/Linux-v5.15/security/apparmor/ |
D | lib.c | 24 struct aa_perms allperms = { .allow = ALL_PERMS_MASK, 329 .allow = dfa_user_allow(dfa, state), in aa_compute_perms() 337 perms->allow |= map_other(dfa_other_allow(dfa, state)); in aa_compute_perms() 351 accum->allow &= addend->allow & ~addend->deny; in aa_perms_accum_raw() 352 accum->audit |= addend->audit & addend->allow; in aa_perms_accum_raw() 353 accum->quiet &= addend->quiet & ~addend->allow; in aa_perms_accum_raw() 354 accum->kill |= addend->kill & ~addend->allow; in aa_perms_accum_raw() 355 accum->stop |= addend->stop & ~addend->allow; in aa_perms_accum_raw() 356 accum->complain |= addend->complain & ~addend->allow & ~addend->deny; in aa_perms_accum_raw() 357 accum->cond |= addend->cond & ~addend->allow & ~addend->deny; in aa_perms_accum_raw() [all …]
|
D | file.c | 124 aad(&sa)->request = aad(&sa)->request & ~perms->allow; in aa_audit_file() 140 aad(&sa)->denied = aad(&sa)->request & ~perms->allow; in aa_audit_file() 226 perms.allow = map_old_perms(dfa_user_allow(dfa, state)); in aa_compute_fperms() 231 perms.allow = map_old_perms(dfa_other_allow(dfa, state)); in aa_compute_fperms() 236 perms.allow |= AA_MAY_GETATTR; in aa_compute_fperms() 240 perms.allow |= AA_MAY_CHANGE_PROFILE; in aa_compute_fperms() 242 perms.allow |= AA_MAY_ONEXEC; in aa_compute_fperms() 277 if (request & ~perms->allow) in __aa_path_perm() 386 if (!(lperms.allow & AA_MAY_LINK)) in profile_path_link() 400 if (!(perms.allow & AA_MAY_LINK)) { in profile_path_link() [all …]
|
D | mount.c | 153 request = request & ~perms->allow; in audit_mount() 217 .allow = dfa_user_allow(dfa, state), in compute_mnt_perms() 270 if (perms->allow & AA_MAY_MOUNT) in do_match_mnt() 274 if (data && !binary && (perms->allow & AA_MNT_CONT_MATCH)) { in do_match_mnt() 283 if (perms->allow & AA_MAY_MOUNT) in do_match_mnt() 605 if (AA_MAY_UMOUNT & ~perms.allow) in profile_umount() 677 if (AA_MAY_PIVOTROOT & perms.allow) in build_pivotroot()
|
/Linux-v5.15/tools/scripts/ |
D | Makefile.include | 48 define allow-override 55 $(call allow-override,CC,clang) 56 $(call allow-override,AR,llvm-ar) 57 $(call allow-override,LD,ld.lld) 58 $(call allow-override,CXX,clang++) 59 $(call allow-override,STRIP,llvm-strip) 62 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 63 $(call allow-override,AR,$(CROSS_COMPILE)ar) 64 $(call allow-override,LD,$(CROSS_COMPILE)ld) 65 $(call allow-override,CXX,$(CROSS_COMPILE)g++) [all …]
|
/Linux-v5.15/drivers/misc/cb710/ |
D | debug.c | 13 static const u16 allow[CB710_REG_COUNT/16] = { variable 17 static const char *const prefix[ARRAY_SIZE(allow)] = { 26 return ((allow[block] >> offset) & mask) == mask; in allow_reg_read() 35 for (i = 0; i < ARRAY_SIZE(allow); ++i, reg += 16/(t/8)) { \ 63 for (i = 0; i < ARRAY_SIZE(allow); ++i, reg += 16/(t/8)) { \
|
/Linux-v5.15/drivers/dma-buf/ |
D | selftest.c | 54 bool allow = true; in apply_subtest_filter() local 58 allow = false; in apply_subtest_filter() 69 if (allow) in apply_subtest_filter() 77 if (allow) in apply_subtest_filter() 82 result = allow; in apply_subtest_filter()
|
/Linux-v5.15/arch/arm64/boot/dts/qcom/ |
D | msm8994-msft-lumia-octagon.dtsi | 587 regulator-allow-set-load; 594 regulator-allow-set-load; 602 regulator-allow-set-load; 624 regulator-allow-set-load; 632 regulator-allow-set-load; 646 regulator-allow-set-load; 671 regulator-allow-set-load; 679 regulator-allow-set-load; 687 regulator-allow-set-load; 695 regulator-allow-set-load; [all …]
