/Linux-v5.4/security/apparmor/ |
D | lib.c | 24 struct aa_perms allperms = { .allow = ALL_PERMS_MASK, 329 .allow = dfa_user_allow(dfa, state), in aa_compute_perms() 337 perms->allow |= map_other(dfa_other_allow(dfa, state)); in aa_compute_perms() 351 accum->allow &= addend->allow & ~addend->deny; in aa_perms_accum_raw() 352 accum->audit |= addend->audit & addend->allow; in aa_perms_accum_raw() 353 accum->quiet &= addend->quiet & ~addend->allow; in aa_perms_accum_raw() 354 accum->kill |= addend->kill & ~addend->allow; in aa_perms_accum_raw() 355 accum->stop |= addend->stop & ~addend->allow; in aa_perms_accum_raw() 356 accum->complain |= addend->complain & ~addend->allow & ~addend->deny; in aa_perms_accum_raw() 357 accum->cond |= addend->cond & ~addend->allow & ~addend->deny; in aa_perms_accum_raw() [all …]
|
D | file.c | 133 aad(&sa)->request = aad(&sa)->request & ~perms->allow; in aa_audit_file() 149 aad(&sa)->denied = aad(&sa)->request & ~perms->allow; in aa_audit_file() 235 perms.allow = map_old_perms(dfa_user_allow(dfa, state)); in aa_compute_fperms() 240 perms.allow = map_old_perms(dfa_other_allow(dfa, state)); in aa_compute_fperms() 245 perms.allow |= AA_MAY_GETATTR; in aa_compute_fperms() 249 perms.allow |= AA_MAY_CHANGE_PROFILE; in aa_compute_fperms() 251 perms.allow |= AA_MAY_ONEXEC; in aa_compute_fperms() 286 if (request & ~perms->allow) in __aa_path_perm() 393 if (!(lperms.allow & AA_MAY_LINK)) in profile_path_link() 407 if (!(perms.allow & AA_MAY_LINK)) { in profile_path_link() [all …]
|
D | mount.c | 153 request = request & ~perms->allow; in audit_mount() 217 .allow = dfa_user_allow(dfa, state), in compute_mnt_perms() 270 if (perms->allow & AA_MAY_MOUNT) in do_match_mnt() 274 if (data && !binary && (perms->allow & AA_MNT_CONT_MATCH)) { in do_match_mnt() 283 if (perms->allow & AA_MAY_MOUNT) in do_match_mnt() 576 if (AA_MAY_UMOUNT & ~perms.allow) in profile_umount() 645 if (AA_MAY_PIVOTROOT & perms.allow) in build_pivotroot()
|
/Linux-v5.4/tools/scripts/ |
D | Makefile.include | 49 define allow-override 56 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 57 $(call allow-override,AR,$(CROSS_COMPILE)ar) 58 $(call allow-override,LD,$(CROSS_COMPILE)ld) 59 $(call allow-override,CXX,$(CROSS_COMPILE)g++) 60 $(call allow-override,STRIP,$(CROSS_COMPILE)strip)
|
/Linux-v5.4/drivers/misc/cb710/ |
D | debug.c | 13 static const u16 allow[CB710_REG_COUNT/16] = { variable 17 static const char *const prefix[ARRAY_SIZE(allow)] = { 26 return ((allow[block] >> offset) & mask) == mask; in allow_reg_read() 35 for (i = 0; i < ARRAY_SIZE(allow); ++i, reg += 16/(t/8)) { \ 63 for (i = 0; i < ARRAY_SIZE(allow); ++i, reg += 16/(t/8)) { \
|
/Linux-v5.4/drivers/dma-buf/ |
D | selftest.c | 54 bool allow = true; in apply_subtest_filter() local 58 allow = false; in apply_subtest_filter() 69 if (allow) in apply_subtest_filter() 77 if (allow) in apply_subtest_filter() 82 result = allow; in apply_subtest_filter()
|
/Linux-v5.4/Documentation/admin-guide/cgroup-v1/ |
D | devices.rst | 24 An entry is added using devices.allow, and removed using 27 echo 'c 1:3 mr' > /sys/fs/cgroup/1/devices.allow 36 echo a > /sys/fs/cgroup/1/devices.allow 74 A allow "b 8:* rwm", "c 116:1 rw" 103 # echo "c *:3 rwm" >A/devices.allow 113 # echo "c 2:3 rwm" >B/devices.allow 114 # echo "c 50:3 r" >B/devices.allow 118 # echo "c *:3 rwm" >B/devices.allow 120 Allowing or denying all by writing 'a' to devices.allow or devices.deny will
|
/Linux-v5.4/tools/lib/traceevent/plugins/ |
D | Makefile | 11 define allow-override 18 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 19 $(call allow-override,AR,$(CROSS_COMPILE)ar) 20 $(call allow-override,NM,$(CROSS_COMPILE)nm) 21 $(call allow-override,PKG_CONFIG,pkg-config)
|
/Linux-v5.4/lib/ |
D | Kconfig.kgdb | 68 exception handler which will allow kgdb to step through a 88 0x0002 - allow arbitrary reads from memory and symbol lookup 89 0x0004 - allow arbitrary writes to memory 90 0x0008 - allow current register state to be inspected 91 0x0010 - allow current register state to be modified 92 0x0020 - allow passive inspection (backtrace, process list, lsmod) 93 0x0040 - allow flow control management (breakpoint, single step) 95 0x0100 - allow machine to be rebooted
|
/Linux-v5.4/tools/build/ |
D | Makefile | 9 define allow-override 15 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 16 $(call allow-override,LD,$(CROSS_COMPILE)ld)
|
/Linux-v5.4/tools/lib/lockdep/ |
