/Linux-v4.19/security/apparmor/ |
D | lib.c | 28 struct aa_perms allperms = { .allow = ALL_PERMS_MASK, 331 .allow = dfa_user_allow(dfa, state), in aa_compute_perms() 339 perms->allow |= map_other(dfa_other_allow(dfa, state)); in aa_compute_perms() 353 accum->allow &= addend->allow & ~addend->deny; in aa_perms_accum_raw() 354 accum->audit |= addend->audit & addend->allow; in aa_perms_accum_raw() 355 accum->quiet &= addend->quiet & ~addend->allow; in aa_perms_accum_raw() 356 accum->kill |= addend->kill & ~addend->allow; in aa_perms_accum_raw() 357 accum->stop |= addend->stop & ~addend->allow; in aa_perms_accum_raw() 358 accum->complain |= addend->complain & ~addend->allow & ~addend->deny; in aa_perms_accum_raw() 359 accum->cond |= addend->cond & ~addend->allow & ~addend->deny; in aa_perms_accum_raw() [all …]
|
D | file.c | 137 aad(&sa)->request = aad(&sa)->request & ~perms->allow; in aa_audit_file() 153 aad(&sa)->denied = aad(&sa)->request & ~perms->allow; in aa_audit_file() 239 perms.allow = map_old_perms(dfa_user_allow(dfa, state)); in aa_compute_fperms() 244 perms.allow = map_old_perms(dfa_other_allow(dfa, state)); in aa_compute_fperms() 249 perms.allow |= AA_MAY_GETATTR; in aa_compute_fperms() 253 perms.allow |= AA_MAY_CHANGE_PROFILE; in aa_compute_fperms() 255 perms.allow |= AA_MAY_ONEXEC; in aa_compute_fperms() 290 if (request & ~perms->allow) in __aa_path_perm() 397 if (!(lperms.allow & AA_MAY_LINK)) in profile_path_link() 411 if (!(perms.allow & AA_MAY_LINK)) { in profile_path_link() [all …]
|
D | mount.c | 156 request = request & ~perms->allow; in audit_mount() 220 .allow = dfa_user_allow(dfa, state), in compute_mnt_perms() 273 if (perms->allow & AA_MAY_MOUNT) in do_match_mnt() 277 if (data && !binary && (perms->allow & AA_MNT_CONT_MATCH)) { in do_match_mnt() 286 if (perms->allow & AA_MAY_MOUNT) in do_match_mnt() 579 if (AA_MAY_UMOUNT & ~perms.allow) in profile_umount() 648 if (AA_MAY_PIVOTROOT & perms.allow) in build_pivotroot()
|
D | domain.c | 170 if ((perms->allow & request) != request) in label_compound_match() 235 if ((perms->allow & request) != request) in label_components_match() 296 perms->allow = AA_MAY_CHANGE_PROFILE | AA_MAY_ONEXEC; in change_profile_perms() 661 if (perms.allow & MAY_EXEC) { in profile_transition() 672 perms.allow &= ~MAY_EXEC; in profile_transition() 682 perms.allow &= ~MAY_EXEC; in profile_transition() 782 if (!(perms.allow & AA_MAY_ONEXEC)) { in profile_onexec() 794 perms.allow &= ~AA_MAY_ONEXEC; in profile_onexec() 1449 perms.allow = 0; in aa_change_profile()
|
/Linux-v4.19/tools/scripts/ |
D | Makefile.include | 50 define allow-override 57 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 58 $(call allow-override,AR,$(CROSS_COMPILE)ar) 59 $(call allow-override,LD,$(CROSS_COMPILE)ld) 60 $(call allow-override,CXX,$(CROSS_COMPILE)g++) 61 $(call allow-override,STRIP,$(CROSS_COMPILE)strip)
|
/Linux-v4.19/drivers/misc/cb710/ |
D | debug.c | 16 static const u16 allow[CB710_REG_COUNT/16] = { variable 20 static const char *const prefix[ARRAY_SIZE(allow)] = { 29 return ((allow[block] >> offset) & mask) == mask; in allow_reg_read() 38 for (i = 0; i < ARRAY_SIZE(allow); ++i, reg += 16/(t/8)) { \ 66 for (i = 0; i < ARRAY_SIZE(allow); ++i, reg += 16/(t/8)) { \
|
/Linux-v4.19/Documentation/cgroup-v1/ |
D | devices.txt | 20 An entry is added using devices.allow, and removed using 23 echo 'c 1:3 mr' > /sys/fs/cgroup/1/devices.allow 32 echo a > /sys/fs/cgroup/1/devices.allow 67 A allow "b 8:* rwm", "c 116:1 rw" 92 # echo "c *:3 rwm" >A/devices.allow 100 # echo "c 2:3 rwm" >B/devices.allow 101 # echo "c 50:3 r" >B/devices.allow 103 # echo "c *:3 rwm" >B/devices.allow 105 Allowing or denying all by writing 'a' to devices.allow or devices.deny will
|
/Linux-v4.19/lib/ |
D | Kconfig.kgdb | 67 exception handler which will allow kgdb to step through a 87 0x0002 - allow arbitrary reads from memory and symbol lookup 88 0x0004 - allow arbitrary writes to memory 89 0x0008 - allow current register state to be inspected 90 0x0010 - allow current register state to be modified 91 0x0020 - allow passive inspection (backtrace, process list, lsmod) 92 0x0040 - allow flow control management (breakpoint, single step) 94 0x0100 - allow machine to be rebooted
|
/Linux-v4.19/tools/build/ |
