Home
last modified time | relevance | path

Searched refs:allow (Results 1 – 25 of 1063) sorted by relevance

12345678910>>...43

/linux-6.12.1/security/apparmor/include/
Dperms.h70 u32 allow; member
111 accum->allow &= addend->allow & ~addend->deny; in aa_perms_accum_raw()
112 accum->audit |= addend->audit & addend->allow; in aa_perms_accum_raw()
113 accum->quiet &= addend->quiet & ~addend->allow; in aa_perms_accum_raw()
114 accum->kill |= addend->kill & ~addend->allow; in aa_perms_accum_raw()
115 accum->complain |= addend->complain & ~addend->allow & ~addend->deny; in aa_perms_accum_raw()
116 accum->cond |= addend->cond & ~addend->allow & ~addend->deny; in aa_perms_accum_raw()
117 accum->hide &= addend->hide & ~addend->allow; in aa_perms_accum_raw()
118 accum->prompt |= addend->prompt & ~addend->allow & ~addend->deny; in aa_perms_accum_raw()
138 accum->allow &= addend->allow & ~accum->deny; in aa_perms_accum()
[all …]
/linux-6.12.1/rust/bindings/
Dlib.rs13 #![cfg_attr(test, allow(deref_nullptr))]
14 #![cfg_attr(test, allow(unaligned_references))]
15 #![cfg_attr(test, allow(unsafe_op_in_unsafe_fn))]
16 #![allow(
27 #[allow(dead_code)]
41 #[allow(dead_code)]
/linux-6.12.1/tools/tracing/rtla/
DMakefile.rtla3 define allow-override
10 $(call allow-override,CC,$(CROSS_COMPILE)gcc)
11 $(call allow-override,AR,$(CROSS_COMPILE)ar)
12 $(call allow-override,STRIP,$(CROSS_COMPILE)strip)
13 $(call allow-override,PKG_CONFIG,pkg-config)
14 $(call allow-override,LD_SO_CONF_PATH,/etc/ld.so.conf.d/)
15 $(call allow-override,LDCONFIG,ldconfig)
/linux-6.12.1/tools/verification/rv/
DMakefile.rv3 define allow-override
10 $(call allow-override,CC,$(CROSS_COMPILE)gcc)
11 $(call allow-override,AR,$(CROSS_COMPILE)ar)
12 $(call allow-override,STRIP,$(CROSS_COMPILE)strip)
13 $(call allow-override,PKG_CONFIG,pkg-config)
14 $(call allow-override,LD_SO_CONF_PATH,/etc/ld.so.conf.d/)
15 $(call allow-override,LDCONFIG,ldconfig)
/linux-6.12.1/tools/scripts/
DMakefile.include48 define allow-override
61 $(call allow-override,CC,$(LLVM_PREFIX)clang$(LLVM_SUFFIX))
62 $(call allow-override,AR,$(LLVM_PREFIX)llvm-ar$(LLVM_SUFFIX))
63 $(call allow-override,LD,$(LLVM_PREFIX)ld.lld$(LLVM_SUFFIX))
64 $(call allow-override,CXX,$(LLVM_PREFIX)clang++$(LLVM_SUFFIX))
65 $(call allow-override,STRIP,$(LLVM_PREFIX)llvm-strip$(LLVM_SUFFIX))
68 $(call allow-override,CC,$(CROSS_COMPILE)gcc)
69 $(call allow-override,AR,$(CROSS_COMPILE)ar)
70 $(call allow-override,LD,$(CROSS_COMPILE)ld)
71 $(call allow-override,CXX,$(CROSS_COMPILE)g++)
[all …]
/linux-6.12.1/rust/uapi/
Dlib.rs12 #![cfg_attr(test, allow(deref_nullptr))]
13 #![cfg_attr(test, allow(unaligned_references))]
14 #![cfg_attr(test, allow(unsafe_op_in_unsafe_fn))]
15 #![allow(
/linux-6.12.1/security/apparmor/
Dpolicy_compat.c103 perms->allow |= AA_MAY_GETATTR; in compute_fperms_allow()
107 perms->allow |= AA_MAY_CHANGE_PROFILE; in compute_fperms_allow()
109 perms->allow |= AA_MAY_ONEXEC; in compute_fperms_allow()
117 perms.allow = map_old_perms(dfa_user_allow(dfa, state)); in compute_fperms_user()
132 perms.allow = map_old_perms(dfa_other_allow(dfa, state)); in compute_fperms_other()
192 perms[state].allow = dfa_user_allow(xmatch, state); in compute_xmatch_perms()
216 perms.allow = dfa_user_allow(dfa, state); in compute_perms_entry()
231 perms.allow |= map_other(dfa_other_allow(dfa, state)); in compute_perms_entry()
233 perms.allow |= AA_MAY_LOCK; in compute_perms_entry()
235 perms.allow |= map_xbits(dfa_user_xbits(dfa, state)); in compute_perms_entry()
Dfile.c127 ad.request = ad.request & ~perms->allow; in aa_audit_file()
143 ad.denied = ad.request & ~perms->allow; in aa_audit_file()
228 if (request & ~perms->allow) in __aa_path_perm()
347 if (!(lperms.allow & AA_MAY_LINK)) in profile_path_link()
361 if (!(perms.allow & AA_MAY_LINK)) { in profile_path_link()
368 if (!(perms.allow & AA_LINK_SUBSET)) in profile_path_link()
