/linux-6.12.1/security/apparmor/include/ |
D | perms.h | 70 u32 allow; member 111 accum->allow &= addend->allow & ~addend->deny; in aa_perms_accum_raw() 112 accum->audit |= addend->audit & addend->allow; in aa_perms_accum_raw() 113 accum->quiet &= addend->quiet & ~addend->allow; in aa_perms_accum_raw() 114 accum->kill |= addend->kill & ~addend->allow; in aa_perms_accum_raw() 115 accum->complain |= addend->complain & ~addend->allow & ~addend->deny; in aa_perms_accum_raw() 116 accum->cond |= addend->cond & ~addend->allow & ~addend->deny; in aa_perms_accum_raw() 117 accum->hide &= addend->hide & ~addend->allow; in aa_perms_accum_raw() 118 accum->prompt |= addend->prompt & ~addend->allow & ~addend->deny; in aa_perms_accum_raw() 138 accum->allow &= addend->allow & ~accum->deny; in aa_perms_accum() [all …]
|
/linux-6.12.1/rust/bindings/ |
D | lib.rs | 13 #![cfg_attr(test, allow(deref_nullptr))] 14 #![cfg_attr(test, allow(unaligned_references))] 15 #![cfg_attr(test, allow(unsafe_op_in_unsafe_fn))] 16 #![allow( 27 #[allow(dead_code)] 41 #[allow(dead_code)]
|
/linux-6.12.1/tools/tracing/rtla/ |
D | Makefile.rtla | 3 define allow-override 10 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 11 $(call allow-override,AR,$(CROSS_COMPILE)ar) 12 $(call allow-override,STRIP,$(CROSS_COMPILE)strip) 13 $(call allow-override,PKG_CONFIG,pkg-config) 14 $(call allow-override,LD_SO_CONF_PATH,/etc/ld.so.conf.d/) 15 $(call allow-override,LDCONFIG,ldconfig)
|
/linux-6.12.1/tools/verification/rv/ |
D | Makefile.rv | 3 define allow-override 10 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 11 $(call allow-override,AR,$(CROSS_COMPILE)ar) 12 $(call allow-override,STRIP,$(CROSS_COMPILE)strip) 13 $(call allow-override,PKG_CONFIG,pkg-config) 14 $(call allow-override,LD_SO_CONF_PATH,/etc/ld.so.conf.d/) 15 $(call allow-override,LDCONFIG,ldconfig)
|
/linux-6.12.1/tools/scripts/ |
D | Makefile.include | 48 define allow-override 61 $(call allow-override,CC,$(LLVM_PREFIX)clang$(LLVM_SUFFIX)) 62 $(call allow-override,AR,$(LLVM_PREFIX)llvm-ar$(LLVM_SUFFIX)) 63 $(call allow-override,LD,$(LLVM_PREFIX)ld.lld$(LLVM_SUFFIX)) 64 $(call allow-override,CXX,$(LLVM_PREFIX)clang++$(LLVM_SUFFIX)) 65 $(call allow-override,STRIP,$(LLVM_PREFIX)llvm-strip$(LLVM_SUFFIX)) 68 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 69 $(call allow-override,AR,$(CROSS_COMPILE)ar) 70 $(call allow-override,LD,$(CROSS_COMPILE)ld) 71 $(call allow-override,CXX,$(CROSS_COMPILE)g++) [all …]
|
/linux-6.12.1/rust/uapi/ |
D | lib.rs | 12 #![cfg_attr(test, allow(deref_nullptr))] 13 #![cfg_attr(test, allow(unaligned_references))] 14 #![cfg_attr(test, allow(unsafe_op_in_unsafe_fn))] 15 #![allow(
|
/linux-6.12.1/security/apparmor/ |
D | policy_compat.c | 103 perms->allow |= AA_MAY_GETATTR; in compute_fperms_allow() 107 perms->allow |= AA_MAY_CHANGE_PROFILE; in compute_fperms_allow() 109 perms->allow |= AA_MAY_ONEXEC; in compute_fperms_allow() 117 perms.allow = map_old_perms(dfa_user_allow(dfa, state)); in compute_fperms_user() 132 perms.allow = map_old_perms(dfa_other_allow(dfa, state)); in compute_fperms_other() 192 perms[state].allow = dfa_user_allow(xmatch, state); in compute_xmatch_perms() 216 perms.allow = dfa_user_allow(dfa, state); in compute_perms_entry() 231 perms.allow |= map_other(dfa_other_allow(dfa, state)); in compute_perms_entry() 233 perms.allow |= AA_MAY_LOCK; in compute_perms_entry() 235 perms.allow |= map_xbits(dfa_user_xbits(dfa, state)); in compute_perms_entry()
|