D | Makefile | 9 define allow-override 15 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 16 $(call allow-override,LD,$(CROSS_COMPILE)ld)
|
/Linux-v4.19/tools/lib/lockdep/ |
D | Makefile | 12 define allow-override 19 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 20 $(call allow-override,AR,$(CROSS_COMPILE)ar) 21 $(call allow-override,LD,$(CROSS_COMPILE)ld)
|
/Linux-v4.19/arch/arm/plat-samsung/ |
D | pm.c | 62 #define any_allowed(mask, allow) (((mask) & (allow)) != (allow)) argument
|
/Linux-v4.19/fs/nfsd/ |
D | nfs4acl.c | 422 u32 allow; member 487 state->mask.allow |= astate->allow; in add_to_mask() 521 low_mode_from_nfs4(state->owner.allow, &pace->e_perm, flags); in posix_state_to_acl() 526 low_mode_from_nfs4(state->users->aces[i].perms.allow, in posix_state_to_acl() 534 low_mode_from_nfs4(state->group.allow, &pace->e_perm, flags); in posix_state_to_acl() 540 low_mode_from_nfs4(state->groups->aces[i].perms.allow, in posix_state_to_acl() 549 low_mode_from_nfs4(state->mask.allow, &pace->e_perm, flags); in posix_state_to_acl() 554 low_mode_from_nfs4(state->other.allow, &pace->e_perm, flags); in posix_state_to_acl() 562 astate->allow |= mask & ~astate->deny; in allow_bits() 568 astate->deny |= mask & ~astate->allow; in deny_bits() [all …]
|
/Linux-v4.19/Documentation/ABI/testing/ |
D | sysfs-class-iommu | 7 given IOMMU here to allow association of IOMMU to 16 given device here to allow association of device to
|
D | sysfs-driver-pciback | 7 the format of DDDD:BB:DD.F-REG:SIZE:MASK will allow the guest 12 will allow the guest to read and write to the configuration
|
/Linux-v4.19/tools/lib/traceevent/ |
D | Makefile | 18 define allow-override 25 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 26 $(call allow-override,AR,$(CROSS_COMPILE)ar) 27 $(call allow-override,NM,$(CROSS_COMPILE)nm)
|
/Linux-v4.19/Documentation/networking/dpaa2/ |
D | dpio-driver.rst | 30 A) allow other drivers, such as the Ethernet driver, to enqueue and dequeue 32 B) allow drivers to register callbacks for data availability notifications 34 C) allow drivers to manage hardware buffer pools 108 will typically allocate 1 DPIO object per CPU to allow queuing operations
|
/Linux-v4.19/tools/lib/bpf/ |
D | Makefile | 22 define allow-override 29 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 30 $(call allow-override,AR,$(CROSS_COMPILE)ar)
|
/Linux-v4.19/drivers/net/ethernet/mellanox/mlx5/core/ |
D | lag.c | 566 static int mlx5_lag_set_state(struct mlx5_core_dev *dev, bool allow) in mlx5_lag_set_state() argument 580 if (!mlx5_lag_check_prereq(ldev) && allow) { in mlx5_lag_set_state() 584 if (ldev->allowed == allow) in mlx5_lag_set_state() 586 ldev->allowed = allow; in mlx5_lag_set_state() 587 if ((lag_active && !allow) || allow) in mlx5_lag_set_state()
|
/Linux-v4.19/Documentation/devicetree/bindings/arm/ |
D | al,alpine.txt | 21 enable-method: must be "al,alpine-smp" to allow smp [1] 74 The System-Fabric Service Registers allow various operation on CPU and
|
/Linux-v4.19/drivers/thermal/int340x_thermal/ |
D | Kconfig | 23 information to allow the user to select his laptop to run without 38 the display thermal device is to allow control of the display
|
/Linux-v4.19/drivers/md/ |
D | dm-cache-policy-internal.h | 105 static inline void policy_allow_migrations(struct dm_cache_policy *p, bool allow) in policy_allow_migrations() argument 107 return p->allow_migrations(p, allow); in policy_allow_migrations()
|
/Linux-v4.19/security/apparmor/include/ |
D | capability.h | 33 kernel_cap_t allow; member
|
/Linux-v4.19/Documentation/networking/ |
D | ipddp.txt | 13 Through this driver you can either allow your Linux box to communicate 61 IP networks. Although it has been used on EtherTalk networks to allow 64 Encapsulation has been used to allow a Linux box stuck on a LocalTalk
|
/Linux-v4.19/Documentation/netlabel/ |
D | introduction.txt | 29 The communication layer exists to allow NetLabel configuration and monitoring 41 LSM independent which should allow multiple LSMs to leverage the same code
|
/Linux-v4.19/drivers/staging/iio/Documentation/ |
D | ring.txt | 6 comments in the source code. Note that some drivers allow buffer 22 The function pointers within here are used to allow the core to handle
|