/Linux-v6.1/security/apparmor/ |
D | lib.c | 24 struct aa_perms allperms = { .allow = ALL_PERMS_MASK, 345 .allow = dfa_user_allow(dfa, state) | in aa_compute_perms() 355 perms->allow |= map_other(dfa_other_allow(dfa, state)); in aa_compute_perms() 368 accum->allow &= addend->allow & ~addend->deny; in aa_perms_accum_raw() 369 accum->audit |= addend->audit & addend->allow; in aa_perms_accum_raw() 370 accum->quiet &= addend->quiet & ~addend->allow; in aa_perms_accum_raw() 371 accum->kill |= addend->kill & ~addend->allow; in aa_perms_accum_raw() 372 accum->stop |= addend->stop & ~addend->allow; in aa_perms_accum_raw() 373 accum->complain |= addend->complain & ~addend->allow & ~addend->deny; in aa_perms_accum_raw() 374 accum->cond |= addend->cond & ~addend->allow & ~addend->deny; in aa_perms_accum_raw() [all …]
|
D | file.c | 124 aad(&sa)->request = aad(&sa)->request & ~perms->allow; in aa_audit_file() 140 aad(&sa)->denied = aad(&sa)->request & ~perms->allow; in aa_audit_file() 226 perms.allow = map_old_perms(dfa_user_allow(dfa, state)); in aa_compute_fperms() 231 perms.allow = map_old_perms(dfa_other_allow(dfa, state)); in aa_compute_fperms() 236 perms.allow |= AA_MAY_GETATTR; in aa_compute_fperms() 240 perms.allow |= AA_MAY_CHANGE_PROFILE; in aa_compute_fperms() 242 perms.allow |= AA_MAY_ONEXEC; in aa_compute_fperms() 277 if (request & ~perms->allow) in __aa_path_perm() 386 if (!(lperms.allow & AA_MAY_LINK)) in profile_path_link() 400 if (!(perms.allow & AA_MAY_LINK)) { in profile_path_link() [all …]
|
/Linux-v6.1/tools/scripts/ |
D | Makefile.include | 48 define allow-override 61 $(call allow-override,CC,$(LLVM_PREFIX)clang$(LLVM_SUFFIX)) 62 $(call allow-override,AR,$(LLVM_PREFIX)llvm-ar$(LLVM_SUFFIX)) 63 $(call allow-override,LD,$(LLVM_PREFIX)ld.lld$(LLVM_SUFFIX)) 64 $(call allow-override,CXX,$(LLVM_PREFIX)clang++$(LLVM_SUFFIX)) 65 $(call allow-override,STRIP,$(LLVM_PREFIX)llvm-strip$(LLVM_SUFFIX)) 68 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 69 $(call allow-override,AR,$(CROSS_COMPILE)ar) 70 $(call allow-override,LD,$(CROSS_COMPILE)ld) 71 $(call allow-override,CXX,$(CROSS_COMPILE)g++) [all …]
|
/Linux-v6.1/rust/bindings/ |
D | lib.rs | 14 #![cfg_attr(test, allow(deref_nullptr))] 15 #![cfg_attr(test, allow(unaligned_references))] 16 #![cfg_attr(test, allow(unsafe_op_in_unsafe_fn))] 17 #![allow( 41 #[allow(dead_code)]
|
/Linux-v6.1/tools/tracing/rtla/ |
D | Makefile | 11 define allow-override 18 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 19 $(call allow-override,AR,$(CROSS_COMPILE)ar) 20 $(call allow-override,STRIP,$(CROSS_COMPILE)strip) 21 $(call allow-override,PKG_CONFIG,pkg-config) 22 $(call allow-override,LD_SO_CONF_PATH,/etc/ld.so.conf.d/) 23 $(call allow-override,LDCONFIG,ldconfig)
|
/Linux-v6.1/drivers/dma-buf/ |
D | selftest.c | 54 bool allow = true; in apply_subtest_filter() local 58 allow = false; in apply_subtest_filter() 69 if (allow) in apply_subtest_filter() 77 if (allow) in apply_subtest_filter() 82 result = allow; in apply_subtest_filter()
|
/Linux-v6.1/drivers/misc/cb710/ |
D | debug.c | 13 static const u16 allow[CB710_REG_COUNT/16] = { variable 17 static const char *const prefix[ARRAY_SIZE(allow)] = { 26 return ((allow[block] >> offset) & mask) == mask; in allow_reg_read() 35 for (i = 0; i < ARRAY_SIZE(allow); ++i, reg += 16/(t/8)) { \ 63 for (i = 0; i < ARRAY_SIZE(allow); ++i, reg += 16/(t/8)) { \
|
/Linux-v6.1/arch/arm64/boot/dts/qcom/ |
