/linux-6.3-rc2/security/apparmor/include/ |
A D | perms.h | 67 u32 allow; member 108 accum->allow &= addend->allow & ~addend->deny; in aa_perms_accum_raw() 109 accum->audit |= addend->audit & addend->allow; in aa_perms_accum_raw() 110 accum->quiet &= addend->quiet & ~addend->allow; in aa_perms_accum_raw() 111 accum->kill |= addend->kill & ~addend->allow; in aa_perms_accum_raw() 114 accum->hide &= addend->hide & ~addend->allow; in aa_perms_accum_raw() 135 accum->allow &= addend->allow & ~accum->deny; in aa_perms_accum() 136 accum->audit |= addend->audit & accum->allow; in aa_perms_accum() 137 accum->quiet &= addend->quiet & ~accum->allow; in aa_perms_accum() 138 accum->kill |= addend->kill & ~accum->allow; in aa_perms_accum() [all …]
|
/linux-6.3-rc2/tools/scripts/ |
A D | Makefile.include | 48 define allow-override 61 $(call allow-override,CC,$(LLVM_PREFIX)clang$(LLVM_SUFFIX)) 62 $(call allow-override,AR,$(LLVM_PREFIX)llvm-ar$(LLVM_SUFFIX)) 63 $(call allow-override,LD,$(LLVM_PREFIX)ld.lld$(LLVM_SUFFIX)) 64 $(call allow-override,CXX,$(LLVM_PREFIX)clang++$(LLVM_SUFFIX)) 65 $(call allow-override,STRIP,$(LLVM_PREFIX)llvm-strip$(LLVM_SUFFIX)) 68 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 69 $(call allow-override,AR,$(CROSS_COMPILE)ar) 70 $(call allow-override,LD,$(CROSS_COMPILE)ld) 71 $(call allow-override,CXX,$(CROSS_COMPILE)g++) [all …]
|
/linux-6.3-rc2/rust/bindings/ |
A D | lib.rs | 14 #![cfg_attr(test, allow(deref_nullptr))] 15 #![cfg_attr(test, allow(unaligned_references))] 16 #![cfg_attr(test, allow(unsafe_op_in_unsafe_fn))] 17 #![allow( 41 #[allow(dead_code)]
|
/linux-6.3-rc2/tools/tracing/rtla/ |
A D | Makefile | 11 define allow-override 18 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 19 $(call allow-override,AR,$(CROSS_COMPILE)ar) 20 $(call allow-override,STRIP,$(CROSS_COMPILE)strip) 21 $(call allow-override,PKG_CONFIG,pkg-config) 22 $(call allow-override,LD_SO_CONF_PATH,/etc/ld.so.conf.d/) 23 $(call allow-override,LDCONFIG,ldconfig)
|
/linux-6.3-rc2/tools/verification/rv/ |
A D | Makefile | 11 define allow-override 18 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 19 $(call allow-override,AR,$(CROSS_COMPILE)ar) 20 $(call allow-override,STRIP,$(CROSS_COMPILE)strip) 21 $(call allow-override,PKG_CONFIG,pkg-config) 22 $(call allow-override,LD_SO_CONF_PATH,/etc/ld.so.conf.d/) 23 $(call allow-override,LDCONFIG,ldconfig)
|
/linux-6.3-rc2/security/apparmor/ |
A D | policy_compat.c | 103 perms->allow |= AA_MAY_GETATTR; in compute_fperms_allow() 107 perms->allow |= AA_MAY_CHANGE_PROFILE; in compute_fperms_allow() 109 perms->allow |= AA_MAY_ONEXEC; in compute_fperms_allow() 117 perms.allow = map_old_perms(dfa_user_allow(dfa, state)); in compute_fperms_user() 132 perms.allow = map_old_perms(dfa_other_allow(dfa, state)); in compute_fperms_other() 185 perms[state].allow = dfa_user_allow(xmatch, state); in compute_xmatch_perms() 209 perms.allow = dfa_user_allow(dfa, state); in compute_perms_entry() 224 perms.allow |= map_other(dfa_other_allow(dfa, state)); in compute_perms_entry() 226 perms.allow |= AA_MAY_LOCK; in compute_perms_entry() 228 perms.allow |= map_xbits(dfa_user_xbits(dfa, state)); in compute_perms_entry()
|
