/Linux-v6.1/include/uapi/linux/ |
D | capability.h | 170 * Allow taking bits out of capability bounding set 171 * Allow modification of the securebits for a process 176 /* Allow modification of S_IMMUTABLE and S_APPEND file attributes */ 185 /* Allow broadcasting, listen to multicast */ 189 /* Allow interface configuration */ 190 /* Allow administration of IP firewall, masquerading and accounting */ 191 /* Allow setting debug option on sockets */ 192 /* Allow modification of routing tables */ 193 /* Allow setting arbitrary process / process group ownership on 195 /* Allow binding to any address for transparent proxying (also via NET_RAW) */ [all …]
|
/Linux-v6.1/drivers/nfc/st-nci/ |
D | st-nci.h | 65 * @FACTORY_MODE: Allow to set the driver into a mode where no secure element 67 * @HCI_CLEAR_ALL_PIPES: Allow to execute a HCI clear all pipes command. 69 * @HCI_DM_PUT_DATA: Allow to configure specific CLF registry as for example 71 * @HCI_DM_UPDATE_AID: Allow to configure an AID routing into the CLF routing 73 * @HCI_DM_GET_INFO: Allow to retrieve CLF information. 74 * @HCI_DM_GET_DATA: Allow to retrieve CLF configurable data such as low 76 * @HCI_DM_DIRECT_LOAD: Allow to load a firmware into the CLF. A complete 78 * @HCI_DM_RESET: Allow to run a CLF reset in order to "commit" CLF 80 * @HCI_GET_PARAM: Allow to retrieve an HCI CLF parameter (for example the 82 * @HCI_DM_FIELD_GENERATOR: Allow to generate different kind of RF [all …]
|
/Linux-v6.1/tools/testing/selftests/tc-testing/tc-tests/actions/ |
D | ife.json | 17 "cmdUnderTest": "$TC actions add action ife encode allow mark pass index 2", 20 …"matchPattern": "action order [0-9]*: ife encode action pass.*type 0[xX]ED3E.*allow mark.*index 2", 65 "cmdUnderTest": "$TC actions add action ife encode allow mark continue index 2", 68 …"matchPattern": "action order [0-9]*: ife encode action continue.*type 0[xX]ED3E.*allow mark.*inde… 207 "cmdUnderTest": "$TC actions add action ife encode allow prio pass index 9", 210 …"matchPattern": "action order [0-9]*: ife encode action pass.*type 0[xX]ED3E.*allow prio.*index 9", 279 "cmdUnderTest": "$TC actions add action ife encode allow prio drop index 9", 282 …"matchPattern": "action order [0-9]*: ife encode action drop.*type 0[xX]ED3E.*allow prio.*index 9", 397 "cmdUnderTest": "$TC actions add action ife encode allow tcindex pass index 1", 400 …"matchPattern": "action order [0-9]*: ife encode action pass.*type 0[xX]ED3E.*allow tcindex.*index… [all …]
|
/Linux-v6.1/security/apparmor/include/ |
D | perms.h | 67 u32 allow; member 68 u32 audit; /* set only when allow is set */ 70 u32 deny; /* explicit deny, or conflict if allow also set */ 71 u32 quiet; /* set only when ~allow | deny */ 72 u32 kill; /* set only when ~allow | deny */ 73 u32 stop; /* set only when ~allow | deny */ 75 u32 complain; /* accumulates only used when ~allow & ~deny */ 76 u32 cond; /* set only when ~allow and ~deny */ 78 u32 hide; /* set only when ~allow | deny */ 79 u32 prompt; /* accumulates only used when ~allow & ~deny */ [all …]
|
/Linux-v6.1/drivers/nfc/st21nfca/ |
