/linux-6.12.1/LICENSES/dual/ |
D | CC-BY-4.0 | 32 conditions that creators and other rights holders may use to share 34 and certain other rights specified in the public license below. The 41 copyright and certain other rights. Our licenses are 44 Licensors should also secure all rights necessary before 59 other rights that a licensor has authority to grant. Use of 62 rights in the material. A licensor may make special requests, 73 By exercising the Licensed Rights (defined below), You accept and agree 77 granted the Licensed Rights in consideration of Your acceptance of 78 these terms and conditions, and the Licensor grants You such rights in 86 Rights that is derived from or based upon the Licensed Material [all …]
|
D | MPL-1.1 | 53 subsequently acquired, any and all of the rights conveyed herein. 85 exercising rights under, and complying with all of the terms of, this 101 (a) under intellectual property rights (other than patent or 126 (a) under intellectual property rights (other than patent or 167 License or the recipients' rights hereunder. However, You may include 168 an additional document offering the additional rights described in 197 intellectual property rights is required to exercise the rights 220 Contributor has sufficient rights to grant the rights conveyed by 231 for the Source Code where You describe recipients' rights or ownership 232 rights relating to Covered Code. You may choose to offer, and to [all …]
|
D | CDDL-1.0 | 46 subsequently acquired, any and all of the rights conveyed herein. 75 exercising rights under, and complying with all of the terms 93 (a) under intellectual property rights (other than patent or 124 (a) under intellectual property rights (other than patent or 176 have sufficient rights to grant the rights conveyed by this 192 this License or the recipients' rights hereunder. You may choose to 211 limit or alter the recipient's rights in the Source Code form from 212 the rights set forth in this License. If You distribute the Covered 279 6.1. This License and the rights granted hereunder will terminate 292 infringes any patent, then any and all rights granted directly or [all …]
|
/linux-6.12.1/tools/testing/selftests/powerpc/include/ |
D | pkeys.h | 15 * Older versions of libc use the Intel-specific access rights. 52 void pkey_set_rights(int pkey, unsigned long rights) in pkey_set_rights() argument 59 amr |= (rights & PKEY_BITS_MASK) << shift; in pkey_set_rights() 68 int sys_pkey_alloc(unsigned long flags, unsigned long rights) in sys_pkey_alloc() argument 70 return syscall(__NR_pkey_alloc, flags, rights); in sys_pkey_alloc() 121 unsigned long next_pkey_rights(unsigned long rights) in next_pkey_rights() argument 123 if (rights == PKEY_DISABLE_ACCESS) in next_pkey_rights() 125 else if (rights == (PKEY_DISABLE_ACCESS | PKEY_DISABLE_EXECUTE)) in next_pkey_rights() 128 if ((rights & PKEY_BITS_MASK) == 0) in next_pkey_rights() 129 rights |= PKEY_DISABLE_WRITE; in next_pkey_rights() [all …]
|
/linux-6.12.1/tools/testing/selftests/powerpc/mm/ |
D | pkey_siginfo.c | 31 static volatile sig_atomic_t rights, fault_count; variable 71 * If the current fault occurred due to lack of execute rights, in segv_handler() 73 * rights cannot be changed directly for the faulting pkey as in segv_handler() 77 * read-write rights, change the AMR permission bits for the in segv_handler() 82 if (rights == PKEY_DISABLE_EXECUTE && in segv_handler() 92 unsigned long rights; member 99 unsigned long rights; in protect() local 110 rights = 0; in protect() 112 printf("tid %d, pkey permissions are %s\n", tid, pkey_rights(rights)); in protect() 115 perm_pkey = sys_pkey_alloc(0, rights); in protect() [all …]
|
D | pkey_exec_prot.c | 105 unsigned long rights; in test() local 154 rights = PKEY_DISABLE_EXECUTE; in test() 155 pkey = sys_pkey_alloc(0, rights); in test() 181 pkey_rights(rights)); in test() 198 pkey_rights(rights)); in test() 203 rights |= PKEY_DISABLE_ACCESS; in test() 217 pkey_set_rights(pkey, rights); in test() 219 pkey_rights(rights)); in test() 234 pkey_set_rights(pkey, rights); in test() 236 pkey_rights(rights)); in test() [all …]
|
/linux-6.12.1/drivers/infiniband/core/ |
D | agent.h | 2 * Copyright (c) 2004 Mellanox Technologies Ltd. All rights reserved. 3 * Copyright (c) 2004 Infinicon Corporation. All rights reserved. 4 * Copyright (c) 2004 Intel Corporation. All rights reserved. 5 * Copyright (c) 2004 Topspin Corporation. All rights reserved. 6 * Copyright (c) 2004 Voltaire Corporation. All rights reserved.
