Home
last modified time | relevance | path

Searched refs:allow (Results 1 – 25 of 864) sorted by relevance

12345678910>>...35

/Linux-v5.10/security/apparmor/
Dlib.c24 struct aa_perms allperms = { .allow = ALL_PERMS_MASK,
329 .allow = dfa_user_allow(dfa, state), in aa_compute_perms()
337 perms->allow |= map_other(dfa_other_allow(dfa, state)); in aa_compute_perms()
351 accum->allow &= addend->allow & ~addend->deny; in aa_perms_accum_raw()
352 accum->audit |= addend->audit & addend->allow; in aa_perms_accum_raw()
353 accum->quiet &= addend->quiet & ~addend->allow; in aa_perms_accum_raw()
354 accum->kill |= addend->kill & ~addend->allow; in aa_perms_accum_raw()
355 accum->stop |= addend->stop & ~addend->allow; in aa_perms_accum_raw()
356 accum->complain |= addend->complain & ~addend->allow & ~addend->deny; in aa_perms_accum_raw()
357 accum->cond |= addend->cond & ~addend->allow & ~addend->deny; in aa_perms_accum_raw()
[all …]
Dfile.c122 aad(&sa)->request = aad(&sa)->request & ~perms->allow; in aa_audit_file()
138 aad(&sa)->denied = aad(&sa)->request & ~perms->allow; in aa_audit_file()
224 perms.allow = map_old_perms(dfa_user_allow(dfa, state)); in aa_compute_fperms()
229 perms.allow = map_old_perms(dfa_other_allow(dfa, state)); in aa_compute_fperms()
234 perms.allow |= AA_MAY_GETATTR; in aa_compute_fperms()
238 perms.allow |= AA_MAY_CHANGE_PROFILE; in aa_compute_fperms()
240 perms.allow |= AA_MAY_ONEXEC; in aa_compute_fperms()
275 if (request & ~perms->allow) in __aa_path_perm()
384 if (!(lperms.allow & AA_MAY_LINK)) in profile_path_link()
398 if (!(perms.allow & AA_MAY_LINK)) { in profile_path_link()
[all …]
Dmount.c153 request = request & ~perms->allow; in audit_mount()
217 .allow = dfa_user_allow(dfa, state), in compute_mnt_perms()
270 if (perms->allow & AA_MAY_MOUNT) in do_match_mnt()
274 if (data && !binary && (perms->allow & AA_MNT_CONT_MATCH)) { in do_match_mnt()
283 if (perms->allow & AA_MAY_MOUNT) in do_match_mnt()
605 if (AA_MAY_UMOUNT & ~perms.allow) in profile_umount()
677 if (AA_MAY_PIVOTROOT & perms.allow) in build_pivotroot()
/Linux-v5.10/tools/scripts/
DMakefile.include49 define allow-override
56 $(call allow-override,CC,$(CROSS_COMPILE)gcc)
57 $(call allow-override,AR,$(CROSS_COMPILE)ar)
58 $(call allow-override,LD,$(CROSS_COMPILE)ld)
59 $(call allow-override,CXX,$(CROSS_COMPILE)g++)
60 $(call allow-override,STRIP,$(CROSS_COMPILE)strip)
/Linux-v5.10/drivers/dma-buf/
Dselftest.c54 bool allow = true; in apply_subtest_filter() local
58 allow = false; in apply_subtest_filter()
69 if (allow) in apply_subtest_filter()
77 if (allow) in apply_subtest_filter()
82 result = allow; in apply_subtest_filter()
/Linux-v5.10/drivers/misc/cb710/
Ddebug.c13 static const u16 allow[CB710_REG_COUNT/16] = { variable
17 static const char *const prefix[ARRAY_SIZE(allow)] = {
26 return ((allow[block] >> offset) & mask) == mask; in allow_reg_read()
35 for (i = 0; i < ARRAY_SIZE(allow); ++i, reg += 16/(t/8)) { \
63 for (i = 0; i < ARRAY_SIZE(allow); ++i, reg += 16/(t/8)) { \
/Linux-v5.10/Documentation/admin-guide/cgroup-v1/
Ddevices.rst24 An entry is added using devices.allow, and removed using
27 echo 'c 1:3 mr' > /sys/fs/cgroup/1/devices.allow
36 echo a > /sys/fs/cgroup/1/devices.allow
74 A allow "b 8:* rwm", "c 116:1 rw"
103 # echo "c *:3 rwm" >A/devices.allow
113 # echo "c 2:3 rwm" >B/devices.allow
114 # echo "c 50:3 r" >B/devices.allow
118 # echo "c *:3 rwm" >B/devices.allow
120 Allowing or denying all by writing 'a' to devices.allow or devices.deny will
/Linux-v5.10/tools/lib/traceevent/plugins/
DMakefile11 define allow-override
18 $(call allow-override,CC,$(CROSS_COMPILE)gcc)
19 $(call allow-override,AR,$(CROSS_COMPILE)ar)
20 $(call allow-override,NM,$(CROSS_COMPILE)nm)
21 $(call allow-override,PKG_CONFIG,pkg-config)
/Linux-v5.10/tools/lib/lockdep/
DMakefile12 define allow-override
19 $(call allow-override,CC,$(CROSS_COMPILE)gcc)
20 $(call allow-override,AR,$(CROSS_COMPILE)ar)
21 $(call allow-override,LD,$(CROSS_COMPILE)ld)
/Linux-v5.10/arch/arm/mach-s3c/
Dpm.c63 #define any_allowed(mask, allow) (((mask) & (allow)) != (allow)) argument
/Linux-v5.10/tools/build/
DMakefile9 define allow-override
15 $(call allow-override,CC,$(CROSS_COMPILE)gcc)
16 $(call allow-override,LD,$(CROSS_COMPILE)ld)
/Linux-v5.10/fs/nfsd/
Dnfs4acl.c422 u32 allow; member
487 state->mask.allow |= astate->allow; in add_to_mask()