D | file.c | 127 ad.request = ad.request & ~perms->allow; in aa_audit_file() 143 ad.denied = ad.request & ~perms->allow; in aa_audit_file() 228 if (request & ~perms->allow) in __aa_path_perm() 347 if (!(lperms.allow & AA_MAY_LINK)) in profile_path_link() 361 if (!(perms.allow & AA_MAY_LINK)) { in profile_path_link() 368 if (!(perms.allow & AA_LINK_SUBSET)) in profile_path_link() 378 request = lperms.allow & ~AA_MAY_LINK; in profile_path_link() 379 lperms.allow &= perms.allow | AA_MAY_LINK; in profile_path_link() 381 request |= AA_AUDIT_FILE_MASK & (lperms.allow & ~perms.allow); in profile_path_link() 382 if (request & ~lperms.allow) { in profile_path_link() [all …]
|
/linux-6.12.1/arch/arm64/boot/dts/qcom/ |
D | sm8650-mtp.dts | 141 regulator-allow-set-load; 151 regulator-allow-set-load; 161 regulator-allow-set-load; 178 regulator-allow-set-load; 188 regulator-allow-set-load; 198 regulator-allow-set-load; 208 regulator-allow-set-load; 218 regulator-allow-set-load; 228 regulator-allow-set-load; 238 regulator-allow-set-load; [all …]
|
D | msm8994-msft-lumia-octagon.dtsi | 587 regulator-allow-set-load; 594 regulator-allow-set-load; 602 regulator-allow-set-load; 624 regulator-allow-set-load; 632 regulator-allow-set-load; 646 regulator-allow-set-load; 671 regulator-allow-set-load; 679 regulator-allow-set-load; 687 regulator-allow-set-load; 695 regulator-allow-set-load; [all …]
|
D | sa8775p-ride.dtsi | 63 regulator-allow-set-load; 73 regulator-allow-set-load; 83 regulator-allow-set-load; 93 regulator-allow-set-load; 103 regulator-allow-set-load; 113 regulator-allow-set-load; 128 regulator-allow-set-load; 138 regulator-allow-set-load; 148 regulator-allow-set-load; 159 * FIXME: This should have regulator-allow-set-load but [all …]
|
D | sdm660-xiaomi-lavender.dts | 146 regulator-allow-set-load; 154 regulator-allow-set-load; 161 regulator-allow-set-load; 172 regulator-allow-set-load; 186 regulator-allow-set-load; 255 regulator-allow-set-load; 279 regulator-allow-set-load; 294 regulator-allow-set-load; 301 regulator-allow-set-load; 308 regulator-allow-set-load; [all …]
|
D | sm8550-hdk.dts | 381 regulator-allow-set-load; 391 regulator-allow-set-load; 401 regulator-allow-set-load; 411 regulator-allow-set-load; 421 regulator-allow-set-load; 431 regulator-allow-set-load; 441 regulator-allow-set-load; 451 regulator-allow-set-load; 461 regulator-allow-set-load; 471 regulator-allow-set-load; [all …]
|
D | sm8650-hdk.dts | 370 regulator-allow-set-load; 380 regulator-allow-set-load; 390 regulator-allow-set-load; 407 regulator-allow-set-load; 417 regulator-allow-set-load; 427 regulator-allow-set-load; 437 regulator-allow-set-load; 447 regulator-allow-set-load; 457 regulator-allow-set-load; 467 regulator-allow-set-load; [all …]
|
D | sm8650-qrd.dts | 307 regulator-allow-set-load; 317 regulator-allow-set-load; 327 regulator-allow-set-load; 344 regulator-allow-set-load; 354 regulator-allow-set-load; 364 regulator-allow-set-load; 374 regulator-allow-set-load; 384 regulator-allow-set-load; 394 regulator-allow-set-load; 404 regulator-allow-set-load; [all …]
|
D | sda660-inforce-ifc6560.dts | 283 regulator-allow-set-load; 291 regulator-allow-set-load; 300 regulator-allow-set-load; 308 regulator-allow-set-load; 326 regulator-allow-set-load; 356 regulator-allow-set-load; 364 regulator-allow-set-load; 376 regulator-allow-set-load; 392 regulator-allow-set-load;
|
/linux-6.12.1/drivers/misc/cb710/ |
D | debug.c | 13 static const u16 allow[CB710_REG_COUNT/16] = { variable 17 static const char *const prefix[ARRAY_SIZE(allow)] = { 26 return ((allow[block] >> offset) & mask) == mask; in allow_reg_read() 35 for (i = 0; i < ARRAY_SIZE(allow); ++i, reg += 16/(t/8)) { \ 63 for (i = 0; i < ARRAY_SIZE(allow); ++i, reg += 16/(t/8)) { \
