/kernel/linux/linux-5.10/fs/hfsplus/ |
H A D | inode.c | 507 hfsplus_get_perms(inode, &folder->permissions, 1); in hfsplus_cat_read_inode() 534 hfsplus_get_perms(inode, &file->permissions, 0); in hfsplus_cat_read_inode() 537 if (file->permissions.dev) in hfsplus_cat_read_inode() 539 be32_to_cpu(file->permissions.dev)); in hfsplus_cat_read_inode() 549 be32_to_cpu(file->permissions.dev)); in hfsplus_cat_read_inode() 595 hfsplus_cat_set_perms(inode, &folder->permissions); in hfsplus_cat_write_inode() 624 hfsplus_cat_set_perms(inode, &file->permissions); in hfsplus_cat_write_inode() 626 (file->permissions.rootflags | in hfsplus_cat_write_inode() 627 file->permissions.userflags)) in hfsplus_cat_write_inode()
|
H A D | catalog.c | 124 hfsplus_cat_set_perms(inode, &folder->permissions); in hfsplus_cat_build_record() 143 hfsplus_cat_set_perms(inode, &file->permissions); in hfsplus_cat_build_record() 156 (file->permissions.rootflags | in hfsplus_cat_build_record() 157 file->permissions.userflags)) in hfsplus_cat_build_record() 169 file->permissions.dev = in hfsplus_cat_build_record()
|
H A D | hfsplus_raw.h | 74 /* POSIX permissions */ 262 struct hfsplus_perm permissions; member 296 struct hfsplus_perm permissions; member
|
/kernel/linux/linux-6.6/fs/hfsplus/ |
H A D | inode.c | 521 hfsplus_get_perms(inode, &folder->permissions, 1); in hfsplus_cat_read_inode() 549 hfsplus_get_perms(inode, &file->permissions, 0); in hfsplus_cat_read_inode() 552 if (file->permissions.dev) in hfsplus_cat_read_inode() 554 be32_to_cpu(file->permissions.dev)); in hfsplus_cat_read_inode() 564 be32_to_cpu(file->permissions.dev)); in hfsplus_cat_read_inode() 611 hfsplus_cat_set_perms(inode, &folder->permissions); in hfsplus_cat_write_inode() 640 hfsplus_cat_set_perms(inode, &file->permissions); in hfsplus_cat_write_inode() 642 (file->permissions.rootflags | in hfsplus_cat_write_inode() 643 file->permissions.userflags)) in hfsplus_cat_write_inode()
|
H A D | catalog.c | 124 hfsplus_cat_set_perms(inode, &folder->permissions); in hfsplus_cat_build_record() 143 hfsplus_cat_set_perms(inode, &file->permissions); in hfsplus_cat_build_record() 156 (file->permissions.rootflags | in hfsplus_cat_build_record() 157 file->permissions.userflags)) in hfsplus_cat_build_record() 169 file->permissions.dev = in hfsplus_cat_build_record()
|
H A D | hfsplus_raw.h | 74 /* POSIX permissions */ 262 struct hfsplus_perm permissions; member 298 struct hfsplus_perm permissions; member
|
/kernel/linux/linux-5.10/drivers/staging/gasket/ |
H A D | gasket_core.c | 447 if (bar_desc.permissions == GASKET_NOMAP) in gasket_write_mappable_regions() 670 * Verifies that the user has permissions to perform the requested mapping and 694 "Attempting to map a region with requested permissions 0x%x, but region has permissions 0x%x.\n", in gasket_mmap_has_permissions() 721 if (coh_buff_desc.permissions != GASKET_NOMAP) { in gasket_is_coherent_region() 741 if (bar_desc.permissions != GASKET_NOMAP) { in gasket_get_bar_index() 974 ulong permissions; in gasket_mmap_coherent() local 982 permissions = driver_desc->coherent_buffer_description.permissions; in gasket_mmap_coherent() 983 if (!gasket_mmap_has_permissions(gasket_dev, vma, permissions)) { in gasket_mmap_coherent() 1016 ulong permissions; gasket_mmap() local [all...] |
