Home
last modified time | relevance | path

Searched refs:perm (Results 1 – 25 of 161) sorted by relevance

1234567

/linux-6.12.1/include/linux/
Dmoduleparam.h73 const u16 perm; member
126 #define module_param(name, type, perm) \ argument
127 module_param_named(name, name, type, perm)
135 #define module_param_unsafe(name, type, perm) \ argument
136 module_param_named_unsafe(name, name, type, perm)
149 #define module_param_named(name, value, type, perm) \ argument
151 module_param_cb(name, &param_ops_##type, &value, perm); \
161 #define module_param_named_unsafe(name, value, type, perm) \ argument
163 module_param_cb_unsafe(name, &param_ops_##type, &value, perm); \
175 #define module_param_cb(name, ops, arg, perm) \ argument
[all …]
Dvhost_iotlb.h17 u32 perm; member
34 u64 addr, unsigned int perm, void *opaque);
36 u64 addr, unsigned int perm);
Dlsm_hook_defs.h263 LSM_HOOK(int, 0, msg_queue_alloc_security, struct kern_ipc_perm *perm)
265 struct kern_ipc_perm *perm)
266 LSM_HOOK(int, 0, msg_queue_associate, struct kern_ipc_perm *perm, int msqflg)
267 LSM_HOOK(int, 0, msg_queue_msgctl, struct kern_ipc_perm *perm, int cmd)
268 LSM_HOOK(int, 0, msg_queue_msgsnd, struct kern_ipc_perm *perm,
270 LSM_HOOK(int, 0, msg_queue_msgrcv, struct kern_ipc_perm *perm,
272 LSM_HOOK(int, 0, shm_alloc_security, struct kern_ipc_perm *perm)
273 LSM_HOOK(void, LSM_RET_VOID, shm_free_security, struct kern_ipc_perm *perm)
274 LSM_HOOK(int, 0, shm_associate, struct kern_ipc_perm *perm, int shmflg)
275 LSM_HOOK(int, 0, shm_shmctl, struct kern_ipc_perm *perm, int cmd)
[all …]
/linux-6.12.1/drivers/vfio/pci/
Dvfio_pci_config.c113 struct perm_bits *perm, int offset, __le32 *val);
115 struct perm_bits *perm, int offset, __le32 val);
176 int count, struct perm_bits *perm, in vfio_default_config_read() argument
183 memcpy(&virt, perm->virt + offset, count); in vfio_default_config_read()
202 int count, struct perm_bits *perm, in vfio_default_config_write() argument
207 memcpy(&write, perm->write + offset, count); in vfio_default_config_write()
212 memcpy(&virt, perm->virt + offset, count); in vfio_default_config_write()
249 int count, struct perm_bits *perm, in vfio_direct_config_read() argument
274 int count, struct perm_bits *perm, in vfio_raw_config_write() argument
287 int count, struct perm_bits *perm, in vfio_raw_config_read() argument
[all …]
/linux-6.12.1/security/tomoyo/
Dfile.c258 if (acl->perm & (1 << r->param.path.operation)) { in tomoyo_check_path_acl()
281 return (acl->perm & (1 << r->param.path_number.operation)) && in tomoyo_check_path_number_acl()
302 return (acl->perm & (1 << r->param.path2.operation)) && in tomoyo_check_path2_acl()
322 return (acl->perm & (1 << r->param.mkdev.operation)) && in tomoyo_check_mkdev_acl()
364 ->perm; in tomoyo_merge_path_acl()
365 u16 perm = READ_ONCE(*a_perm); in tomoyo_merge_path_acl() local
