/openbmc/linux/ipc/ |
H A D | shm.c | 708 int shmflg = params->flg; in newseg() local 732 shp->shm_perm.mode = (shmflg & S_IRWXUGO); in newseg() 743 if (shmflg & SHM_HUGETLB) { in newseg() 747 hs = hstate_sizelog((shmflg >> SHM_HUGE_SHIFT) & SHM_HUGE_MASK); in newseg() 755 if (shmflg & SHM_NORESERVE) in newseg() 758 HUGETLB_SHMFS_INODE, (shmflg >> SHM_HUGE_SHIFT) & SHM_HUGE_MASK); in newseg() 764 if ((shmflg & SHM_NORESERVE) && in newseg() 831 long ksys_shmget(key_t key, size_t size, int shmflg) in ksys_shmget() argument 844 shm_params.flg = shmflg; in ksys_shmget() 850 SYSCALL_DEFINE3(shmget, key_t, key, size_t, size, int, shmflg) in SYSCALL_DEFINE3() argument [all …]
|
/openbmc/linux/include/linux/ |
H A D | shm.h | 17 long do_shmat(int shmid, char __user *shmaddr, int shmflg, unsigned long *addr, 28 int shmflg, unsigned long *addr, in do_shmat() argument
|
H A D | security.h | 465 int security_shm_associate(struct kern_ipc_perm *shp, int shmflg); 467 int security_shm_shmat(struct kern_ipc_perm *shp, char __user *shmaddr, int shmflg); 1304 int shmflg) in security_shm_associate() argument 1315 char __user *shmaddr, int shmflg) in security_shm_shmat() argument
|
H A D | lsm_hook_defs.h | 254 LSM_HOOK(int, 0, shm_associate, struct kern_ipc_perm *perm, int shmflg) 257 int shmflg)
|
H A D | syscalls.h | 729 asmlinkage long sys_shmat(int shmid, char __user *shmaddr, int shmflg); 1266 long ksys_shmget(key_t key, size_t size, int shmflg);
|
H A D | compat.h | 751 asmlinkage long compat_sys_shmat(int shmid, compat_uptr_t shmaddr, int shmflg);
|
/openbmc/linux/arch/xtensa/kernel/ |
H A D | syscall.c | 39 asmlinkage long xtensa_shmat(int shmid, char __user *shmaddr, int shmflg) in xtensa_shmat() argument 44 err = do_shmat(shmid, shmaddr, shmflg, &ret, SHMLBA); in xtensa_shmat()
|
/openbmc/qemu/linux-user/ |
H A D | mmap.c | 1291 abi_ulong shmaddr, int shmflg) in target_shmat() argument 1314 if (shmflg & SHM_RND) { in target_shmat() 1322 if (shmaddr == 0 && (shmflg & SHM_REMAP)) { in target_shmat() 1341 if (shmflg & SHM_REMAP) { in target_shmat() 1346 shmflg &= ~SHM_RND; in target_shmat() 1373 } else if (shmflg & SHM_REMAP) { in target_shmat() 1400 int mmap_p = PROT_READ | (shmflg & SHM_RDONLY ? 0 : PROT_WRITE); in target_shmat() 1402 | (reserved_va || mapped || (shmflg & SHM_REMAP) in target_shmat() 1419 shmflg |= SHM_REMAP; in target_shmat() 1421 test = shmat(shmid, want, shmflg); in target_shmat() [all …]
|
H A D | user-mmap.h | 62 abi_ulong shmaddr, int shmflg);
|
/openbmc/qemu/bsd-user/ |
H A D | bsd-mem.h | 349 static inline abi_long do_bsd_shmat(int shmid, abi_ulong shmaddr, int shmflg) in do_bsd_shmat() argument 370 host_raddr = shmat(shmid, (void *)g2h_untagged(shmaddr), shmflg); in do_bsd_shmat() 380 shmflg | SHM_REMAP); in do_bsd_shmat() 390 (shmflg & SHM_RDONLY ? 0 : PAGE_WRITE)); in do_bsd_shmat()
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-benchmark/libhugetlbfs/files/ |
H A D | 0009-shm.c-Mark-glibc-specific-changes-so.patch | 29 static int syscall_shmget(key_t key, size_t size, int shmflg)
|
/openbmc/linux/security/ |
H A D | security.c | 3685 int security_shm_associate(struct kern_ipc_perm *shp, int shmflg) in security_shm_associate() argument 3687 return call_int_hook(shm_associate, 0, shp, shmflg); in security_shm_associate() 3718 char __user *shmaddr, int shmflg) in security_shm_shmat() argument 3720 return call_int_hook(shm_shmat, 0, shp, shmaddr, shmflg); in security_shm_shmat()
|
/openbmc/linux/security/smack/ |
H A D | smack_lsm.c | 3129 static int smack_shm_associate(struct kern_ipc_perm *isp, int shmflg) in smack_shm_associate() argument 3133 may = smack_flags_to_may(shmflg); in smack_shm_associate() 3181 int shmflg) in smack_shm_shmat() argument 3185 may = smack_flags_to_may(shmflg); in smack_shm_shmat()
|
/openbmc/linux/security/selinux/ |
H A D | hooks.c | 6147 static int selinux_shm_associate(struct kern_ipc_perm *shp, int shmflg) in selinux_shm_associate() argument 6196 char __user *shmaddr, int shmflg) in selinux_shm_shmat() argument 6200 if (shmflg & SHM_RDONLY) in selinux_shm_shmat()
|