H A D | gasket_core.h | 179 /* Describe the offset, size, and permissions for a device bar. */ 191 /* The permissions for this bar. (Should be VM_WRITE/VM_READ/VM_EXEC, 195 ulong permissions; member 208 /* Describes the offset, size, and permissions for a coherent buffer. */ 213 /* The permissions for this bar. (Should be VM_WRITE/VM_READ/VM_EXEC, 217 ulong permissions; member 235 /* Description of Gasket-specific permissions in the mmap field. */ 309 /* Type of the ioctl permissions check callback. See below. */ 455 * ioctl_permissions_cb: Check permissions for generic ioctls. 563 * Get the ioctl permissions callbac [all...] |
/kernel/linux/linux-5.10/security/selinux/ss/ |
H A D | constraint.h | 4 * order for one or more permissions to be granted. 58 u32 permissions; /* constrained permissions */ member 59 struct constraint_expr *expr; /* constraint on permissions */
|
H A D | policydb.h | 35 * in the configuration data: individual permissions, 48 struct symtab permissions; /* common permissions */ member 56 struct symtab permissions; /* class-specific permission symbol table */ member 57 struct constraint_node *constraints; /* constraints on class permissions */
|
H A D | policydb.c | 198 hashtab_map(&comdatum->permissions.table, perm_destroy, NULL); in common_destroy() 199 hashtab_destroy(&comdatum->permissions.table); in common_destroy() 227 hashtab_map(&cladatum->permissions.table, perm_destroy, NULL); in cls_destroy() 228 hashtab_destroy(&cladatum->permissions.table); in cls_destroy() 1151 rc = symtab_init(&comdatum->permissions, nel); in common_read() 1154 comdatum->permissions.nprim = le32_to_cpu(buf[2]); in common_read() 1161 rc = perm_read(p, &comdatum->permissions, fp); in common_read() 1224 c->permissions = le32_to_cpu(buf[0]); in read_cons_helper() 1316 rc = symtab_init(&cladatum->permissions, nel); in class_read() 1319 cladatum->permissions in class_read() [all...] |
/kernel/linux/linux-6.6/security/selinux/ss/ |
H A D | constraint.h | 4 * order for one or more permissions to be granted. 58 u32 permissions; /* constrained permissions */ member 59 struct constraint_expr *expr; /* constraint on permissions */
|
H A D | policydb.h | 35 * in the configuration data: individual permissions, 48 struct symtab permissions; /* common permissions */ member 56 struct symtab permissions; /* class-specific permission symbol table */ member 57 struct constraint_node *constraints; /* constraints on class permissions */
|
H A D | policydb.c | 194 hashtab_map(&comdatum->permissions.table, perm_destroy, NULL); in common_destroy() 195 hashtab_destroy(&comdatum->permissions.table); in common_destroy() 223 hashtab_map(&cladatum->permissions.table, perm_destroy, NULL); in cls_destroy() 224 hashtab_destroy(&cladatum->permissions.table); in cls_destroy() 1146 rc = symtab_init(&comdatum->permissions, nel); in common_read() 1149 comdatum->permissions.nprim = le32_to_cpu(buf[2]); in common_read() 1156 rc = perm_read(p, &comdatum->permissions, fp); in common_read() 1219 c->permissions = le32_to_cpu(buf[0]); in read_cons_helper() 1311 rc = symtab_init(&cladatum->permissions, nel); in class_read() 1314 cladatum->permissions in class_read() [all...] |
/kernel/linux/linux-6.6/arch/x86/include/uapi/asm/ |
H A D | sgx.h | 91 * @permissions:new permission bits for pages in range described by @offset 99 __u64 permissions; member
|
/kernel/linux/linux-5.10/arch/arc/mm/ |
H A D | tlbex.S | 313 ; VERIFY_PTE: Check if PTE permissions approp for executing code 348 ; VERIFY_PTE: Chk if PTE permissions approp for data access (R/W/R+W) 356 ; -Otherwise they are user-mode permissions, and those are exactly
|
/kernel/linux/linux-5.10/kernel/debug/kdb/ |