366 const u16 b_perm = container_of(b, struct tomoyo_path_acl, head)->perm; in tomoyo_merge_path_acl()
369 perm &= ~b_perm; in tomoyo_merge_path_acl()
371 perm |= b_perm; in tomoyo_merge_path_acl()
372 WRITE_ONCE(*a_perm, perm); in tomoyo_merge_path_acl()
[all …]
Dnetwork.c235 &container_of(a, struct tomoyo_inet_acl, head)->perm; in tomoyo_merge_inet_acl()
236 u8 perm = READ_ONCE(*a_perm); in tomoyo_merge_inet_acl() local
237 const u8 b_perm = container_of(b, struct tomoyo_inet_acl, head)->perm; in tomoyo_merge_inet_acl()
240 perm &= ~b_perm; in tomoyo_merge_inet_acl()
242 perm |= b_perm; in tomoyo_merge_inet_acl()
243 WRITE_ONCE(*a_perm, perm); in tomoyo_merge_inet_acl()
244 return !perm; in tomoyo_merge_inet_acl()
261 &container_of(a, struct tomoyo_unix_acl, head)->perm; in tomoyo_merge_unix_acl()
262 u8 perm = READ_ONCE(*a_perm); in tomoyo_merge_unix_acl() local
263 const u8 b_perm = container_of(b, struct tomoyo_unix_acl, head)->perm; in tomoyo_merge_unix_acl()
[all …]
Dutil.c1058 u16 perm; in tomoyo_domain_quota_is_ok() local
1069 perm = data_race(container_of(ptr, struct tomoyo_path_acl, head)->perm); in tomoyo_domain_quota_is_ok()
1072 perm = data_race(container_of(ptr, struct tomoyo_path2_acl, head)->perm); in tomoyo_domain_quota_is_ok()
1075 perm = data_race(container_of(ptr, struct tomoyo_path_number_acl, head) in tomoyo_domain_quota_is_ok()
1076 ->perm); in tomoyo_domain_quota_is_ok()
1079 perm = data_race(container_of(ptr, struct tomoyo_mkdev_acl, head)->perm); in tomoyo_domain_quota_is_ok()
1082 perm = data_race(container_of(ptr, struct tomoyo_inet_acl, head)->perm); in tomoyo_domain_quota_is_ok()
1085 perm = data_race(container_of(ptr, struct tomoyo_unix_acl, head)->perm); in tomoyo_domain_quota_is_ok()
1088 perm = 0; in tomoyo_domain_quota_is_ok()
1091 perm = 1; in tomoyo_domain_quota_is_ok()
[all …]
/linux-6.12.1/drivers/tty/vt/
Dvt_ioctl.c284 unsigned long arg, bool perm) in vt_k_ioctl() argument
293 if (!perm) in vt_k_ioctl()
307 if (!perm) in vt_k_ioctl()
377 if (!perm) in vt_k_ioctl()
397 if (!perm) in vt_k_ioctl()
420 perm = 0; in vt_k_ioctl()
421 return vt_do_kbkeycode_ioctl(cmd, up, perm); in vt_k_ioctl()
425 return vt_do_kdsk_ioctl(cmd, up, perm, console); in vt_k_ioctl()
429 return vt_do_kdgkb_ioctl(cmd, up, perm); in vt_k_ioctl()
437 return vt_do_diacrit(cmd, up, perm); in vt_k_ioctl()
[all …]
/linux-6.12.1/security/integrity/
Ddigsig.c99 key_perm_t perm, in __integrity_init_keyring() argument
106 KGIDT_INIT(0), cred, perm, in __integrity_init_keyring()
128 key_perm_t perm; in integrity_init_keyring() local
131 perm = (KEY_POS_ALL & ~KEY_POS_SETATTR) | KEY_USR_VIEW in integrity_init_keyring()
159 perm |= KEY_USR_WRITE; in integrity_init_keyring()
162 ret = __integrity_init_keyring(id, perm, restriction); in integrity_init_keyring()
169 off_t size, key_perm_t perm) in integrity_add_key() argument