D | msm8994-msft-lumia-octagon.dtsi | 589 regulator-allow-set-load; 596 regulator-allow-set-load; 604 regulator-allow-set-load; 626 regulator-allow-set-load; 634 regulator-allow-set-load; 648 regulator-allow-set-load; 673 regulator-allow-set-load; 681 regulator-allow-set-load; 689 regulator-allow-set-load; 697 regulator-allow-set-load; [all …]
|
D | sdm660-xiaomi-lavender.dts | 146 regulator-allow-set-load; 154 regulator-allow-set-load; 161 regulator-allow-set-load; 172 regulator-allow-set-load; 186 regulator-allow-set-load; 255 regulator-allow-set-load; 279 regulator-allow-set-load; 294 regulator-allow-set-load; 301 regulator-allow-set-load; 308 regulator-allow-set-load; [all …]
|
D | sda660-inforce-ifc6560.dts | 269 regulator-allow-set-load; 277 regulator-allow-set-load; 286 regulator-allow-set-load; 294 regulator-allow-set-load; 312 regulator-allow-set-load; 342 regulator-allow-set-load; 350 regulator-allow-set-load; 362 regulator-allow-set-load; 378 regulator-allow-set-load;
|
D | msm8998-clamshell.dtsi | 179 regulator-allow-set-load; 195 regulator-allow-set-load; 201 regulator-allow-set-load; 222 regulator-allow-set-load; 273 regulator-allow-set-load; 289 regulator-allow-set-load; 295 regulator-allow-set-load; 317 regulator-allow-set-load;
|
D | sdm630-sony-xperia-nile.dtsi | 308 regulator-allow-set-load; 323 regulator-allow-set-load; 334 regulator-allow-set-load; 346 regulator-allow-set-load; 361 regulator-allow-set-load; 447 regulator-allow-set-load; 474 regulator-allow-set-load; 492 regulator-allow-set-load; 500 regulator-allow-set-load; 508 regulator-allow-set-load; [all …]
|
D | msm8994-sony-xperia-kitakami.dtsi | 241 regulator-allow-set-load; 269 regulator-allow-set-load; 316 regulator-allow-set-load; 328 regulator-allow-set-load; 365 regulator-allow-set-load; 372 regulator-allow-set-load; 414 regulator-allow-set-load; 433 regulator-allow-set-load;
|
/Linux-v6.1/Documentation/admin-guide/cgroup-v1/ |
D | devices.rst | 24 An entry is added using devices.allow, and removed using 27 echo 'c 1:3 mr' > /sys/fs/cgroup/1/devices.allow 36 echo a > /sys/fs/cgroup/1/devices.allow 74 A allow "b 8:* rwm", "c 116:1 rw" 103 # echo "c *:3 rwm" >A/devices.allow 113 # echo "c 2:3 rwm" >B/devices.allow 114 # echo "c 50:3 r" >B/devices.allow 118 # echo "c *:3 rwm" >B/devices.allow 120 Allowing or denying all by writing 'a' to devices.allow or devices.deny will
|
/Linux-v6.1/tools/lib/traceevent/plugins/ |
D | Makefile | 11 define allow-override 18 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 19 $(call allow-override,AR,$(CROSS_COMPILE)ar) 20 $(call allow-override,NM,$(CROSS_COMPILE)nm) 21 $(call allow-override,PKG_CONFIG,pkg-config)
|
/Linux-v6.1/fs/nfsd/ |
D | nfs4acl.c | 422 u32 allow; member 487 state->mask.allow |= astate->allow; in add_to_mask() 521 low_mode_from_nfs4(state->owner.allow, &pace->e_perm, flags); in posix_state_to_acl() 526 low_mode_from_nfs4(state->users->aces[i].perms.allow, in posix_state_to_acl() 534 low_mode_from_nfs4(state->group.allow, &pace->e_perm, flags); in posix_state_to_acl() 540 low_mode_from_nfs4(state->groups->aces[i].perms.allow, in posix_state_to_acl() 549 low_mode_from_nfs4(state->mask.allow, &pace->e_perm, flags); in posix_state_to_acl() 554 low_mode_from_nfs4(state->other.allow, &pace->e_perm, flags); in posix_state_to_acl() 562 astate->allow |= mask & ~astate->deny; in allow_bits() 568 astate->deny |= mask & ~astate->allow; in deny_bits() [all …]
|
/Linux-v6.1/arch/arm/mach-s3c/ |