D | st21nfca.h | 74 * @FACTORY_MODE: Allow to set the driver into a mode where no secure element 76 * @HCI_CLEAR_ALL_PIPES: Allow to execute a HCI clear all pipes command. 78 * @HCI_DM_PUT_DATA: Allow to configure specific CLF registry as for example 80 * @HCI_DM_UPDATE_AID: Allow to configure an AID routing into the CLF routing 82 * @HCI_DM_GET_INFO: Allow to retrieve CLF information. 83 * @HCI_DM_GET_DATA: Allow to retrieve CLF configurable data such as low 85 * @HCI_DM_LOAD: Allow to load a firmware into the CLF. A complete 87 * @HCI_DM_RESET: Allow to run a CLF reset in order to "commit" CLF 89 * @HCI_GET_PARAM: Allow to retrieve an HCI CLF parameter (for example the 91 * @HCI_DM_FIELD_GENERATOR: Allow to generate different kind of RF [all …]
|
/Linux-v6.1/drivers/gpu/drm/amd/display/dc/dcn10/ |
D | dcn10_hubbub.c | 91 void hubbub1_allow_self_refresh_control(struct hubbub *hubbub, bool allow) in hubbub1_allow_self_refresh_control() argument 95 * DCHUBBUB_ARB_ALLOW_SELF_REFRESH_FORCE_ENABLE = 1 means do not allow stutter in hubbub1_allow_self_refresh_control() 96 * DCHUBBUB_ARB_ALLOW_SELF_REFRESH_FORCE_ENABLE = 0 means allow stutter in hubbub1_allow_self_refresh_control() 101 DCHUBBUB_ARB_ALLOW_SELF_REFRESH_FORCE_ENABLE, !allow); in hubbub1_allow_self_refresh_control() 121 /* pstate latency is ~20us so if we wait over 40us and pstate allow in hubbub1_verify_allow_pstate_change_high() 137 /* we hacked to force pstate allow to prevent hang last time in hubbub1_verify_allow_pstate_change_high() 151 * 0: Pipe0 Plane0 Allow Pstate Change in hubbub1_verify_allow_pstate_change_high() 152 * 1: Pipe0 Plane1 Allow Pstate Change in hubbub1_verify_allow_pstate_change_high() 153 * 2: Pipe0 Cursor0 Allow Pstate Change in hubbub1_verify_allow_pstate_change_high() 154 * 3: Pipe0 Cursor1 Allow Pstate Change in hubbub1_verify_allow_pstate_change_high() [all …]
|
/Linux-v6.1/security/apparmor/ |
D | lib.c | 24 struct aa_perms allperms = { .allow = ALL_PERMS_MASK, 345 .allow = dfa_user_allow(dfa, state) | in aa_compute_perms() 355 perms->allow |= map_other(dfa_other_allow(dfa, state)); in aa_compute_perms() 368 accum->allow &= addend->allow & ~addend->deny; in aa_perms_accum_raw() 369 accum->audit |= addend->audit & addend->allow; in aa_perms_accum_raw() 370 accum->quiet &= addend->quiet & ~addend->allow; in aa_perms_accum_raw() 371 accum->kill |= addend->kill & ~addend->allow; in aa_perms_accum_raw() 372 accum->stop |= addend->stop & ~addend->allow; in aa_perms_accum_raw() 373 accum->complain |= addend->complain & ~addend->allow & ~addend->deny; in aa_perms_accum_raw() 374 accum->cond |= addend->cond & ~addend->allow & ~addend->deny; in aa_perms_accum_raw() [all …]
|
D | file.c | 124 aad(&sa)->request = aad(&sa)->request & ~perms->allow; in aa_audit_file() 140 aad(&sa)->denied = aad(&sa)->request & ~perms->allow; in aa_audit_file() 226 perms.allow = map_old_perms(dfa_user_allow(dfa, state)); in aa_compute_fperms() 231 perms.allow = map_old_perms(dfa_other_allow(dfa, state)); in aa_compute_fperms() 236 perms.allow |= AA_MAY_GETATTR; in aa_compute_fperms() 240 perms.allow |= AA_MAY_CHANGE_PROFILE; in aa_compute_fperms() 242 perms.allow |= AA_MAY_ONEXEC; in aa_compute_fperms() 277 if (request & ~perms->allow) in __aa_path_perm() 386 if (!(lperms.allow & AA_MAY_LINK)) in profile_path_link() 400 if (!(perms.allow & AA_MAY_LINK)) { in profile_path_link() [all …]
|
/Linux-v6.1/tools/scripts/ |
D | Makefile.include | 48 define allow-override 61 $(call allow-override,CC,$(LLVM_PREFIX)clang$(LLVM_SUFFIX)) 62 $(call allow-override,AR,$(LLVM_PREFIX)llvm-ar$(LLVM_SUFFIX)) 63 $(call allow-override,LD,$(LLVM_PREFIX)ld.lld$(LLVM_SUFFIX)) 64 $(call allow-override,CXX,$(LLVM_PREFIX)clang++$(LLVM_SUFFIX)) 65 $(call allow-override,STRIP,$(LLVM_PREFIX)llvm-strip$(LLVM_SUFFIX)) 67 # Allow setting various cross-compile vars or setting CROSS_COMPILE as a prefix. 68 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 69 $(call allow-override,AR,$(CROSS_COMPILE)ar) 70 $(call allow-override,LD,$(CROSS_COMPILE)ld) [all …]
