| /Linux-v6.6/security/apparmor/include/ |
| D | perms.h | 67 u32 allow; member 108 accum->allow &= addend->allow & ~addend->deny; in aa_perms_accum_raw() 109 accum->audit |= addend->audit & addend->allow; in aa_perms_accum_raw() 110 accum->quiet &= addend->quiet & ~addend->allow; in aa_perms_accum_raw() 111 accum->kill |= addend->kill & ~addend->allow; in aa_perms_accum_raw() 112 accum->complain |= addend->complain & ~addend->allow & ~addend->deny; in aa_perms_accum_raw() 113 accum->cond |= addend->cond & ~addend->allow & ~addend->deny; in aa_perms_accum_raw() 114 accum->hide &= addend->hide & ~addend->allow; in aa_perms_accum_raw() 115 accum->prompt |= addend->prompt & ~addend->allow & ~addend->deny; in aa_perms_accum_raw() 135 accum->allow &= addend->allow & ~accum->deny; in aa_perms_accum() [all …]
|
| /Linux-v6.6/tools/scripts/ |
| D | Makefile.include | 48 define allow-override 61 $(call allow-override,CC,$(LLVM_PREFIX)clang$(LLVM_SUFFIX)) 62 $(call allow-override,AR,$(LLVM_PREFIX)llvm-ar$(LLVM_SUFFIX)) 63 $(call allow-override,LD,$(LLVM_PREFIX)ld.lld$(LLVM_SUFFIX)) 64 $(call allow-override,CXX,$(LLVM_PREFIX)clang++$(LLVM_SUFFIX)) 65 $(call allow-override,STRIP,$(LLVM_PREFIX)llvm-strip$(LLVM_SUFFIX)) 68 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 69 $(call allow-override,AR,$(CROSS_COMPILE)ar) 70 $(call allow-override,LD,$(CROSS_COMPILE)ld) 71 $(call allow-override,CXX,$(CROSS_COMPILE)g++) [all …]
|
| /Linux-v6.6/rust/bindings/ |
| D | lib.rs | 13 #![cfg_attr(test, allow(deref_nullptr))] 14 #![cfg_attr(test, allow(unaligned_references))] 15 #![cfg_attr(test, allow(unsafe_op_in_unsafe_fn))] 16 #![allow( 40 #[allow(dead_code)]
|
| /Linux-v6.6/tools/verification/rv/ |
| D | Makefile | 11 define allow-override 18 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 19 $(call allow-override,AR,$(CROSS_COMPILE)ar) 20 $(call allow-override,STRIP,$(CROSS_COMPILE)strip) 21 $(call allow-override,PKG_CONFIG,pkg-config) 22 $(call allow-override,LD_SO_CONF_PATH,/etc/ld.so.conf.d/) 23 $(call allow-override,LDCONFIG,ldconfig)
|
| /Linux-v6.6/tools/tracing/rtla/ |
| D | Makefile | 11 define allow-override 18 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 19 $(call allow-override,AR,$(CROSS_COMPILE)ar) 20 $(call allow-override,STRIP,$(CROSS_COMPILE)strip) 21 $(call allow-override,PKG_CONFIG,pkg-config) 22 $(call allow-override,LD_SO_CONF_PATH,/etc/ld.so.conf.d/) 23 $(call allow-override,LDCONFIG,ldconfig)
|
| /Linux-v6.6/rust/uapi/ |
| D | lib.rs | 12 #![cfg_attr(test, allow(deref_nullptr))] 13 #![cfg_attr(test, allow(unaligned_references))] 14 #![cfg_attr(test, allow(unsafe_op_in_unsafe_fn))] 15 #![allow(
|
| /Linux-v6.6/security/apparmor/ |
| D | policy_compat.c | 103 perms->allow |= AA_MAY_GETATTR; in compute_fperms_allow() 107 perms->allow |= AA_MAY_CHANGE_PROFILE; in compute_fperms_allow() 109 perms->allow |= AA_MAY_ONEXEC; in compute_fperms_allow() 117 perms.allow = map_old_perms(dfa_user_allow(dfa, state)); in compute_fperms_user() 132 perms.allow = map_old_perms(dfa_other_allow(dfa, state)); in compute_fperms_other() 191 perms[state].allow = dfa_user_allow(xmatch, state); in compute_xmatch_perms() 215 perms.allow = dfa_user_allow(dfa, state); in compute_perms_entry() 230 perms.allow |= map_other(dfa_other_allow(dfa, state)); in compute_perms_entry() 232 perms.allow |= AA_MAY_LOCK; in compute_perms_entry() 234 perms.allow |= map_xbits(dfa_user_xbits(dfa, state)); in compute_perms_entry()
|