D | pm.c | 63 #define any_allowed(mask, allow) (((mask) & (allow)) != (allow)) argument
|
/Linux-v6.1/tools/build/ |
D | Makefile | 9 define allow-override 15 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 16 $(call allow-override,LD,$(CROSS_COMPILE)ld)
|
/Linux-v6.1/lib/ |
D | Kconfig.kgdb | 88 exception handler which will allow kgdb to step through a 108 0x0002 - allow arbitrary reads from memory and symbol lookup 109 0x0004 - allow arbitrary writes to memory 110 0x0008 - allow current register state to be inspected 111 0x0010 - allow current register state to be modified 112 0x0020 - allow passive inspection (backtrace, process list, lsmod) 113 0x0040 - allow flow control management (breakpoint, single step) 115 0x0100 - allow machine to be rebooted
|
/Linux-v6.1/fs/ksmbd/ |
D | smbacl.c | 306 pace->e_perm = state->owner.allow; in posix_state_to_acl() 311 pace->e_perm = state->users->aces[i].perms.allow; in posix_state_to_acl() 316 pace->e_perm = state->group.allow; in posix_state_to_acl() 322 pace->e_perm = state->groups->aces[i].perms.allow; in posix_state_to_acl() 328 pace->e_perm = state->mask.allow; in posix_state_to_acl() 333 pace->e_perm = state->other.allow; in posix_state_to_acl() 499 acl_state.owner.allow = ((acl_mode & 0700) >> 6) | 0004; in parse_dacl() 502 acl_state.users->aces[acl_state.users->n++].perms.allow = in parse_dacl() 504 default_acl_state.owner.allow = ((acl_mode & 0700) >> 6) | 0004; in parse_dacl() 507 default_acl_state.users->aces[default_acl_state.users->n++].perms.allow = in parse_dacl() [all …]
|
/Linux-v6.1/tools/lib/traceevent/ |
D | Makefile | 18 define allow-override 25 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 26 $(call allow-override,AR,$(CROSS_COMPILE)ar) 27 $(call allow-override,NM,$(CROSS_COMPILE)nm) 28 $(call allow-override,PKG_CONFIG,pkg-config)
|
/Linux-v6.1/drivers/gpu/drm/amd/display/dc/inc/hw/ |
D | dchubbub.h | 157 void (*allow_self_refresh_control)(struct hubbub *hubbub, bool allow); 167 void (*force_pstate_change_control)(struct hubbub *hubbub, bool force, bool allow); 173 void (*force_usr_retraining_allow)(struct hubbub *hubbub, bool allow);
|
/Linux-v6.1/Documentation/ABI/testing/ |
D | sysfs-class-iommu | 7 given IOMMU here to allow association of IOMMU to 16 given device here to allow association of device to
|
/Linux-v6.1/drivers/gpu/drm/i915/selftests/ |
D | i915_selftest.c | 251 bool allow = true; in apply_subtest_filter() local 255 allow = false; in apply_subtest_filter() 266 if (allow) in apply_subtest_filter() 274 if (allow) in apply_subtest_filter() 279 result = allow; in apply_subtest_filter()
|
/Linux-v6.1/tools/testing/selftests/net/ |
D | xfrm_policy.sh | 39 …rc $lnet dst $rnet dir out tmpl src $me dst $remote proto esp mode tunnel priority 100 action allow 41 …rc $rnet dst $lnet dir fwd tmpl src $remote dst $me proto esp mode tunnel priority 100 action allow 146 ip -net $ns xfrm policy add dst $plain dir out priority 10 action allow 149 …y add dst $encryptip dir out tmpl src $me dst $remote proto esp mode tunnel priority 1 action allow 273 …::0014:0000:0001 dir in tmpl src :: dst :: proto esp mode tunnel priority 100 action allow || break 276 …000 dst ff01::01 dir in tmpl src :: dst :: proto esp mode tunnel priority 100 action allow || break 300 ip -net $ns xfrm policy add dst $j.0.0.0/24 dir out priority 10 action allow 314 ip -net $ns xfrm policy add dst $addr dir out priority 10 action allow
|