| /Linux-v5.10/security/apparmor/ |
| D | lib.c | 24 struct aa_perms allperms = { .allow = ALL_PERMS_MASK, 329 .allow = dfa_user_allow(dfa, state), in aa_compute_perms() 337 perms->allow |= map_other(dfa_other_allow(dfa, state)); in aa_compute_perms() 351 accum->allow &= addend->allow & ~addend->deny; in aa_perms_accum_raw() 352 accum->audit |= addend->audit & addend->allow; in aa_perms_accum_raw() 353 accum->quiet &= addend->quiet & ~addend->allow; in aa_perms_accum_raw() 354 accum->kill |= addend->kill & ~addend->allow; in aa_perms_accum_raw() 355 accum->stop |= addend->stop & ~addend->allow; in aa_perms_accum_raw() 356 accum->complain |= addend->complain & ~addend->allow & ~addend->deny; in aa_perms_accum_raw() 357 accum->cond |= addend->cond & ~addend->allow & ~addend->deny; in aa_perms_accum_raw() [all …]
|
| D | file.c | 122 aad(&sa)->request = aad(&sa)->request & ~perms->allow; in aa_audit_file() 138 aad(&sa)->denied = aad(&sa)->request & ~perms->allow; in aa_audit_file() 224 perms.allow = map_old_perms(dfa_user_allow(dfa, state)); in aa_compute_fperms() 229 perms.allow = map_old_perms(dfa_other_allow(dfa, state)); in aa_compute_fperms() 234 perms.allow |= AA_MAY_GETATTR; in aa_compute_fperms() 238 perms.allow |= AA_MAY_CHANGE_PROFILE; in aa_compute_fperms() 240 perms.allow |= AA_MAY_ONEXEC; in aa_compute_fperms() 275 if (request & ~perms->allow) in __aa_path_perm() 384 if (!(lperms.allow & AA_MAY_LINK)) in profile_path_link() 398 if (!(perms.allow & AA_MAY_LINK)) { in profile_path_link() [all …]
|
| D | mount.c | 153 request = request & ~perms->allow; in audit_mount() 217 .allow = dfa_user_allow(dfa, state), in compute_mnt_perms() 270 if (perms->allow & AA_MAY_MOUNT) in do_match_mnt() 274 if (data && !binary && (perms->allow & AA_MNT_CONT_MATCH)) { in do_match_mnt() 283 if (perms->allow & AA_MAY_MOUNT) in do_match_mnt() 605 if (AA_MAY_UMOUNT & ~perms.allow) in profile_umount() 677 if (AA_MAY_PIVOTROOT & perms.allow) in build_pivotroot()
|
| /Linux-v5.10/tools/scripts/ |
| D | Makefile.include | 49 define allow-override 56 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 57 $(call allow-override,AR,$(CROSS_COMPILE)ar) 58 $(call allow-override,LD,$(CROSS_COMPILE)ld) 59 $(call allow-override,CXX,$(CROSS_COMPILE)g++) 60 $(call allow-override,STRIP,$(CROSS_COMPILE)strip)
|
| /Linux-v5.10/drivers/dma-buf/ |
| D | selftest.c | 54 bool allow = true; in apply_subtest_filter() local 58 allow = false; in apply_subtest_filter() 69 if (allow) in apply_subtest_filter() 77 if (allow) in apply_subtest_filter() 82 result = allow; in apply_subtest_filter()
|
| /Linux-v5.10/drivers/misc/cb710/ |
| D | debug.c | 13 static const u16 allow[CB710_REG_COUNT/16] = { variable 17 static const char *const prefix[ARRAY_SIZE(allow)] = { 26 return ((allow[block] >> offset) & mask) == mask; in allow_reg_read() 35 for (i = 0; i < ARRAY_SIZE(allow); ++i, reg += 16/(t/8)) { \ 63 for (i = 0; i < ARRAY_SIZE(allow); ++i, reg += 16/(t/8)) { \
|
| /Linux-v5.10/Documentation/admin-guide/cgroup-v1/ |
| D | devices.rst | 24 An entry is added using devices.allow, and removed using 27 echo 'c 1:3 mr' > /sys/fs/cgroup/1/devices.allow 36 echo a > /sys/fs/cgroup/1/devices.allow 74 A allow "b 8:* rwm", "c 116:1 rw" 103 # echo "c *:3 rwm" >A/devices.allow 113 # echo "c 2:3 rwm" >B/devices.allow 114 # echo "c 50:3 r" >B/devices.allow 118 # echo "c *:3 rwm" >B/devices.allow 120 Allowing or denying all by writing 'a' to devices.allow or devices.deny will
|
| /Linux-v5.10/tools/lib/traceevent/plugins/ |
| D | Makefile | 11 define allow-override 18 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 19 $(call allow-override,AR,$(CROSS_COMPILE)ar) 20 $(call allow-override,NM,$(CROSS_COMPILE)nm) 21 $(call allow-override,PKG_CONFIG,pkg-config)
|
| /Linux-v5.10/tools/lib/lockdep/ |
| D | Makefile | 12 define allow-override 19 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 20 $(call allow-override,AR,$(CROSS_COMPILE)ar) 21 $(call allow-override,LD,$(CROSS_COMPILE)ld)
|
| /Linux-v5.10/arch/arm/mach-s3c/ |
| D | pm.c | 63 #define any_allowed(mask, allow) (((mask) & (allow)) != (allow)) argument
|
| /Linux-v5.10/tools/build/ |
| D | Makefile | 9 define allow-override 15 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 16 $(call allow-override,LD,$(CROSS_COMPILE)ld)
|
| /Linux-v5.10/fs/nfsd/ |
