Home
last modified time | relevance | path

Searched refs:allow (Results 1 – 25 of 809) sorted by relevance

12345678910>>...33

/Linux-v5.4/security/apparmor/
Dlib.c24 struct aa_perms allperms = { .allow = ALL_PERMS_MASK,
329 .allow = dfa_user_allow(dfa, state), in aa_compute_perms()
337 perms->allow |= map_other(dfa_other_allow(dfa, state)); in aa_compute_perms()
351 accum->allow &= addend->allow & ~addend->deny; in aa_perms_accum_raw()
352 accum->audit |= addend->audit & addend->allow; in aa_perms_accum_raw()
353 accum->quiet &= addend->quiet & ~addend->allow; in aa_perms_accum_raw()
354 accum->kill |= addend->kill & ~addend->allow; in aa_perms_accum_raw()
355 accum->stop |= addend->stop & ~addend->allow; in aa_perms_accum_raw()
356 accum->complain |= addend->complain & ~addend->allow & ~addend->deny; in aa_perms_accum_raw()
357 accum->cond |= addend->cond & ~addend->allow & ~addend->deny; in aa_perms_accum_raw()
[all …]
Dfile.c133 aad(&sa)->request = aad(&sa)->request & ~perms->allow; in aa_audit_file()
149 aad(&sa)->denied = aad(&sa)->request & ~perms->allow; in aa_audit_file()
235 perms.allow = map_old_perms(dfa_user_allow(dfa, state)); in aa_compute_fperms()
240 perms.allow = map_old_perms(dfa_other_allow(dfa, state)); in aa_compute_fperms()
245 perms.allow |= AA_MAY_GETATTR; in aa_compute_fperms()
249 perms.allow |= AA_MAY_CHANGE_PROFILE; in aa_compute_fperms()
251 perms.allow |= AA_MAY_ONEXEC; in aa_compute_fperms()
286 if (request & ~perms->allow) in __aa_path_perm()
393 if (!(lperms.allow & AA_MAY_LINK)) in profile_path_link()
407 if (!(perms.allow & AA_MAY_LINK)) { in profile_path_link()
[all …]
Dmount.c153 request = request & ~perms->allow; in audit_mount()
217 .allow = dfa_user_allow(dfa, state), in compute_mnt_perms()
270 if (perms->allow & AA_MAY_MOUNT) in do_match_mnt()
274 if (data && !binary && (perms->allow & AA_MNT_CONT_MATCH)) { in do_match_mnt()
283 if (perms->allow & AA_MAY_MOUNT) in do_match_mnt()
576 if (AA_MAY_UMOUNT & ~perms.allow) in profile_umount()
645 if (AA_MAY_PIVOTROOT & perms.allow) in build_pivotroot()
/Linux-v5.4/tools/scripts/
DMakefile.include49 define allow-override
56 $(call allow-override,CC,$(CROSS_COMPILE)gcc)
57 $(call allow-override,AR,$(CROSS_COMPILE)ar)
58 $(call allow-override,LD,$(CROSS_COMPILE)ld)
59 $(call allow-override,CXX,$(CROSS_COMPILE)g++)
60 $(call allow-override,STRIP,$(CROSS_COMPILE)strip)
/Linux-v5.4/drivers/misc/cb710/
Ddebug.c13 static const u16 allow[CB710_REG_COUNT/16] = { variable
17 static const char *const prefix[ARRAY_SIZE(allow)] = {
26 return ((allow[block] >> offset) & mask) == mask; in allow_reg_read()
35 for (i = 0; i < ARRAY_SIZE(allow); ++i, reg += 16/(t/8)) { \
63 for (i = 0; i < ARRAY_SIZE(allow); ++i, reg += 16/(t/8)) { \
/Linux-v5.4/drivers/dma-buf/
Dselftest.c54 bool allow = true; in apply_subtest_filter() local
58 allow = false; in apply_subtest_filter()
69 if (allow) in apply_subtest_filter()
77 if (allow) in apply_subtest_filter()
82 result = allow; in apply_subtest_filter()
/Linux-v5.4/Documentation/admin-guide/cgroup-v1/
Ddevices.rst24 An entry is added using devices.allow, and removed using
27 echo 'c 1:3 mr' > /sys/fs/cgroup/1/devices.allow
36 echo a > /sys/fs/cgroup/1/devices.allow
74 A allow "b 8:* rwm", "c 116:1 rw"
103 # echo "c *:3 rwm" >A/devices.allow
113 # echo "c 2:3 rwm" >B/devices.allow
114 # echo "c 50:3 r" >B/devices.allow
118 # echo "c *:3 rwm" >B/devices.allow
120 Allowing or denying all by writing 'a' to devices.allow or devices.deny will
/Linux-v5.4/tools/lib/traceevent/plugins/
DMakefile11 define allow-override
18 $(call allow-override,CC,$(CROSS_COMPILE)gcc)
19 $(call allow-override,AR,$(CROSS_COMPILE)ar)
20 $(call allow-override,NM,$(CROSS_COMPILE)nm)
21 $(call allow-override,PKG_CONFIG,pkg-config)
/Linux-v5.4/lib/
DKconfig.kgdb68 exception handler which will allow kgdb to step through a
88 0x0002 - allow arbitrary reads from memory and symbol lookup
89 0x0004 - allow arbitrary writes to memory
90 0x0008 - allow current register state to be inspected
91 0x0010 - allow current register state to be modified
92 0x0020 - allow passive inspection (backtrace, process list, lsmod)
93 0x0040 - allow flow control management (breakpoint, single step)
95 0x0100 - allow machine to be rebooted
/Linux-v5.4/tools/build/
DMakefile9 define allow-override
15 $(call allow-override,CC,$(CROSS_COMPILE)gcc)