|
/Linux-v6.1/Documentation/admin-guide/cgroup-v1/ |
D | devices.rst | 24 An entry is added using devices.allow, and removed using 27 echo 'c 1:3 mr' > /sys/fs/cgroup/1/devices.allow 36 echo a > /sys/fs/cgroup/1/devices.allow 74 A allow "b 8:* rwm", "c 116:1 rw" 103 # echo "c *:3 rwm" >A/devices.allow 113 # echo "c 2:3 rwm" >B/devices.allow 114 # echo "c 50:3 r" >B/devices.allow 118 # echo "c *:3 rwm" >B/devices.allow 120 Allowing or denying all by writing 'a' to devices.allow or devices.deny will 126 device cgroups is implemented internally using a behavior (ALLOW, DENY) and a
|
/Linux-v6.1/lib/ |
D | Kconfig.kgdb | 83 bool "KGDB: Allow debugging with traps in notifiers" 88 exception handler which will allow kgdb to step through a 108 0x0002 - allow arbitrary reads from memory and symbol lookup 109 0x0004 - allow arbitrary writes to memory 110 0x0008 - allow current register state to be inspected 111 0x0010 - allow current register state to be modified 112 0x0020 - allow passive inspection (backtrace, process list, lsmod) 113 0x0040 - allow flow control management (breakpoint, single step) 115 0x0100 - allow machine to be rebooted
|
/Linux-v6.1/arch/arm64/boot/dts/qcom/ |
D | msm8994-msft-lumia-octagon.dtsi | 589 regulator-allow-set-load; 596 regulator-allow-set-load; 604 regulator-allow-set-load; 626 regulator-allow-set-load; 634 regulator-allow-set-load; 648 regulator-allow-set-load; 673 regulator-allow-set-load; 681 regulator-allow-set-load; 689 regulator-allow-set-load; 697 regulator-allow-set-load; [all …]
|
D | sdm660-xiaomi-lavender.dts | 146 regulator-allow-set-load; 154 regulator-allow-set-load; 161 regulator-allow-set-load; 172 regulator-allow-set-load; 186 regulator-allow-set-load; 255 regulator-allow-set-load; 279 regulator-allow-set-load; 294 regulator-allow-set-load; 301 regulator-allow-set-load; 308 regulator-allow-set-load; [all …]
|
D | sda660-inforce-ifc6560.dts | 269 regulator-allow-set-load; 277 regulator-allow-set-load; 286 regulator-allow-set-load; 294 regulator-allow-set-load; 312 regulator-allow-set-load; 342 regulator-allow-set-load; 350 regulator-allow-set-load; 362 regulator-allow-set-load; 378 regulator-allow-set-load;
|
/Linux-v6.1/rust/bindings/ |
D | lib.rs | 14 #![cfg_attr(test, allow(deref_nullptr))] 15 #![cfg_attr(test, allow(unaligned_references))] 16 #![cfg_attr(test, allow(unsafe_op_in_unsafe_fn))] 17 #![allow( 41 #[allow(dead_code)]
|
/Linux-v6.1/samples/seccomp/ |
D | bpf-fancy.c | 38 SYSCALL(__NR_exit, ALLOW), in main() 39 SYSCALL(__NR_exit_group, ALLOW), in main() 51 ALLOW, in main() 68 JLT(sizeof(msg1), ALLOW), in main() 73 JLT(sizeof(msg2), ALLOW), in main() 78 JLT(sizeof(buf), ALLOW), in main()
|
/Linux-v6.1/drivers/net/wireless/ath/ |
D | hw.c | 97 * allow = (IFRAME-01 & bssid_mask) == (bssid_mask & MAC) ? 1 : 0; 98 * --> allow = (0110 & 0010) == (0010 & 0001) ? 1 : 0; 99 * --> allow = (0010) == 0000 ? 1 : 0; 100 * --> allow = 0 104 * IFRAME-02: 0001 (we should allow) 106 * allow = (IFRAME-02 & bssid_mask) == (bssid_mask & MAC) ? 1 : 0; 107 * --> allow = (0001 & 0010) == (0010 & 0001) ? 1 :0; 108 * --> allow = (0000) == (0000) 109 * --> allow = 1