D | Makefile | 12 define allow-override 19 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 20 $(call allow-override,AR,$(CROSS_COMPILE)ar) 21 $(call allow-override,LD,$(CROSS_COMPILE)ld)
|
/Linux-v5.4/arch/arm/plat-samsung/ |
D | pm.c | 62 #define any_allowed(mask, allow) (((mask) & (allow)) != (allow)) argument
|
/Linux-v5.4/fs/nfsd/ |
D | nfs4acl.c | 422 u32 allow; member 487 state->mask.allow |= astate->allow; in add_to_mask() 521 low_mode_from_nfs4(state->owner.allow, &pace->e_perm, flags); in posix_state_to_acl() 526 low_mode_from_nfs4(state->users->aces[i].perms.allow, in posix_state_to_acl() 534 low_mode_from_nfs4(state->group.allow, &pace->e_perm, flags); in posix_state_to_acl() 540 low_mode_from_nfs4(state->groups->aces[i].perms.allow, in posix_state_to_acl() 549 low_mode_from_nfs4(state->mask.allow, &pace->e_perm, flags); in posix_state_to_acl() 554 low_mode_from_nfs4(state->other.allow, &pace->e_perm, flags); in posix_state_to_acl() 562 astate->allow |= mask & ~astate->deny; in allow_bits() 568 astate->deny |= mask & ~astate->allow; in deny_bits() [all …]
|
/Linux-v5.4/tools/lib/traceevent/ |
D | Makefile | 18 define allow-override 25 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 26 $(call allow-override,AR,$(CROSS_COMPILE)ar) 27 $(call allow-override,NM,$(CROSS_COMPILE)nm) 28 $(call allow-override,PKG_CONFIG,pkg-config)
|
/Linux-v5.4/drivers/gpu/drm/i915/selftests/ |
D | i915_selftest.c | 209 bool allow = true; in apply_subtest_filter() local 213 allow = false; in apply_subtest_filter() 224 if (allow) in apply_subtest_filter() 232 if (allow) in apply_subtest_filter() 237 result = allow; in apply_subtest_filter()
|
/Linux-v5.4/Documentation/ABI/testing/ |
D | sysfs-class-iommu | 7 given IOMMU here to allow association of IOMMU to 16 given device here to allow association of device to
|
D | sysfs-driver-pciback | 7 the format of DDDD:BB:DD.F-REG:SIZE:MASK will allow the guest 12 will allow the guest to read and write to the configuration
|
/Linux-v5.4/arch/arm64/boot/dts/qcom/ |
D | msm8998-clamshell.dtsi | 72 regulator-allow-set-load; 85 regulator-allow-set-load; 90 regulator-allow-set-load; 159 regulator-allow-set-load; 164 regulator-allow-set-load;
|
D | msm8998-mtp.dtsi | 93 regulator-allow-set-load; 178 regulator-allow-set-load; 183 regulator-allow-set-load; 205 regulator-allow-set-load;
|
/Linux-v5.4/Documentation/networking/device_drivers/freescale/dpaa2/ |
D | dpio-driver.rst | 31 A. allow other drivers, such as the Ethernet driver, to enqueue and dequeue 33 B. allow drivers to register callbacks for data availability notifications 35 C. allow drivers to manage hardware buffer pools 109 will typically allocate 1 DPIO object per CPU to allow queuing operations
|
/Linux-v5.4/tools/testing/selftests/net/ |
D | xfrm_policy.sh | 39 …rc $lnet dst $rnet dir out tmpl src $me dst $remote proto esp mode tunnel priority 100 action allow 41 …rc $rnet dst $lnet dir fwd tmpl src $remote dst $me proto esp mode tunnel priority 100 action allow 146 ip -net $ns xfrm policy add dst $plain dir out priority 10 action allow 149 …y add dst $encryptip dir out tmpl src $me dst $remote proto esp mode tunnel priority 1 action allow 273 …::0014:0000:0001 dir in tmpl src :: dst :: proto esp mode tunnel priority 100 action allow || break 276 …000 dst ff01::01 dir in tmpl src :: dst :: proto esp mode tunnel priority 100 action allow || break
|
/Linux-v5.4/security/lockdown/ |
D | Kconfig | 36 The kernel runs in integrity mode by default. Features that allow 43 allow the kernel to be modified at runtime or that permit userland
|
/Linux-v5.4/drivers/net/ethernet/mellanox/mlx5/core/ |
D | Kconfig | 30 mlx5_core driver will include the Innova FPGA core and allow building 67 is enabled to allow passing user configured unicast MAC addresses to the 109 mlx5_core driver will include the Innova FPGA core and allow building 134 mlx5_core driver will include the Innova FPGA core and allow building
|
/Linux-v5.4/drivers/thermal/intel/int340x_thermal/ |
D | Kconfig | 24 information to allow the user to select his laptop to run without 39 the display thermal device is to allow control of the display
|
/Linux-v5.4/drivers/md/ |
D | dm-cache-policy-internal.h | 105 static inline void policy_allow_migrations(struct dm_cache_policy *p, bool allow) in policy_allow_migrations() argument 107 return p->allow_migrations(p, allow); in policy_allow_migrations()
|