521 low_mode_from_nfs4(state->owner.allow, &pace->e_perm, flags); in posix_state_to_acl()
526 low_mode_from_nfs4(state->users->aces[i].perms.allow, in posix_state_to_acl()
534 low_mode_from_nfs4(state->group.allow, &pace->e_perm, flags); in posix_state_to_acl()
540 low_mode_from_nfs4(state->groups->aces[i].perms.allow, in posix_state_to_acl()
549 low_mode_from_nfs4(state->mask.allow, &pace->e_perm, flags); in posix_state_to_acl()
554 low_mode_from_nfs4(state->other.allow, &pace->e_perm, flags); in posix_state_to_acl()
562 astate->allow |= mask & ~astate->deny; in allow_bits()
568 astate->deny |= mask & ~astate->allow; in deny_bits()
[all …]
/Linux-v5.10/arch/arm64/boot/dts/qcom/
Dmsm8998-clamshell.dtsi140 regulator-allow-set-load;
153 regulator-allow-set-load;
158 regulator-allow-set-load;
175 regulator-allow-set-load;
216 regulator-allow-set-load;
229 regulator-allow-set-load;
234 regulator-allow-set-load;
252 regulator-allow-set-load;
Dmsm8998-mtp.dtsi176 regulator-allow-set-load;
261 regulator-allow-set-load;
266 regulator-allow-set-load;
288 regulator-allow-set-load;
/Linux-v5.10/lib/
DKconfig.kgdb88 exception handler which will allow kgdb to step through a
108 0x0002 - allow arbitrary reads from memory and symbol lookup
109 0x0004 - allow arbitrary writes to memory
110 0x0008 - allow current register state to be inspected
111 0x0010 - allow current register state to be modified
112 0x0020 - allow passive inspection (backtrace, process list, lsmod)
113 0x0040 - allow flow control management (breakpoint, single step)
115 0x0100 - allow machine to be rebooted
/Linux-v5.10/tools/lib/traceevent/
DMakefile18 define allow-override
25 $(call allow-override,CC,$(CROSS_COMPILE)gcc)
26 $(call allow-override,AR,$(CROSS_COMPILE)ar)
27 $(call allow-override,NM,$(CROSS_COMPILE)nm)
28 $(call allow-override,PKG_CONFIG,pkg-config)
/Linux-v5.10/Documentation/ABI/testing/
Dsysfs-class-iommu7 given IOMMU here to allow association of IOMMU to
16 given device here to allow association of device to
Dsysfs-driver-pciback7 the format of DDDD:BB:DD.F-REG:SIZE:MASK will allow the guest
14 will allow the guest to read and write to the configuration
/Linux-v5.10/drivers/gpu/drm/i915/selftests/
Di915_selftest.c250 bool allow = true; in apply_subtest_filter() local
254 allow = false; in apply_subtest_filter()
265 if (allow) in apply_subtest_filter()
273 if (allow) in apply_subtest_filter()
278 result = allow; in apply_subtest_filter()
/Linux-v5.10/Documentation/networking/device_drivers/ethernet/freescale/dpaa2/
Ddpio-driver.rst33 A. allow other drivers, such as the Ethernet driver, to enqueue and dequeue
35 B. allow drivers to register callbacks for data availability notifications
37 C. allow drivers to manage hardware buffer pools
111 will typically allocate 1 DPIO object per CPU to allow queuing operations
/Linux-v5.10/tools/testing/selftests/net/
Dxfrm_policy.sh39 …rc $lnet dst $rnet dir out tmpl src $me dst $remote proto esp mode tunnel priority 100 action allow
41 …rc $rnet dst $lnet dir fwd tmpl src $remote dst $me proto esp mode tunnel priority 100 action allow
146 ip -net $ns xfrm policy add dst $plain dir out priority 10 action allow
149 …y add dst $encryptip dir out tmpl src $me dst $remote proto esp mode tunnel priority 1 action allow
273 …::0014:0000:0001 dir in tmpl src :: dst :: proto esp mode tunnel priority 100 action allow || break
276 …000 dst ff01::01 dir in tmpl src :: dst :: proto esp mode tunnel priority 100 action allow || break
/Linux-v5.10/security/lockdown/
DKconfig36 The kernel runs in integrity mode by default. Features that allow
43 allow the kernel to be modified at runtime or that permit userland
/Linux-v5.10/drivers/thermal/intel/int340x_thermal/
DKconfig24 information to allow the user to select his laptop to run without
39 the display thermal device is to allow control of the display
/Linux-v5.10/drivers/md/
Ddm-cache-policy-internal.h105 static inline void policy_allow_migrations(struct dm_cache_policy *p, bool allow) in policy_allow_migrations() argument
107 return p->allow_migrations(p, allow); in policy_allow_migrations()
/Linux-v5.10/Documentation/networking/
Dipddp.rst18 Through this driver you can either allow your Linux box to communicate
66 IP networks. Although it has been used on EtherTalk networks to allow
69 Encapsulation has been used to allow a Linux box stuck on a LocalTalk

12345678910>>...35