|
/Linux-v6.1/arch/arm64/kvm/hyp/include/nvhe/ |
D | fixed_config.h | 17 * The ALLOW masks represent a bitmask of feature fields that are allowed 25 * The approach taken for protected VMs is to allow features that are: 33 * Allow for protected VMs: 60 * Allow for protected VMs: 70 * Allow for protected VMs: 94 * Allow for protected VMs: 112 * Allow for protected VMs:
|
/Linux-v6.1/tools/tracing/rtla/ |
D | Makefile | 11 define allow-override 17 # Allow setting CC and AR, or setting CROSS_COMPILE as a prefix. 18 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 19 $(call allow-override,AR,$(CROSS_COMPILE)ar) 20 $(call allow-override,STRIP,$(CROSS_COMPILE)strip) 21 $(call allow-override,PKG_CONFIG,pkg-config) 22 $(call allow-override,LD_SO_CONF_PATH,/etc/ld.so.conf.d/) 23 $(call allow-override,LDCONFIG,ldconfig)
|
/Linux-v6.1/fs/ocfs2/cluster/ |
D | masklog.h | 37 * indication of which bits are allowed (allow) or denied (off/deny). 43 * ERROR allow 44 * NOTICE allow 49 * write(fd, "allow", 5); 51 * Echoing allow/deny/off string into the logmask files can flip the bits 56 * echo allow >"$log_mask"/"$node" 61 * debugfs.ocfs2 -l TCP allow 100 * When enabled, allow all masks.
|
/Linux-v6.1/include/linux/ |
D | fanotify.h | 32 * We do not allow unprivileged groups to request permission events. 33 * We do not allow unprivileged groups to get other process pid in events. 34 * We do not allow unprivileged groups to use unlimited resources. 44 * FAN_CLASS_NOTIF is the only class we allow for unprivileged group. 45 * We do not allow unprivileged groups to get file descriptors in events,
|
/Linux-v6.1/fs/nfsd/ |
D | nfs4acl.c | 145 /* allocate for worst case: one (deny, allow) pair each: */ in nfsd4_get_nfs4_acl() 296 /* In the case of groups, we apply allow ACEs first, then deny ACEs, in _posix_to_nfsv4_one() 299 /* allow ACEs */ in _posix_to_nfsv4_one() 422 u32 allow; member 487 state->mask.allow |= astate->allow; in add_to_mask() 521 low_mode_from_nfs4(state->owner.allow, &pace->e_perm, flags); in posix_state_to_acl() 526 low_mode_from_nfs4(state->users->aces[i].perms.allow, in posix_state_to_acl() 534 low_mode_from_nfs4(state->group.allow, &pace->e_perm, flags); in posix_state_to_acl() 540 low_mode_from_nfs4(state->groups->aces[i].perms.allow, in posix_state_to_acl() 549 low_mode_from_nfs4(state->mask.allow, &pace->e_perm, flags); in posix_state_to_acl() [all …]
|
/Linux-v6.1/tools/testing/selftests/bpf/ |
D | test_sysctl.c | 59 .descr = "sysctl:read allow all", 92 /* else return ALLOW; */ 113 /* else return ALLOW; */ 169 /* return ALLOW; */ 196 /* return ALLOW; */ 254 /* return ALLOW; */ 296 /* return ALLOW; */ 351 /* return ALLOW; */ 400 /* return ALLOW; */ 442 /* return ALLOW; */ [all …]
|
/Linux-v6.1/drivers/misc/cb710/ |
D | debug.c | 13 static const u16 allow[CB710_REG_COUNT/16] = { variable 17 static const char *const prefix[ARRAY_SIZE(allow)] = { 26 return ((allow[block] >> offset) & mask) == mask; in allow_reg_read() 35 for (i = 0; i < ARRAY_SIZE(allow); ++i, reg += 16/(t/8)) { \ 63 for (i = 0; i < ARRAY_SIZE(allow); ++i, reg += 16/(t/8)) { \
|
/Linux-v6.1/drivers/dma-buf/ |
D | selftest.c | 54 bool allow = true; in apply_subtest_filter() local 58 allow = false; in apply_subtest_filter() 69 if (allow) in apply_subtest_filter() 77 if (allow) in apply_subtest_filter() 82 result = allow; in apply_subtest_filter()
|