178 NULL, data, size, perm, in integrity_add_key()
199 key_perm_t perm; in integrity_load_x509() local
209 perm = (KEY_POS_ALL & ~KEY_POS_SETATTR) | KEY_USR_VIEW | KEY_USR_READ; in integrity_load_x509()
[all …]
/linux-6.12.1/arch/arm64/include/asm/
Dpor.h14 u8 perm = POR_ELx_IDX(por, pkey); in por_elx_allows_read() local
16 return perm & POE_R; in por_elx_allows_read()
21 u8 perm = POR_ELx_IDX(por, pkey); in por_elx_allows_write() local
23 return perm & POE_W; in por_elx_allows_write()
28 u8 perm = POR_ELx_IDX(por, pkey); in por_elx_allows_exec() local
30 return perm & POE_X; in por_elx_allows_exec()
/linux-6.12.1/ipc/
Dutil.h183 struct ipc64_perm *perm, int extra_perm);
208 static inline void ipc_lock_object(struct kern_ipc_perm *perm) in ipc_lock_object() argument
210 spin_lock(&perm->lock); in ipc_lock_object()
213 static inline void ipc_unlock_object(struct kern_ipc_perm *perm) in ipc_unlock_object() argument
215 spin_unlock(&perm->lock); in ipc_unlock_object()
218 static inline void ipc_assert_locked_object(struct kern_ipc_perm *perm) in ipc_assert_locked_object() argument
220 assert_spin_locked(&perm->lock); in ipc_assert_locked_object()
223 static inline void ipc_unlock(struct kern_ipc_perm *perm) in ipc_unlock() argument
225 ipc_unlock_object(perm); in ipc_unlock()
237 static inline bool ipc_valid_object(struct kern_ipc_perm *perm) in ipc_valid_object() argument
[all …]
Dnamespace.c126 struct kern_ipc_perm *perm; in free_ipcs() local
135 perm = idr_find(&ids->ipcs_idr, next_id); in free_ipcs()
136 if (perm == NULL) in free_ipcs()
139 ipc_lock_object(perm); in free_ipcs()
140 free(ns, perm); in free_ipcs()
/linux-6.12.1/security/selinux/
Dnlmsgtab.c25 u32 perm; member
154 static int nlmsg_perm(u16 nlmsg_type, u32 *perm, const struct nlmsg_perm *tab, size_t tabsize) in nlmsg_perm() argument
161 *perm = tab[i].perm; in nlmsg_perm()
169 int selinux_nlmsg_lookup(u16 sclass, u16 nlmsg_type, u32 *perm) in selinux_nlmsg_lookup() argument
181 err = nlmsg_perm(nlmsg_type, perm, nlmsg_route_perms, in selinux_nlmsg_lookup()
186 err = nlmsg_perm(nlmsg_type, perm, nlmsg_tcpdiag_perms, in selinux_nlmsg_lookup()
196 err = nlmsg_perm(nlmsg_type, perm, nlmsg_xfrm_perms, in selinux_nlmsg_lookup()
205 *perm = NETLINK_AUDIT_SOCKET__NLMSG_RELAY; in selinux_nlmsg_lookup()
207 err = nlmsg_perm(nlmsg_type, perm, nlmsg_audit_perms, in selinux_nlmsg_lookup()
Davc.c191 u8 perm, u8 which) in avc_xperms_has_perm() argument
197 rc = security_xperm_test(xpd->allowed->p, perm); in avc_xperms_has_perm()
200 rc = security_xperm_test(xpd->auditallow->p, perm); in avc_xperms_has_perm()
203 rc = security_xperm_test(xpd->dontaudit->p, perm); in avc_xperms_has_perm()
208 u8 driver, u8 perm) in avc_xperms_allow_perm() argument
214 security_xperm_set(xpd->allowed->p, perm); in avc_xperms_allow_perm()