H A D | kdb_main.c | 201 * Update the permissions flags (kdb_cmd_enabled) to match the 253 * Check whether the flags of the current command, the permissions of the kdb 256 static bool kdb_check_flags(kdb_cmdflags_t flags, int permissions, in kdb_check_flags() argument 259 /* permissions comes from userspace so needs massaging slightly */ in kdb_check_flags() 260 permissions &= KDB_ENABLE_MASK; in kdb_check_flags() 261 permissions |= KDB_ENABLE_ALWAYS_SAFE; in kdb_check_flags() 265 permissions |= permissions << KDB_ENABLE_NO_ARGS_SHIFT; in kdb_check_flags() 269 return permissions & flags; in kdb_check_flags()
|
/kernel/linux/linux-6.6/kernel/debug/kdb/ |
H A D | kdb_main.c | 169 * Update the permissions flags (kdb_cmd_enabled) to match the 221 * Check whether the flags of the current command, the permissions of the kdb 224 static bool kdb_check_flags(kdb_cmdflags_t flags, int permissions, in kdb_check_flags() argument 227 /* permissions comes from userspace so needs massaging slightly */ in kdb_check_flags() 228 permissions &= KDB_ENABLE_MASK; in kdb_check_flags() 229 permissions |= KDB_ENABLE_ALWAYS_SAFE; in kdb_check_flags() 233 permissions |= permissions << KDB_ENABLE_NO_ARGS_SHIFT; in kdb_check_flags() 237 return permissions & flags; in kdb_check_flags()
|
/kernel/linux/linux-5.10/net/ |
H A D | sysctl_net.c | 75 .permissions = net_ctl_permissions,
|
/kernel/linux/linux-6.6/net/ |
H A D | sysctl_net.c | 75 .permissions = net_ctl_permissions,
|
/kernel/linux/linux-6.6/arch/x86/kernel/cpu/sgx/ |
H A D | ioctl.c | 184 * CPU will silently overwrite the permissions as zero, which means in sgx_validate_secinfo() 377 * A SECINFO for a TCS is required to always contain zero permissions because 381 * mmap()'s protection bits are capped by the page permissions. For each page 385 * 1. A regular page: PROT_R, PROT_W and PROT_X match the SECINFO permissions. 725 * sgx_enclave_restrict_permissions() - Restrict EPCM permissions 728 * their new permissions. 746 secinfo.flags = modp->permissions & SGX_SECINFO_PERMISSION_MASK; in sgx_enclave_restrict_permissions() 762 * Changing EPCM permissions is only supported on regular in sgx_enclave_restrict_permissions() 774 * how EPCM permissions can be relaxed from within the enclave. in sgx_enclave_restrict_permissions() 775 * ENCLS[EMODPR] can only remove existing EPCM permissions, in sgx_enclave_restrict_permissions() [all...] |
/kernel/linux/linux-5.10/arch/x86/kvm/ |
H A D | mmu.h | 189 bool fault = (mmu->permissions[index] >> pte_access) & 1; in permission_fault()
|
/kernel/linux/linux-5.10/fs/udf/ |
H A D | inode.c | 1463 iinfo->i_extraPerms = le32_to_cpu(fe->permissions) & ~FE_MAPPED_PERMS; in udf_read_inode() 1622 uint32_t permissions; in udf_convert_permissions() local 1625 permissions = le32_to_cpu(fe->permissions); in udf_convert_permissions() 1628 mode = ((permissions) & 0007) | in udf_convert_permissions() 1629 ((permissions >> 2) & 0070) | in udf_convert_permissions() 1630 ((permissions >> 4) & 0700) | in udf_convert_permissions() 1728 fe->permissions = cpu_to_le32(udfperms); in udf_update_inode()
|
/kernel/linux/linux-6.6/fs/udf/ |
H A D | inode.c | 1486 iinfo->i_extraPerms = le32_to_cpu(fe->permissions) & ~FE_MAPPED_PERMS; in udf_read_inode() 1644 uint32_t permissions; in udf_convert_permissions() local 1647 permissions = le32_to_cpu(fe->permissions); in udf_convert_permissions() 1650 mode = ((permissions) & 0007) | in udf_convert_permissions() 1651 ((permissions >> 2) & 0070) | in udf_convert_permissions() 1652 ((permissions >> 4) & 0700) | in udf_convert_permissions() 1750 fe->permissions = cpu_to_le32(udfperms); in udf_update_inode()
|
/kernel/linux/linux-5.10/drivers/infiniband/hw/efa/ |
H A D | efa_com_cmd.h | 188 /* see permissions field of struct efa_admin_reg_mr_cmd */ 189 u8 permissions; member
|