A D | file.c | 223 if (request & ~perms->allow) in __aa_path_perm() 335 if (!(lperms.allow & AA_MAY_LINK)) in profile_path_link() 349 if (!(perms.allow & AA_MAY_LINK)) { in profile_path_link() 356 if (!(perms.allow & AA_LINK_SUBSET)) in profile_path_link() 366 request = lperms.allow & ~AA_MAY_LINK; in profile_path_link() 367 lperms.allow &= perms.allow | AA_MAY_LINK; in profile_path_link() 369 request |= AA_AUDIT_FILE_MASK & (lperms.allow & ~perms.allow); in profile_path_link() 370 if (request & ~lperms.allow) { in profile_path_link() 374 lperms.allow &= ~MAY_EXEC; in profile_path_link() 451 fctx->allow |= request; in update_file_ctx() [all …]
|
/linux-6.3-rc2/drivers/dma-buf/ |
A D | selftest.c | 54 bool allow = true; in apply_subtest_filter() local 58 allow = false; in apply_subtest_filter() 69 if (allow) in apply_subtest_filter() 77 if (allow) in apply_subtest_filter() 82 result = allow; in apply_subtest_filter()
|
/linux-6.3-rc2/drivers/misc/cb710/ |
A D | debug.c | 13 static const u16 allow[CB710_REG_COUNT/16] = { variable 17 static const char *const prefix[ARRAY_SIZE(allow)] = { 26 return ((allow[block] >> offset) & mask) == mask; in allow_reg_read() 35 for (i = 0; i < ARRAY_SIZE(allow); ++i, reg += 16/(t/8)) { \ 63 for (i = 0; i < ARRAY_SIZE(allow); ++i, reg += 16/(t/8)) { \
|
/linux-6.3-rc2/arch/arm64/boot/dts/qcom/ |
A D | msm8994-msft-lumia-octagon.dtsi | 589 regulator-allow-set-load; 596 regulator-allow-set-load; 604 regulator-allow-set-load; 626 regulator-allow-set-load; 634 regulator-allow-set-load; 648 regulator-allow-set-load; 673 regulator-allow-set-load; 681 regulator-allow-set-load; 689 regulator-allow-set-load; 697 regulator-allow-set-load; [all …]
|
A D | sdm660-xiaomi-lavender.dts | 146 regulator-allow-set-load; 154 regulator-allow-set-load; 161 regulator-allow-set-load; 172 regulator-allow-set-load; 186 regulator-allow-set-load; 255 regulator-allow-set-load; 279 regulator-allow-set-load; 294 regulator-allow-set-load; 301 regulator-allow-set-load; 308 regulator-allow-set-load; [all …]
|
A D | sda660-inforce-ifc6560.dts | 269 regulator-allow-set-load; 277 regulator-allow-set-load; 286 regulator-allow-set-load; 294 regulator-allow-set-load; 312 regulator-allow-set-load; 342 regulator-allow-set-load; 350 regulator-allow-set-load; 362 regulator-allow-set-load; 378 regulator-allow-set-load;
|
A D | msm8998-clamshell.dtsi | 179 regulator-allow-set-load; 195 regulator-allow-set-load; 201 regulator-allow-set-load; 222 regulator-allow-set-load; 273 regulator-allow-set-load; 289 regulator-allow-set-load; 295 regulator-allow-set-load; 317 regulator-allow-set-load;
|
A D | sdm630-sony-xperia-nile.dtsi | 313 regulator-allow-set-load; 328 regulator-allow-set-load; 339 regulator-allow-set-load; 351 regulator-allow-set-load; 366 regulator-allow-set-load; 452 regulator-allow-set-load; 479 regulator-allow-set-load; 497 regulator-allow-set-load; 505 regulator-allow-set-load; 513 regulator-allow-set-load; [all …]
|
/linux-6.3-rc2/Documentation/admin-guide/cgroup-v1/ |
A D | devices.rst | 24 An entry is added using devices.allow, and removed using 27 echo 'c 1:3 mr' > /sys/fs/cgroup/1/devices.allow 36 echo a > /sys/fs/cgroup/1/devices.allow 74 A allow "b 8:* rwm", "c 116:1 rw" 103 # echo "c *:3 rwm" >A/devices.allow 113 # echo "c 2:3 rwm" >B/devices.allow 114 # echo "c 50:3 r" >B/devices.allow 118 # echo "c *:3 rwm" >B/devices.allow 120 Allowing or denying all by writing 'a' to devices.allow or devices.deny will
|
/linux-6.3-rc2/arch/arm/mach-s3c/ |
A D | pm.c | 63 #define any_allowed(mask, allow) (((mask) & (allow)) != (allow)) argument
|
/linux-6.3-rc2/fs/nfsd/ |