| D | nfs4acl.c | 422 u32 allow; member 487 state->mask.allow |= astate->allow; in add_to_mask() 521 low_mode_from_nfs4(state->owner.allow, &pace->e_perm, flags); in posix_state_to_acl() 526 low_mode_from_nfs4(state->users->aces[i].perms.allow, in posix_state_to_acl() 534 low_mode_from_nfs4(state->group.allow, &pace->e_perm, flags); in posix_state_to_acl() 540 low_mode_from_nfs4(state->groups->aces[i].perms.allow, in posix_state_to_acl() 549 low_mode_from_nfs4(state->mask.allow, &pace->e_perm, flags); in posix_state_to_acl() 554 low_mode_from_nfs4(state->other.allow, &pace->e_perm, flags); in posix_state_to_acl() 562 astate->allow |= mask & ~astate->deny; in allow_bits() 568 astate->deny |= mask & ~astate->allow; in deny_bits() [all …]
|
| /Linux-v5.10/arch/arm64/boot/dts/qcom/ |
| D | msm8998-clamshell.dtsi | 140 regulator-allow-set-load; 153 regulator-allow-set-load; 158 regulator-allow-set-load; 175 regulator-allow-set-load; 216 regulator-allow-set-load; 229 regulator-allow-set-load; 234 regulator-allow-set-load; 252 regulator-allow-set-load;
|
| D | msm8998-mtp.dtsi | 176 regulator-allow-set-load; 261 regulator-allow-set-load; 266 regulator-allow-set-load; 288 regulator-allow-set-load;
|
| /Linux-v5.10/lib/ |
| D | Kconfig.kgdb | 88 exception handler which will allow kgdb to step through a 108 0x0002 - allow arbitrary reads from memory and symbol lookup 109 0x0004 - allow arbitrary writes to memory 110 0x0008 - allow current register state to be inspected 111 0x0010 - allow current register state to be modified 112 0x0020 - allow passive inspection (backtrace, process list, lsmod) 113 0x0040 - allow flow control management (breakpoint, single step) 115 0x0100 - allow machine to be rebooted
|
| /Linux-v5.10/tools/lib/traceevent/ |
| D | Makefile | 18 define allow-override 25 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 26 $(call allow-override,AR,$(CROSS_COMPILE)ar) 27 $(call allow-override,NM,$(CROSS_COMPILE)nm) 28 $(call allow-override,PKG_CONFIG,pkg-config)
|
| /Linux-v5.10/Documentation/ABI/testing/ |
| D | sysfs-class-iommu | 7 given IOMMU here to allow association of IOMMU to 16 given device here to allow association of device to
|
| D | sysfs-driver-pciback | 7 the format of DDDD:BB:DD.F-REG:SIZE:MASK will allow the guest 14 will allow the guest to read and write to the configuration
|
| /Linux-v5.10/drivers/gpu/drm/i915/selftests/ |
| D | i915_selftest.c | 250 bool allow = true; in apply_subtest_filter() local 254 allow = false; in apply_subtest_filter() 265 if (allow) in apply_subtest_filter() 273 if (allow) in apply_subtest_filter() 278 result = allow; in apply_subtest_filter()
|
| /Linux-v5.10/Documentation/networking/device_drivers/ethernet/freescale/dpaa2/ |
| D | dpio-driver.rst | 33 A. allow other drivers, such as the Ethernet driver, to enqueue and dequeue 35 B. allow drivers to register callbacks for data availability notifications 37 C. allow drivers to manage hardware buffer pools 111 will typically allocate 1 DPIO object per CPU to allow queuing operations
|
| /Linux-v5.10/tools/testing/selftests/net/ |
| D | xfrm_policy.sh | 39 …rc $lnet dst $rnet dir out tmpl src $me dst $remote proto esp mode tunnel priority 100 action allow 41 …rc $rnet dst $lnet dir fwd tmpl src $remote dst $me proto esp mode tunnel priority 100 action allow 146 ip -net $ns xfrm policy add dst $plain dir out priority 10 action allow 149 …y add dst $encryptip dir out tmpl src $me dst $remote proto esp mode tunnel priority 1 action allow 273 …::0014:0000:0001 dir in tmpl src :: dst :: proto esp mode tunnel priority 100 action allow || break 276 …000 dst ff01::01 dir in tmpl src :: dst :: proto esp mode tunnel priority 100 action allow || break
|
| /Linux-v5.10/security/lockdown/ |
| D | Kconfig | 36 The kernel runs in integrity mode by default. Features that allow 43 allow the kernel to be modified at runtime or that permit userland
|
| /Linux-v5.10/drivers/thermal/intel/int340x_thermal/ |
| D | Kconfig | 24 information to allow the user to select his laptop to run without 39 the display thermal device is to allow control of the display
|
| /Linux-v5.10/drivers/md/ |
| D | dm-cache-policy-internal.h | 105 static inline void policy_allow_migrations(struct dm_cache_policy *p, bool allow) in policy_allow_migrations() argument 107 return p->allow_migrations(p, allow); in policy_allow_migrations()
|
| /Linux-v5.10/Documentation/networking/ |
| D | ipddp.rst | 18 Through this driver you can either allow your Linux box to communicate 66 IP networks. Although it has been used on EtherTalk networks to allow 69 Encapsulation has been used to allow a Linux box stuck on a LocalTalk
|