16 $(call allow-override,LD,$(CROSS_COMPILE)ld)
/Linux-v5.4/tools/lib/lockdep/
DMakefile12 define allow-override
19 $(call allow-override,CC,$(CROSS_COMPILE)gcc)
20 $(call allow-override,AR,$(CROSS_COMPILE)ar)
21 $(call allow-override,LD,$(CROSS_COMPILE)ld)
/Linux-v5.4/arch/arm/plat-samsung/
Dpm.c62 #define any_allowed(mask, allow) (((mask) & (allow)) != (allow)) argument
/Linux-v5.4/fs/nfsd/
Dnfs4acl.c422 u32 allow; member
487 state->mask.allow |= astate->allow; in add_to_mask()
521 low_mode_from_nfs4(state->owner.allow, &pace->e_perm, flags); in posix_state_to_acl()
526 low_mode_from_nfs4(state->users->aces[i].perms.allow, in posix_state_to_acl()
534 low_mode_from_nfs4(state->group.allow, &pace->e_perm, flags); in posix_state_to_acl()
540 low_mode_from_nfs4(state->groups->aces[i].perms.allow, in posix_state_to_acl()
549 low_mode_from_nfs4(state->mask.allow, &pace->e_perm, flags); in posix_state_to_acl()
554 low_mode_from_nfs4(state->other.allow, &pace->e_perm, flags); in posix_state_to_acl()
562 astate->allow |= mask & ~astate->deny; in allow_bits()
568 astate->deny |= mask & ~astate->allow; in deny_bits()
[all …]
/Linux-v5.4/tools/lib/traceevent/
DMakefile18 define allow-override
25 $(call allow-override,CC,$(CROSS_COMPILE)gcc)
26 $(call allow-override,AR,$(CROSS_COMPILE)ar)
27 $(call allow-override,NM,$(CROSS_COMPILE)nm)
28 $(call allow-override,PKG_CONFIG,pkg-config)
/Linux-v5.4/drivers/gpu/drm/i915/selftests/
Di915_selftest.c209 bool allow = true; in apply_subtest_filter() local
213 allow = false; in apply_subtest_filter()
224 if (allow) in apply_subtest_filter()
232 if (allow) in apply_subtest_filter()
237 result = allow; in apply_subtest_filter()
/Linux-v5.4/Documentation/ABI/testing/
Dsysfs-class-iommu7 given IOMMU here to allow association of IOMMU to
16 given device here to allow association of device to
Dsysfs-driver-pciback7 the format of DDDD:BB:DD.F-REG:SIZE:MASK will allow the guest
12 will allow the guest to read and write to the configuration
/Linux-v5.4/arch/arm64/boot/dts/qcom/
Dmsm8998-clamshell.dtsi72 regulator-allow-set-load;
85 regulator-allow-set-load;
90 regulator-allow-set-load;
159 regulator-allow-set-load;
164 regulator-allow-set-load;
Dmsm8998-mtp.dtsi93 regulator-allow-set-load;
178 regulator-allow-set-load;
183 regulator-allow-set-load;
205 regulator-allow-set-load;
/Linux-v5.4/Documentation/networking/device_drivers/freescale/dpaa2/
Ddpio-driver.rst31 A. allow other drivers, such as the Ethernet driver, to enqueue and dequeue
33 B. allow drivers to register callbacks for data availability notifications
35 C. allow drivers to manage hardware buffer pools
109 will typically allocate 1 DPIO object per CPU to allow queuing operations
/Linux-v5.4/tools/testing/selftests/net/
Dxfrm_policy.sh39 …rc $lnet dst $rnet dir out tmpl src $me dst $remote proto esp mode tunnel priority 100 action allow
41 …rc $rnet dst $lnet dir fwd tmpl src $remote dst $me proto esp mode tunnel priority 100 action allow
146 ip -net $ns xfrm policy add dst $plain dir out priority 10 action allow
149 …y add dst $encryptip dir out tmpl src $me dst $remote proto esp mode tunnel priority 1 action allow
273 …::0014:0000:0001 dir in tmpl src :: dst :: proto esp mode tunnel priority 100 action allow || break
276 …000 dst ff01::01 dir in tmpl src :: dst :: proto esp mode tunnel priority 100 action allow || break
/Linux-v5.4/security/lockdown/
DKconfig36 The kernel runs in integrity mode by default. Features that allow
43 allow the kernel to be modified at runtime or that permit userland
/Linux-v5.4/drivers/net/ethernet/mellanox/mlx5/core/
DKconfig30 mlx5_core driver will include the Innova FPGA core and allow building
67 is enabled to allow passing user configured unicast MAC addresses to the
109 mlx5_core driver will include the Innova FPGA core and allow building
134 mlx5_core driver will include the Innova FPGA core and allow building
/Linux-v5.4/drivers/thermal/intel/int340x_thermal/
DKconfig24 information to allow the user to select his laptop to run without
39 the display thermal device is to allow control of the display
/Linux-v5.4/drivers/md/
Ddm-cache-policy-internal.h105 static inline void policy_allow_migrations(struct dm_cache_policy *p, bool allow) in policy_allow_migrations() argument
107 return p->allow_migrations(p, allow); in policy_allow_migrations()

12345678910>>...33