| D | file.c | 124 aad(&sa)->request = aad(&sa)->request & ~perms->allow; in aa_audit_file() 140 aad(&sa)->denied = aad(&sa)->request & ~perms->allow; in aa_audit_file() 223 if (request & ~perms->allow) in __aa_path_perm() 335 if (!(lperms.allow & AA_MAY_LINK)) in profile_path_link() 349 if (!(perms.allow & AA_MAY_LINK)) { in profile_path_link() 356 if (!(perms.allow & AA_LINK_SUBSET)) in profile_path_link() 366 request = lperms.allow & ~AA_MAY_LINK; in profile_path_link() 367 lperms.allow &= perms.allow | AA_MAY_LINK; in profile_path_link() 369 request |= AA_AUDIT_FILE_MASK & (lperms.allow & ~perms.allow); in profile_path_link() 370 if (request & ~lperms.allow) { in profile_path_link() [all …]
|
| /Linux-v6.6/drivers/misc/cb710/ |
| D | debug.c | 13 static const u16 allow[CB710_REG_COUNT/16] = { variable 17 static const char *const prefix[ARRAY_SIZE(allow)] = { 26 return ((allow[block] >> offset) & mask) == mask; in allow_reg_read() 35 for (i = 0; i < ARRAY_SIZE(allow); ++i, reg += 16/(t/8)) { \ 63 for (i = 0; i < ARRAY_SIZE(allow); ++i, reg += 16/(t/8)) { \
|
| /Linux-v6.6/drivers/dma-buf/ |
| D | selftest.c | 54 bool allow = true; in apply_subtest_filter() local 58 allow = false; in apply_subtest_filter() 69 if (allow) in apply_subtest_filter() 77 if (allow) in apply_subtest_filter() 82 result = allow; in apply_subtest_filter()
|
| /Linux-v6.6/arch/arm64/boot/dts/qcom/ |
| D | msm8994-msft-lumia-octagon.dtsi | 586 regulator-allow-set-load; 593 regulator-allow-set-load; 601 regulator-allow-set-load; 623 regulator-allow-set-load; 631 regulator-allow-set-load; 645 regulator-allow-set-load; 670 regulator-allow-set-load; 678 regulator-allow-set-load; 686 regulator-allow-set-load; 694 regulator-allow-set-load; [all …]
|
| D | sdm660-xiaomi-lavender.dts | 146 regulator-allow-set-load; 154 regulator-allow-set-load; 161 regulator-allow-set-load; 172 regulator-allow-set-load; 186 regulator-allow-set-load; 255 regulator-allow-set-load; 279 regulator-allow-set-load; 294 regulator-allow-set-load; 301 regulator-allow-set-load; 308 regulator-allow-set-load; [all …]
|
| D | sa8775p-ride.dts | 66 regulator-allow-set-load; 76 regulator-allow-set-load; 86 regulator-allow-set-load; 96 regulator-allow-set-load; 106 regulator-allow-set-load; 116 regulator-allow-set-load; 131 regulator-allow-set-load; 141 regulator-allow-set-load; 151 regulator-allow-set-load; 162 * FIXME: This should have regulator-allow-set-load but [all …]
|
| D | sda660-inforce-ifc6560.dts | 269 regulator-allow-set-load; 277 regulator-allow-set-load; 286 regulator-allow-set-load; 294 regulator-allow-set-load; 312 regulator-allow-set-load; 342 regulator-allow-set-load; 350 regulator-allow-set-load; 362 regulator-allow-set-load; 378 regulator-allow-set-load;
|
| D | msm8998-clamshell.dtsi | 179 regulator-allow-set-load; 195 regulator-allow-set-load; 201 regulator-allow-set-load; 222 regulator-allow-set-load; 273 regulator-allow-set-load; 289 regulator-allow-set-load; 295 regulator-allow-set-load; 317 regulator-allow-set-load;
|
| D | qrb2210-rb1.dts | 187 regulator-allow-set-load; 194 regulator-allow-set-load; 234 regulator-allow-set-load; 242 regulator-allow-set-load; 250 regulator-allow-set-load; 259 regulator-allow-set-load; 292 regulator-allow-set-load; 299 regulator-allow-set-load;
|
| D | sm6125-xiaomi-laurel-sprout.dts | 256 regulator-allow-set-load; 262 regulator-allow-set-load; 288 regulator-allow-set-load; 294 regulator-allow-set-load; 330 regulator-allow-set-load; 351 regulator-allow-set-load; 362 regulator-allow-set-load;
|
