| /OK3568_Linux_fs/kernel/ipc/ |
| H A D | shm.c | 695 int shmflg = params->flg; in newseg() local 719 shp->shm_perm.mode = (shmflg & S_IRWXUGO); in newseg() 730 if (shmflg & SHM_HUGETLB) { in newseg() 734 hs = hstate_sizelog((shmflg >> SHM_HUGE_SHIFT) & SHM_HUGE_MASK); in newseg() 742 if (shmflg & SHM_NORESERVE) in newseg() 746 (shmflg >> SHM_HUGE_SHIFT) & SHM_HUGE_MASK); in newseg() 752 if ((shmflg & SHM_NORESERVE) && in newseg() 821 long ksys_shmget(key_t key, size_t size, int shmflg) in ksys_shmget() argument 834 shm_params.flg = shmflg; in ksys_shmget() 840 SYSCALL_DEFINE3(shmget, key_t, key, size_t, size, int, shmflg) in SYSCALL_DEFINE3() argument [all …]
|
| /OK3568_Linux_fs/kernel/include/linux/ |
| H A D | shm.h | 17 long do_shmat(int shmid, char __user *shmaddr, int shmflg, unsigned long *addr, 28 int shmflg, unsigned long *addr, in do_shmat() argument
|
| H A D | security.h | 439 int security_shm_associate(struct kern_ipc_perm *shp, int shmflg); 441 int security_shm_shmat(struct kern_ipc_perm *shp, char __user *shmaddr, int shmflg); 1220 int shmflg) in security_shm_associate() argument 1231 char __user *shmaddr, int shmflg) in security_shm_shmat() argument
|
| H A D | lsm_hook_defs.h | 236 LSM_HOOK(int, 0, shm_associate, struct kern_ipc_perm *perm, int shmflg) 239 int shmflg)
|
| H A D | compat.h | 714 asmlinkage long compat_sys_shmat(int shmid, compat_uptr_t shmaddr, int shmflg);
|
| H A D | syscalls.h | 823 asmlinkage long sys_shmat(int shmid, char __user *shmaddr, int shmflg); 1364 long ksys_shmget(key_t key, size_t size, int shmflg);
|
| /OK3568_Linux_fs/kernel/arch/xtensa/kernel/ |
| H A D | syscall.c | 43 asmlinkage long xtensa_shmat(int shmid, char __user *shmaddr, int shmflg) in xtensa_shmat() argument 48 err = do_shmat(shmid, shmaddr, shmflg, &ret, SHMLBA); in xtensa_shmat()
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-benchmark/libhugetlbfs/files/ |
| H A D | 0004-shm.c-Mark-glibc-specific-changes-so.patch | 28 static int syscall_shmget(key_t key, size_t size, int shmflg)
|
| /OK3568_Linux_fs/kernel/security/ |
| H A D | security.c | 1907 int security_shm_associate(struct kern_ipc_perm *shp, int shmflg) in security_shm_associate() argument 1909 return call_int_hook(shm_associate, 0, shp, shmflg); in security_shm_associate() 1917 int security_shm_shmat(struct kern_ipc_perm *shp, char __user *shmaddr, int shmflg) in security_shm_shmat() argument 1919 return call_int_hook(shm_shmat, 0, shp, shmaddr, shmflg); in security_shm_shmat()
|
| /OK3568_Linux_fs/kernel/security/smack/ |
| H A D | smack_lsm.c | 2958 static int smack_shm_associate(struct kern_ipc_perm *isp, int shmflg) in smack_shm_associate() argument 2962 may = smack_flags_to_may(shmflg); in smack_shm_associate() 3010 int shmflg) in smack_shm_shmat() argument 3014 may = smack_flags_to_may(shmflg); in smack_shm_shmat()
|
| /OK3568_Linux_fs/kernel/security/selinux/ |
| H A D | hooks.c | 6172 static int selinux_shm_associate(struct kern_ipc_perm *shp, int shmflg) in selinux_shm_associate() argument 6225 char __user *shmaddr, int shmflg) in selinux_shm_shmat() argument 6229 if (shmflg & SHM_RDONLY) in selinux_shm_shmat()
|