|
D | smi.h | 2 * Copyright (c) 2004 Mellanox Technologies Ltd. All rights reserved. 3 * Copyright (c) 2004 Infinicon Corporation. All rights reserved. 4 * Copyright (c) 2004 Intel Corporation. All rights reserved. 5 * Copyright (c) 2004 Topspin Corporation. All rights reserved. 6 * Copyright (c) 2004-2007 Voltaire Corporation. All rights reserved.
|
D | cm_msgs.h | 3 * Copyright (c) 2004, 2011 Intel Corporation. All rights reserved. 4 * Copyright (c) 2004 Topspin Corporation. All rights reserved. 5 * Copyright (c) 2004 Voltaire Corporation. All rights reserved. 6 * Copyright (c) 2019, Mellanox Technologies inc. All rights reserved.
|
D | agent.c | 2 * Copyright (c) 2004, 2005 Mellanox Technologies Ltd. All rights reserved. 3 * Copyright (c) 2004, 2005 Infinicon Corporation. All rights reserved. 4 * Copyright (c) 2004, 2005 Intel Corporation. All rights reserved. 5 * Copyright (c) 2004, 2005 Topspin Corporation. All rights reserved. 6 * Copyright (c) 2004-2007 Voltaire Corporation. All rights reserved. 7 * Copyright (c) 2005 Sun Microsystems, Inc. All rights reserved.
|
D | cma_priv.h | 2 * Copyright (c) 2005 Voltaire Inc. All rights reserved. 3 * Copyright (c) 2002-2005, Network Appliance, Inc. All rights reserved. 4 * Copyright (c) 1999-2005, Mellanox Technologies, Inc. All rights reserved. 5 * Copyright (c) 2005-2006 Intel Corporation. All rights reserved.
|
/linux-6.12.1/security/landlock/ |
D | ruleset.h | 25 * All access rights that are denied by default whether they are handled or not 35 /* Makes sure all filesystem access rights can be stored. */ 37 /* Makes sure all network access rights can be stored. */ 39 /* Makes sure all scoped rights can be stored. */ 65 * struct landlock_layer - Access rights for a given layer 126 * struct landlock_rule - Access rights tied to an object 238 * rulesets without overlapping access rights. These 274 * landlock_union_access_masks - Return all access rights handled in the 300 * at least one of the access rights specified 306 * Returns: @domain if any access rights specified in @masks is handled, or [all …]
|
D | fs.h | 43 * tracks the relevant Landlock access rights that were available at the time 44 * of opening the file. Other LSM hooks use these rights in order to authorize 49 * @allowed_access: Access rights that were available at the time of 51 * rights available at that time, but it's the necessary subset as
|
D | fs.c | 304 /* All access rights that can be tied to files. */ 326 /* Files only get access rights that make sense. */ in landlock_append_fs_rule() 333 /* Transforms relative access rights to absolute ones. */ in landlock_append_fs_rule() 394 /* Handles all initially denied by default access rights. */ in get_handled_fs_accesses() 435 * rights without child exceptions): in no_more_access() 512 /* Checks that file access rights are also enforced for a directory. */ in test_no_more_access() 515 /* Checks that directory access rights don't impact file referring... */ in test_no_more_access() 527 /* Checks file exchange with directory access rights... */ in test_no_more_access() 532 /* ...and with file access rights. */ in test_no_more_access() 987 * - true if all the domain access rights are allowed for @dir; [all …]
|
/linux-6.12.1/Documentation/security/ |
D | landlock.rst | 47 Cf. `File descriptor access rights`_. 52 Inode access rights 55 All access rights are tied to an inode and what can be accessed through it. 64 File descriptor access rights 67 Access rights are checked and tied to file descriptors at open time. The 80 Similarly to file access modes (e.g. ``O_RDWR``), Landlock access rights 82 processes (e.g. through a Unix domain socket). Such access rights will then be
|
/linux-6.12.1/Documentation/userspace-api/ |
D | landlock.rst | 13 The goal of Landlock is to enable restriction of ambient rights (e.g. global 41 `filesystem access rights`. 45 and the related actions are defined with `network access rights`. 59 to be explicit about the denied-by-default access rights. 95 version, and only use the available subset of access rights: 177 for the ruleset creation, by filtering access rights according to the Landlock 179 ``allowed_access`` rights are already available in ABI 1. 230 It is recommended to set access rights to file hierarchy leaves as much as 237 access rights per directory enables changing the location of such directories 238 without relying on the destination directory access rights (except those that [all …]
|
/linux-6.12.1/include/uapi/rdma/ |
D | irdma-abi.h | 3 * Copyright (c) 2006 - 2021 Intel Corporation. All rights reserved. 4 * Copyright (c) 2005 Topspin Communications. All rights reserved. 5 * Copyright (c) 2005 Cisco Systems. All rights reserved. 6 * Copyright (c) 2005 Open Grid Computing, Inc. All rights reserved.