265 static inline void avc_quick_copy_xperms_decision(u8 perm, in avc_quick_copy_xperms_decision() argument
273 u8 i = perm >> 5; in avc_quick_copy_xperms_decision()
380 u8 perm, in avc_xperms_audit_required() argument
390 if (avc_xperms_has_perm(xpd, perm, XPERMS_DONTAUDIT)) in avc_xperms_audit_required()
[all …]
/linux-6.12.1/security/keys/
Dpermission.c55 kperm = key->perm >> 16; in key_task_permission()
61 if (gid_valid(key->gid) && key->perm & KEY_GRP_ALL) { in key_task_permission()
63 kperm = key->perm >> 8; in key_task_permission()
69 kperm = key->perm >> 8; in key_task_permission()
75 kperm = key->perm; in key_task_permission()
83 kperm |= key->perm >> 24; in key_task_permission()
/linux-6.12.1/security/apparmor/
Dpolicy_unpack.c646 static bool unpack_perm(struct aa_ext *e, u32 version, struct aa_perms *perm) in unpack_perm() argument
651 return aa_unpack_u32(e, &perm->allow, NULL) && in unpack_perm()
652 aa_unpack_u32(e, &perm->allow, NULL) && in unpack_perm()
653 aa_unpack_u32(e, &perm->deny, NULL) && in unpack_perm()
654 aa_unpack_u32(e, &perm->subtree, NULL) && in unpack_perm()
655 aa_unpack_u32(e, &perm->cond, NULL) && in unpack_perm()
656 aa_unpack_u32(e, &perm->kill, NULL) && in unpack_perm()
657 aa_unpack_u32(e, &perm->complain, NULL) && in unpack_perm()
658 aa_unpack_u32(e, &perm->prompt, NULL) && in unpack_perm()
659 aa_unpack_u32(e, &perm->audit, NULL) && in unpack_perm()
[all …]
/linux-6.12.1/security/integrity/platform_certs/
Dmachine_keyring.c26 key_perm_t perm; in add_to_machine_keyring() local
29 perm = (KEY_POS_ALL & ~KEY_POS_SETATTR) | KEY_USR_VIEW; in add_to_machine_keyring()
30 rc = integrity_load_cert(INTEGRITY_KEYRING_MACHINE, source, data, len, perm); in add_to_machine_keyring()
40 data, len, perm); in add_to_machine_keyring()
Dplatform_keyring.c29 key_perm_t perm; in add_to_platform_keyring() local
32 perm = (KEY_POS_ALL & ~KEY_POS_SETATTR) | KEY_USR_VIEW; in add_to_platform_keyring()
35 perm); in add_to_platform_keyring()
/linux-6.12.1/arch/powerpc/platforms/powernv/
Dopal-sysparam.c149 u8 *perm; in opal_sys_param_init() local
202 perm = kcalloc(count, sizeof(*perm), GFP_KERNEL); in opal_sys_param_init()
203 if (!perm) { in opal_sys_param_init()
220 if (of_property_read_u8_array(sysparam, "param-perm", perm, count)) { in opal_sys_param_init()
248 switch (perm[i] & 3) { in opal_sys_param_init()
272 kfree(perm); in opal_sys_param_init()
281 kfree(perm); in opal_sys_param_init()
/linux-6.12.1/drivers/vhost/
Diotlb.c52 u64 addr, unsigned int perm, in vhost_iotlb_add_range_ctx() argument
66 perm, opaque); in vhost_iotlb_add_range_ctx()
90 map->perm = perm; in vhost_iotlb_add_range_ctx()
105 u64 addr, unsigned int perm) in vhost_iotlb_add_range() argument
108 addr, perm, NULL); in vhost_iotlb_add_range()
/linux-6.12.1/drivers/iommu/amd/
Dppr.c67 int perm = 0; in ppr_flag_to_fault_perm() local