|
/linux-6.12.1/drivers/dma-buf/ |
D | selftest.c | 54 bool allow = true; in apply_subtest_filter() local 58 allow = false; in apply_subtest_filter() 69 if (allow) in apply_subtest_filter() 77 if (allow) in apply_subtest_filter() 82 result = allow; in apply_subtest_filter()
|
/linux-6.12.1/Documentation/admin-guide/cgroup-v1/ |
D | devices.rst | 24 An entry is added using devices.allow, and removed using 27 echo 'c 1:3 mr' > /sys/fs/cgroup/1/devices.allow 36 echo a > /sys/fs/cgroup/1/devices.allow 74 A allow "b 8:* rwm", "c 116:1 rw" 103 # echo "c *:3 rwm" >A/devices.allow 113 # echo "c 2:3 rwm" >B/devices.allow 114 # echo "c 50:3 r" >B/devices.allow 118 # echo "c *:3 rwm" >B/devices.allow 120 Allowing or denying all by writing 'a' to devices.allow or devices.deny will
|
/linux-6.12.1/fs/nfsd/ |
D | nfs4acl.c | 422 u32 allow; member 486 state->mask.allow |= astate->allow; in add_to_mask() 520 low_mode_from_nfs4(state->owner.allow, &pace->e_perm, flags); in posix_state_to_acl() 525 low_mode_from_nfs4(state->users->aces[i].perms.allow, in posix_state_to_acl() 533 low_mode_from_nfs4(state->group.allow, &pace->e_perm, flags); in posix_state_to_acl() 539 low_mode_from_nfs4(state->groups->aces[i].perms.allow, in posix_state_to_acl() 548 low_mode_from_nfs4(state->mask.allow, &pace->e_perm, flags); in posix_state_to_acl() 553 low_mode_from_nfs4(state->other.allow, &pace->e_perm, flags); in posix_state_to_acl() 561 astate->allow |= mask & ~astate->deny; in allow_bits() 567 astate->deny |= mask & ~astate->allow; in deny_bits() [all …]
|
/linux-6.12.1/arch/arm/mach-s3c/ |
D | pm.c | 63 #define any_allowed(mask, allow) (((mask) & (allow)) != (allow)) argument
|
/linux-6.12.1/tools/build/ |
D | Makefile | 9 define allow-override 15 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 16 $(call allow-override,LD,$(CROSS_COMPILE)ld)
|
/linux-6.12.1/rust/kernel/ |
D | error.rs | 136 #[allow(dead_code)] 138 #[cfg_attr(target_pointer_width = "32", allow(clippy::useless_conversion))] in to_ptr() 272 #[allow(dead_code)] 289 #[allow(clippy::unnecessary_cast)] in from_err_ptr() 319 #[allow(dead_code)]
|
/linux-6.12.1/fs/smb/server/ |
D | smbacl.c | 306 pace->e_perm = state->owner.allow; in posix_state_to_acl() 311 pace->e_perm = state->users->aces[i].perms.allow; in posix_state_to_acl() 316 pace->e_perm = state->group.allow; in posix_state_to_acl() 322 pace->e_perm = state->groups->aces[i].perms.allow; in posix_state_to_acl() 328 pace->e_perm = state->mask.allow; in posix_state_to_acl() 333 pace->e_perm = state->other.allow; in posix_state_to_acl() 502 acl_state.owner.allow = ((acl_mode & 0700) >> 6) | 0004; in parse_dacl() 505 acl_state.users->aces[acl_state.users->n++].perms.allow = in parse_dacl() 507 default_acl_state.owner.allow = ((acl_mode & 0700) >> 6) | 0004; in parse_dacl() 510 default_acl_state.users->aces[default_acl_state.users->n++].perms.allow = in parse_dacl() [all …]
|
/linux-6.12.1/lib/ |
D | Kconfig.kgdb | 88 exception handler which will allow kgdb to step through a 108 0x0002 - allow arbitrary reads from memory and symbol lookup 109 0x0004 - allow arbitrary writes to memory 110 0x0008 - allow current register state to be inspected 111 0x0010 - allow current register state to be modified 112 0x0020 - allow passive inspection (backtrace, process list, lsmod) 113 0x0040 - allow flow control management (breakpoint, single step) 115 0x0100 - allow machine to be rebooted
|