|
D | msm8998-clamshell.dtsi | 148 regulator-allow-set-load; 161 regulator-allow-set-load; 166 regulator-allow-set-load; 183 regulator-allow-set-load; 224 regulator-allow-set-load; 237 regulator-allow-set-load; 242 regulator-allow-set-load; 260 regulator-allow-set-load;
|
D | sdm630-sony-xperia-nile.dtsi | 282 regulator-allow-set-load; 297 regulator-allow-set-load; 308 regulator-allow-set-load; 320 regulator-allow-set-load; 335 regulator-allow-set-load; 421 regulator-allow-set-load; 448 regulator-allow-set-load; 466 regulator-allow-set-load; 474 regulator-allow-set-load; 482 regulator-allow-set-load; [all …]
|
D | msm8994-sony-xperia-kitakami.dtsi | 238 regulator-allow-set-load; 266 regulator-allow-set-load; 312 regulator-allow-set-load; 324 regulator-allow-set-load; 359 regulator-allow-set-load; 367 regulator-allow-set-load; 404 regulator-allow-set-load; 421 regulator-allow-set-load;
|
/Linux-v5.15/Documentation/admin-guide/cgroup-v1/ |
D | devices.rst | 24 An entry is added using devices.allow, and removed using 27 echo 'c 1:3 mr' > /sys/fs/cgroup/1/devices.allow 36 echo a > /sys/fs/cgroup/1/devices.allow 74 A allow "b 8:* rwm", "c 116:1 rw" 103 # echo "c *:3 rwm" >A/devices.allow 113 # echo "c 2:3 rwm" >B/devices.allow 114 # echo "c 50:3 r" >B/devices.allow 118 # echo "c *:3 rwm" >B/devices.allow 120 Allowing or denying all by writing 'a' to devices.allow or devices.deny will
|
/Linux-v5.15/tools/lib/traceevent/plugins/ |
D | Makefile | 11 define allow-override 18 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 19 $(call allow-override,AR,$(CROSS_COMPILE)ar) 20 $(call allow-override,NM,$(CROSS_COMPILE)nm) 21 $(call allow-override,PKG_CONFIG,pkg-config)
|
/Linux-v5.15/tools/lib/lockdep/ |
D | Makefile | 12 define allow-override 19 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 20 $(call allow-override,AR,$(CROSS_COMPILE)ar) 21 $(call allow-override,LD,$(CROSS_COMPILE)ld)
|
/Linux-v5.15/fs/nfsd/ |
D | nfs4acl.c | 422 u32 allow; member 487 state->mask.allow |= astate->allow; in add_to_mask() 521 low_mode_from_nfs4(state->owner.allow, &pace->e_perm, flags); in posix_state_to_acl() 526 low_mode_from_nfs4(state->users->aces[i].perms.allow, in posix_state_to_acl() 534 low_mode_from_nfs4(state->group.allow, &pace->e_perm, flags); in posix_state_to_acl() 540 low_mode_from_nfs4(state->groups->aces[i].perms.allow, in posix_state_to_acl() 549 low_mode_from_nfs4(state->mask.allow, &pace->e_perm, flags); in posix_state_to_acl() 554 low_mode_from_nfs4(state->other.allow, &pace->e_perm, flags); in posix_state_to_acl() 562 astate->allow |= mask & ~astate->deny; in allow_bits() 568 astate->deny |= mask & ~astate->allow; in deny_bits() [all …]
|
/Linux-v5.15/arch/arm/mach-s3c/ |
D | pm.c | 63 #define any_allowed(mask, allow) (((mask) & (allow)) != (allow)) argument
|
/Linux-v5.15/tools/build/ |
D | Makefile | 9 define allow-override 15 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 16 $(call allow-override,LD,$(CROSS_COMPILE)ld)
|
/Linux-v5.15/lib/ |
D | Kconfig.kgdb | 88 exception handler which will allow kgdb to step through a 108 0x0002 - allow arbitrary reads from memory and symbol lookup 109 0x0004 - allow arbitrary writes to memory 110 0x0008 - allow current register state to be inspected 111 0x0010 - allow current register state to be modified 112 0x0020 - allow passive inspection (backtrace, process list, lsmod) 113 0x0040 - allow flow control management (breakpoint, single step) 115 0x0100 - allow machine to be rebooted