70 perm |= IOMMU_FAULT_PERM_READ; in ppr_flag_to_fault_perm()
72 perm |= IOMMU_FAULT_PERM_WRITE; in ppr_flag_to_fault_perm()
74 perm |= IOMMU_FAULT_PERM_EXEC; in ppr_flag_to_fault_perm()
76 perm |= IOMMU_FAULT_PERM_PRIV; in ppr_flag_to_fault_perm()
78 return perm; in ppr_flag_to_fault_perm()
128 event.fault.prm.perm = ppr_flag_to_fault_perm(PPR_FLAGS(raw[0])); in iommu_call_iopf_notifier()
/linux-6.12.1/arch/x86/kernel/fpu/
Dcore.c201 u64 perm; in fpu_init_guest_permissions() local
208 perm = fpuperm->__state_perm; in fpu_init_guest_permissions()
211 WRITE_ONCE(fpuperm->__state_perm, perm | FPU_GUEST_PERM_LOCKED); in fpu_init_guest_permissions()
215 gfpu->perm = perm & ~FPU_GUEST_PERM_LOCKED; in fpu_init_guest_permissions()
236 gfpu->perm = fpu_user_cfg.default_features; in fpu_alloc_guest_fpstate()
536 fpu->perm.__state_perm = fpu_kernel_cfg.default_features; in fpstate_reset()
537 fpu->perm.__state_size = fpu_kernel_cfg.default_size; in fpstate_reset()
538 fpu->perm.__user_state_size = fpu_user_cfg.default_size; in fpstate_reset()
540 fpu->guest_perm = fpu->perm; in fpstate_reset()
550 dst_fpu->perm = src_fpu->perm; in fpu_inherit_perms()
/linux-6.12.1/drivers/s390/char/
Dkeyboard.c360 int cmd, int perm) in do_kdsk_ioctl() argument
391 if (!perm) in do_kdsk_ioctl()
436 int cmd, int perm) in do_kdgkb_ioctl() argument
465 if (!perm) in do_kdgkb_ioctl()
482 int perm; in kbd_ioctl() local
492 perm = current->signal->tty == tty || capable(CAP_SYS_TTY_CONFIG); in kbd_ioctl()
499 return do_kdsk_ioctl(kbd, argp, cmd, perm); in kbd_ioctl()
502 return do_kdgkb_ioctl(kbd, argp, cmd, perm); in kbd_ioctl()
538 if (!perm) in kbd_ioctl()
558 if (!perm) in kbd_ioctl()
/linux-6.12.1/drivers/soc/qcom/
Drmtfs_mem.c265 perms[0].perm = QCOM_SCM_PERM_RW; in qcom_rmtfs_mem_probe()
269 perms[i + 1].perm = QCOM_SCM_PERM_RW; in qcom_rmtfs_mem_probe()
296 struct qcom_scm_vmperm perm; in qcom_rmtfs_mem_remove() local
299 perm.vmid = QCOM_SCM_VMID_HLOS; in qcom_rmtfs_mem_remove()
300 perm.perm = QCOM_SCM_PERM_RW; in qcom_rmtfs_mem_remove()
303 &rmtfs_mem->perms, &perm, 1); in qcom_rmtfs_mem_remove()
/linux-6.12.1/arch/x86/kernel/cpu/mce/
Dinject.c701 umode_t perm; member
703 { .name = "status", .fops = &status_fops, .perm = S_IRUSR | S_IWUSR },
704 { .name = "misc", .fops = &misc_fops, .perm = S_IRUSR | S_IWUSR },
705 { .name = "addr", .fops = &addr_fops, .perm = S_IRUSR | S_IWUSR },
706 { .name = "synd", .fops = &synd_fops, .perm = S_IRUSR | S_IWUSR },
707 { .name = "ipid", .fops = &ipid_fops, .perm = S_IRUSR | S_IWUSR },
708 { .name = "bank", .fops = &bank_fops, .perm = S_IRUSR | S_IWUSR },
709 { .name = "flags", .fops = &flags_fops, .perm = S_IRUSR | S_IWUSR },
710 { .name = "cpu", .fops = &extcpu_fops, .perm = S_IRUSR | S_IWUSR },
711 { .name = "README", .fops = &readme_fops, .perm = S_IRUSR | S_IRGRP | S_IROTH },
[all …]

1234567