| D | sdm630-sony-xperia-nile.dtsi | 312 regulator-allow-set-load; 327 regulator-allow-set-load; 338 regulator-allow-set-load; 350 regulator-allow-set-load; 365 regulator-allow-set-load; 451 regulator-allow-set-load; 478 regulator-allow-set-load; 496 regulator-allow-set-load; 504 regulator-allow-set-load; 512 regulator-allow-set-load; [all …]
|
| /Linux-v6.6/Documentation/admin-guide/cgroup-v1/ |
| D | devices.rst | 24 An entry is added using devices.allow, and removed using 27 echo 'c 1:3 mr' > /sys/fs/cgroup/1/devices.allow 36 echo a > /sys/fs/cgroup/1/devices.allow 74 A allow "b 8:* rwm", "c 116:1 rw" 103 # echo "c *:3 rwm" >A/devices.allow 113 # echo "c 2:3 rwm" >B/devices.allow 114 # echo "c 50:3 r" >B/devices.allow 118 # echo "c *:3 rwm" >B/devices.allow 120 Allowing or denying all by writing 'a' to devices.allow or devices.deny will
|
| /Linux-v6.6/fs/nfsd/ |
| D | nfs4acl.c | 422 u32 allow; member 486 state->mask.allow |= astate->allow; in add_to_mask() 520 low_mode_from_nfs4(state->owner.allow, &pace->e_perm, flags); in posix_state_to_acl() 525 low_mode_from_nfs4(state->users->aces[i].perms.allow, in posix_state_to_acl() 533 low_mode_from_nfs4(state->group.allow, &pace->e_perm, flags); in posix_state_to_acl() 539 low_mode_from_nfs4(state->groups->aces[i].perms.allow, in posix_state_to_acl() 548 low_mode_from_nfs4(state->mask.allow, &pace->e_perm, flags); in posix_state_to_acl() 553 low_mode_from_nfs4(state->other.allow, &pace->e_perm, flags); in posix_state_to_acl() 561 astate->allow |= mask & ~astate->deny; in allow_bits() 567 astate->deny |= mask & ~astate->allow; in deny_bits() [all …]
|
| /Linux-v6.6/arch/arm/mach-s3c/ |
| D | pm.c | 63 #define any_allowed(mask, allow) (((mask) & (allow)) != (allow)) argument
|
| /Linux-v6.6/tools/build/ |
| D | Makefile | 9 define allow-override 15 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 16 $(call allow-override,LD,$(CROSS_COMPILE)ld)
|
| /Linux-v6.6/lib/ |
| D | Kconfig.kgdb | 88 exception handler which will allow kgdb to step through a 108 0x0002 - allow arbitrary reads from memory and symbol lookup 109 0x0004 - allow arbitrary writes to memory 110 0x0008 - allow current register state to be inspected 111 0x0010 - allow current register state to be modified 112 0x0020 - allow passive inspection (backtrace, process list, lsmod) 113 0x0040 - allow flow control management (breakpoint, single step) 115 0x0100 - allow machine to be rebooted
|
| /Linux-v6.6/fs/smb/server/ |
| D | smbacl.c | 306 pace->e_perm = state->owner.allow; in posix_state_to_acl() 311 pace->e_perm = state->users->aces[i].perms.allow; in posix_state_to_acl() 316 pace->e_perm = state->group.allow; in posix_state_to_acl() 322 pace->e_perm = state->groups->aces[i].perms.allow; in posix_state_to_acl() 328 pace->e_perm = state->mask.allow; in posix_state_to_acl() 333 pace->e_perm = state->other.allow; in posix_state_to_acl() 499 acl_state.owner.allow = ((acl_mode & 0700) >> 6) | 0004; in parse_dacl() 502 acl_state.users->aces[acl_state.users->n++].perms.allow = in parse_dacl() 504 default_acl_state.owner.allow = ((acl_mode & 0700) >> 6) | 0004; in parse_dacl() 507 default_acl_state.users->aces[default_acl_state.users->n++].perms.allow = in parse_dacl() [all …]
|
| /Linux-v6.6/drivers/gpu/drm/amd/display/dc/inc/hw/ |
| D | dchubbub.h | 162 void (*allow_self_refresh_control)(struct hubbub *hubbub, bool allow); 172 void (*force_pstate_change_control)(struct hubbub *hubbub, bool force, bool allow); 193 void (*force_usr_retraining_allow)(struct hubbub *hubbub, bool allow);
|