|
/Linux-v5.15/fs/ksmbd/ |
D | smbacl.c | 317 pace->e_perm = state->owner.allow; in posix_state_to_acl() 322 pace->e_perm = state->users->aces[i].perms.allow; in posix_state_to_acl() 327 pace->e_perm = state->group.allow; in posix_state_to_acl() 333 pace->e_perm = state->groups->aces[i].perms.allow; in posix_state_to_acl() 339 pace->e_perm = state->mask.allow; in posix_state_to_acl() 344 pace->e_perm = state->other.allow; in posix_state_to_acl() 510 acl_state.owner.allow = ((acl_mode & 0700) >> 6) | 0004; in parse_dacl() 513 acl_state.users->aces[acl_state.users->n++].perms.allow = in parse_dacl() 515 default_acl_state.owner.allow = ((acl_mode & 0700) >> 6) | 0004; in parse_dacl() 518 default_acl_state.users->aces[default_acl_state.users->n++].perms.allow = in parse_dacl() [all …]
|
/Linux-v5.15/tools/lib/traceevent/ |
D | Makefile | 18 define allow-override 25 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 26 $(call allow-override,AR,$(CROSS_COMPILE)ar) 27 $(call allow-override,NM,$(CROSS_COMPILE)nm) 28 $(call allow-override,PKG_CONFIG,pkg-config)
|
/Linux-v5.15/Documentation/ABI/testing/ |
D | sysfs-class-iommu | 7 given IOMMU here to allow association of IOMMU to 16 given device here to allow association of device to
|
D | sysfs-driver-pciback | 7 the format of DDDD:BB:DD.F-REG:SIZE:MASK will allow the guest 14 will allow the guest to read and write to the configuration
|
/Linux-v5.15/drivers/gpu/drm/i915/selftests/ |
D | i915_selftest.c | 250 bool allow = true; in apply_subtest_filter() local 254 allow = false; in apply_subtest_filter() 265 if (allow) in apply_subtest_filter() 273 if (allow) in apply_subtest_filter() 278 result = allow; in apply_subtest_filter()
|
/Linux-v5.15/tools/testing/selftests/net/ |
D | xfrm_policy.sh | 39 …rc $lnet dst $rnet dir out tmpl src $me dst $remote proto esp mode tunnel priority 100 action allow 41 …rc $rnet dst $lnet dir fwd tmpl src $remote dst $me proto esp mode tunnel priority 100 action allow 146 ip -net $ns xfrm policy add dst $plain dir out priority 10 action allow 149 …y add dst $encryptip dir out tmpl src $me dst $remote proto esp mode tunnel priority 1 action allow 273 …::0014:0000:0001 dir in tmpl src :: dst :: proto esp mode tunnel priority 100 action allow || break 276 …000 dst ff01::01 dir in tmpl src :: dst :: proto esp mode tunnel priority 100 action allow || break 300 ip -net $ns xfrm policy add dst $j.0.0.0/24 dir out priority 10 action allow 314 ip -net $ns xfrm policy add dst $addr dir out priority 10 action allow
|
/Linux-v5.15/Documentation/networking/device_drivers/ethernet/freescale/dpaa2/ |
D | dpio-driver.rst | 34 A. allow other drivers, such as the Ethernet driver, to enqueue and dequeue 36 B. allow drivers to register callbacks for data availability notifications 38 C. allow drivers to manage hardware buffer pools 112 will typically allocate 1 DPIO object per CPU to allow queuing operations
|
/Linux-v5.15/drivers/gpu/drm/amd/display/dc/inc/hw/ |
D | dchubbub.h | 155 void (*allow_self_refresh_control)(struct hubbub *hubbub, bool allow); 163 void (*force_pstate_change_control)(struct hubbub *hubbub, bool force, bool allow);
|