A D | nfs4acl.c | 422 u32 allow; member 487 state->mask.allow |= astate->allow; in add_to_mask() 521 low_mode_from_nfs4(state->owner.allow, &pace->e_perm, flags); in posix_state_to_acl() 526 low_mode_from_nfs4(state->users->aces[i].perms.allow, in posix_state_to_acl() 534 low_mode_from_nfs4(state->group.allow, &pace->e_perm, flags); in posix_state_to_acl() 540 low_mode_from_nfs4(state->groups->aces[i].perms.allow, in posix_state_to_acl() 549 low_mode_from_nfs4(state->mask.allow, &pace->e_perm, flags); in posix_state_to_acl() 562 astate->allow |= mask & ~astate->deny; in allow_bits() 568 astate->deny |= mask & ~astate->allow; in deny_bits() 582 a->aces[i].perms.allow = state->everyone.allow; in find_uid() [all …]
|
/linux-6.3-rc2/tools/build/ |
A D | Makefile | 9 define allow-override 15 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 16 $(call allow-override,LD,$(CROSS_COMPILE)ld)
|
/linux-6.3-rc2/lib/ |
A D | Kconfig.kgdb | 88 exception handler which will allow kgdb to step through a 108 0x0002 - allow arbitrary reads from memory and symbol lookup 109 0x0004 - allow arbitrary writes to memory 110 0x0008 - allow current register state to be inspected 111 0x0010 - allow current register state to be modified 112 0x0020 - allow passive inspection (backtrace, process list, lsmod) 113 0x0040 - allow flow control management (breakpoint, single step) 115 0x0100 - allow machine to be rebooted
|
/linux-6.3-rc2/fs/ksmbd/ |
A D | smbacl.c | 306 pace->e_perm = state->owner.allow; in posix_state_to_acl() 311 pace->e_perm = state->users->aces[i].perms.allow; in posix_state_to_acl() 316 pace->e_perm = state->group.allow; in posix_state_to_acl() 322 pace->e_perm = state->groups->aces[i].perms.allow; in posix_state_to_acl() 328 pace->e_perm = state->mask.allow; in posix_state_to_acl() 333 pace->e_perm = state->other.allow; in posix_state_to_acl() 527 acl_state.group.allow = (mode & 0070) >> 3; in parse_dacl() 543 acl_state.other.allow = mode & 0007; in parse_dacl() 544 default_acl_state.other.allow = mode & 0007; in parse_dacl() 548 acl_state.mask.allow = 0x07; in parse_dacl() [all …]
|
/linux-6.3-rc2/Documentation/devicetree/bindings/soc/aspeed/ |
A D | uart-routing.yaml | 16 The Aspeed UART routing control allow to dynamically route the inputs for 21 allow access to the Host's serial console. 23 This driver is for the BMC side. The sysfs files allow the BMC userspace
|
/linux-6.3-rc2/drivers/gpu/drm/amd/display/dc/inc/hw/ |
A D | dchubbub.h | 157 void (*allow_self_refresh_control)(struct hubbub *hubbub, bool allow); 167 void (*force_pstate_change_control)(struct hubbub *hubbub, bool force, bool allow); 188 void (*force_usr_retraining_allow)(struct hubbub *hubbub, bool allow);
|
/linux-6.3-rc2/Documentation/ABI/testing/ |
A D | sysfs-class-iommu | 7 given IOMMU here to allow association of IOMMU to 16 given device here to allow association of device to
|
/linux-6.3-rc2/drivers/gpu/drm/i915/selftests/ |
A D | i915_selftest.c | 251 bool allow = true; in apply_subtest_filter() local 255 allow = false; in apply_subtest_filter() 266 if (allow) in apply_subtest_filter() 274 if (allow) in apply_subtest_filter() 279 result = allow; in apply_subtest_filter()
|
/linux-6.3-rc2/Documentation/devicetree/bindings/mfd/ |
A D | actions,atc260x.yaml | 68 regulator-allow-bypass: true 87 regulator-allow-bypass: true 103 regulator-allow-bypass: false 115 regulator-allow-bypass: false
|