|
/linux-6.12.1/include/rdma/ |
D | ib_smi.h | 3 * Copyright (c) 2004 Mellanox Technologies Ltd. All rights reserved. 4 * Copyright (c) 2004 Infinicon Corporation. All rights reserved. 5 * Copyright (c) 2004 Intel Corporation. All rights reserved. 6 * Copyright (c) 2004 Topspin Corporation. All rights reserved. 7 * Copyright (c) 2004 Voltaire Corporation. All rights reserved.
|
/linux-6.12.1/include/uapi/linux/ |
D | landlock.h | 19 * This structure defines a set of *handled access rights*, a set of actions on 21 * enacted. Vice versa, access rights that are not specifically listed here are 29 * The explicit listing of *handled access rights* is required for backwards 31 * *handle* a wide range or all access rights that they know about at build time 145 * The following access rights apply only to files: 163 * A directory can receive access rights related to files or directories. The 169 * However, the following access rights only apply to the content of a 201 * * The reparented file may not gain more access rights in the destination 273 * The following access rights apply to TCP port numbers:
|
/linux-6.12.1/LICENSES/deprecated/ |
D | GPL-1.0 | 38 To protect your rights, we need to make restrictions that forbid 39 anyone to deny you these rights or to ask you to surrender the rights. 44 gratis or for a fee, you must give the recipients all the rights that 46 source code. And you must tell them their rights. 48 We protect your rights with two steps: (1) copyright the software, and 143 the Program is void, and will automatically terminate your rights to use 145 copies, or rights to use copies, from you under this General Public 157 recipients' exercise of the rights granted herein.
|
/linux-6.12.1/LICENSES/preferred/ |
D | GPL-2.0 | 47 To protect your rights, we need to make restrictions that forbid 48 anyone to deny you these rights or to ask you to surrender the rights. 53 gratis or for a fee, you must give the recipients all the rights that 56 rights. 58 We protect your rights with two steps: (1) copyright the software, and 143 Thus, it is not the intent of this section to claim rights or contest 144 your rights to work written entirely by you; rather, the intent is to 194 void, and will automatically terminate your rights under this License. 195 However, parties who have received copies, or rights, from you under 212 restrictions on the recipients' exercise of the rights granted herein.
|
/linux-6.12.1/tools/usb/usbip/ |
D | COPYING | 28 To protect your rights, we need to make restrictions that forbid 29 anyone to deny you these rights or to ask you to surrender the rights. 34 gratis or for a fee, you must give the recipients all the rights that 37 rights. 39 We protect your rights with two steps: (1) copyright the software, and 124 Thus, it is not the intent of this section to claim rights or contest 125 your rights to work written entirely by you; rather, the intent is to 175 void, and will automatically terminate your rights under this License. 176 However, parties who have received copies, or rights, from you under 193 restrictions on the recipients' exercise of the rights granted herein.
|
/linux-6.12.1/include/linux/ |
D | ntb_transport.h | 7 * Copyright(c) 2012 Intel Corporation. All rights reserved. 8 * Copyright (C) 2015 EMC Corporation. All Rights Reserved. 16 * Copyright(c) 2012 Intel Corporation. All rights reserved. 17 * Copyright (C) 2015 EMC Corporation. All Rights Reserved.
|
/linux-6.12.1/drivers/infiniband/ulp/rtrs/ |
D | rtrs-log.h | 5 * Copyright (c) 2014 - 2018 ProfitBricks GmbH. All rights reserved. 6 * Copyright (c) 2018 - 2019 1&1 IONOS Cloud GmbH. All rights reserved. 7 * Copyright (c) 2019 - 2020 1&1 IONOS SE. All rights reserved.
|
/linux-6.12.1/drivers/gpu/drm/amd/amdgpu/ |
D | isp_v4_1_1.h | 3 * Copyright (C) 2024 Advanced Micro Devices, Inc. All rights reserved. 4 * All Rights Reserved. 9 * without limitation the rights to use, copy, modify, merge, publish,
|