo_info *ai, WepKeyRid *wkr, int perm, int lock) in writeWepKeyRid() argument
1779 if (perm) { in writeWepKeyRid()
5218 u16 keylen, int perm, int lock) in set_wep_key() argument
5234 if (perm) disable_MAC(ai, lock); in set_wep_key()
5235 rc = writeWepKeyRid(ai, &wkr, perm, lock); in set_wep_key()
5236 if (perm) enable_MAC(ai, lock); in set_wep_key()
5240 static int set_wep_tx_idx(struct airo_info *ai, u16 index, int perm, int lock) in set_wep_tx_idx() argument
5250 if (perm) { in set_wep_tx_idx()
5255 rc = writeWepKeyRid(ai, &wkr, perm, lock); in set_wep_tx_idx()
5257 if (perm) in set_wep_tx_idx()
[all …]
/linux-4.4.14/Documentation/
Dmodule-signing.txt181 223c7853 I------ 1 perm 1f030000 0 0 keyring .system_keyring: 1
182 …302d2d52 I------ 1 perm 1f010000 0 0 asymmetri Fedora kernel signing key: d69a84e6bce3…
Dgcov.txt222 -perm /u+r,g+r | tar cfz $DEST -P -T -
/linux-4.4.14/drivers/scsi/
Dscsi_transport_sas.c1725 #define SETUP_TEMPLATE(attrb, field, perm, test) \ argument
1727 i->private_##attrb[count].attr.mode = perm; \
1732 #define SETUP_TEMPLATE_RW(attrb, field, perm, test, ro_test, ro_perm) \ argument
1734 i->private_##attrb[count].attr.mode = perm; \
Dscsi_transport_iscsi.c3941 #define iscsi_session_attr_show(param, perm) \ argument
3950 if (perm && !capable(CAP_SYS_ADMIN)) \
3955 #define iscsi_session_attr(field, param, perm) \ argument
3956 iscsi_session_attr_show(param, perm) \
/linux-4.4.14/arch/sparc/include/asm/
Dhypervisor.h2672 unsigned long *perm);
/linux-4.4.14/drivers/infiniband/hw/cxgb4/
Dmem.c252 enum fw_ri_stag_type type, enum fw_ri_mem_perms perm, in write_tpt_entry() argument
293 tpt.locread_to_qpid = cpu_to_be32(FW_RI_TPTE_PERM_V(perm) | in write_tpt_entry()
/linux-4.4.14/drivers/net/fddi/skfp/
Dfplustm.c1112 if (!tb->perm) { in mac_clear_multicast()
1172 tb->perm = (can & 0x80) ? 1 : 0 ; in mac_add_multicast()
/linux-4.4.14/net/9p/
Dclient.c1319 int p9_client_fcreate(struct p9_fid *fid, char *name, u32 perm, int mode, in p9_client_fcreate() argument
1329 fid->fid, name, perm, mode); in p9_client_fcreate()
1336 req = p9_client_rpc(clnt, P9_TCREATE, "dsdb?s", fid->fid, name, perm, in p9_client_fcreate()
/linux-4.4.14/fs/nfs/
Dnfs4idmap.c313 rkey->perm |= KEY_USR_VIEW; in nfs_idmap_get_key()
/linux-4.4.14/net/ceph/
Dosdmap.c249 b->perm = kcalloc(b->size, sizeof(u32), GFP_NOFS); in crush_decode()
250 if (b->perm == NULL) in crush_decode()
/linux-4.4.14/security/
Dsecurity.c1503 const struct cred *cred, unsigned perm) in security_key_permission() argument
1505 return call_int_hook(key_permission, 0, key_ref, cred, perm); in security_key_permission()
/linux-4.4.14/Documentation/crypto/
Dasymmetric-keys.txt79 1a39e171 I----- 1 perm 3f010000 0 0 asymmetri modsign.0: DSA 5acc2142 []
/linux-4.4.14/Documentation/filesystems/
Dhpfs.txt134 to handle some HPFS386 structures like access control list or extended perm
/linux-4.4.14/arch/x86/kvm/
Demulate.c2809 u16 tr, io_bitmap_ptr, perm, bit_idx = port & 0x7; in emulator_io_port_access_allowed() local
2827 r = ops->read_std(ctxt, base + io_bitmap_ptr + port/8, &perm, 2, NULL); in emulator_io_port_access_allowed()
2830 if ((perm >> bit_idx) & mask) in emulator_io_port_access_allowed()
/linux-4.4.14/drivers/mfd/
Dab8500-debugfs.c120 u8 perm; member
/linux-4.4.14/Documentation/filesystems/cifs/
DREADME386 perm Client does permission checks (vfs_permission check of uid