378 request = lperms.allow & ~AA_MAY_LINK; in profile_path_link()
379 lperms.allow &= perms.allow | AA_MAY_LINK; in profile_path_link()
381 request |= AA_AUDIT_FILE_MASK & (lperms.allow & ~perms.allow); in profile_path_link()
382 if (request & ~lperms.allow) { in profile_path_link()
[all …]
/linux-6.12.1/arch/arm64/boot/dts/qcom/
Dsm8650-mtp.dts141 regulator-allow-set-load;
151 regulator-allow-set-load;
161 regulator-allow-set-load;
178 regulator-allow-set-load;
188 regulator-allow-set-load;
198 regulator-allow-set-load;
208 regulator-allow-set-load;
218 regulator-allow-set-load;
228 regulator-allow-set-load;
238 regulator-allow-set-load;
[all …]
Dmsm8994-msft-lumia-octagon.dtsi587 regulator-allow-set-load;
594 regulator-allow-set-load;
602 regulator-allow-set-load;
624 regulator-allow-set-load;
632 regulator-allow-set-load;
646 regulator-allow-set-load;
671 regulator-allow-set-load;
679 regulator-allow-set-load;
687 regulator-allow-set-load;
695 regulator-allow-set-load;
[all …]
Dsa8775p-ride.dtsi63 regulator-allow-set-load;
73 regulator-allow-set-load;
83 regulator-allow-set-load;
93 regulator-allow-set-load;
103 regulator-allow-set-load;
113 regulator-allow-set-load;
128 regulator-allow-set-load;
138 regulator-allow-set-load;
148 regulator-allow-set-load;
159 * FIXME: This should have regulator-allow-set-load but
[all …]
Dsdm660-xiaomi-lavender.dts146 regulator-allow-set-load;
154 regulator-allow-set-load;
161 regulator-allow-set-load;
172 regulator-allow-set-load;
186 regulator-allow-set-load;
255 regulator-allow-set-load;
279 regulator-allow-set-load;
294 regulator-allow-set-load;
301 regulator-allow-set-load;
308 regulator-allow-set-load;
[all …]
Dsm8550-hdk.dts381 regulator-allow-set-load;
391 regulator-allow-set-load;
401 regulator-allow-set-load;
411 regulator-allow-set-load;
421 regulator-allow-set-load;
431 regulator-allow-set-load;
441 regulator-allow-set-load;
451 regulator-allow-set-load;
461 regulator-allow-set-load;
471 regulator-allow-set-load;
[all …]
Dsm8650-hdk.dts370 regulator-allow-set-load;
380 regulator-allow-set-load;
390 regulator-allow-set-load;
407 regulator-allow-set-load;
417 regulator-allow-set-load;
427 regulator-allow-set-load;
437 regulator-allow-set-load;
447 regulator-allow-set-load;
457 regulator-allow-set-load;
467 regulator-allow-set-load;
[all …]
Dsm8650-qrd.dts307 regulator-allow-set-load;
317 regulator-allow-set-load;
327 regulator-allow-set-load;
344 regulator-allow-set-load;
354 regulator-allow-set-load;
364 regulator-allow-set-load;
374 regulator-allow-set-load;
384 regulator-allow-set-load;
394 regulator-allow-set-load;
404 regulator-allow-set-load;
[all …]
Dsda660-inforce-ifc6560.dts283 regulator-allow-set-load;
291 regulator-allow-set-load;
300 regulator-allow-set-load;
308 regulator-allow-set-load;
326 regulator-allow-set-load;
356 regulator-allow-set-load;
364 regulator-allow-set-load;
376 regulator-allow-set-load;
392 regulator-allow-set-load;
/linux-6.12.1/drivers/misc/cb710/
Ddebug.c13 static const u16 allow[CB710_REG_COUNT/16] = { variable
17 static const char *const prefix[ARRAY_SIZE(allow)] = {
26 return ((allow[block] >> offset) & mask) == mask; in allow_reg_read()
35 for (i = 0; i < ARRAY_SIZE(allow); ++i, reg += 16/(t/8)) { \
63 for (i = 0; i < ARRAY_SIZE(allow); ++i, reg += 16/(t/8)) { \
/linux-6.12.1/drivers/dma-buf/
Dselftest.c54 bool allow = true; in apply_subtest_filter() local
58 allow = false; in apply_subtest_filter()
69 if (allow) in apply_subtest_filter()
77 if (allow) in apply_subtest_filter()
82 result = allow; in apply_subtest_filter()
/linux-6.12.1/Documentation/admin-guide/cgroup-v1/
Ddevices.rst24 An entry is added using devices.allow, and removed using
27 echo 'c 1:3 mr' > /sys/fs/cgroup/1/devices.allow
36 echo a > /sys/fs/cgroup/1/devices.allow
74 A allow "b 8:* rwm", "c 116:1 rw"
103 # echo "c *:3 rwm" >A/devices.allow
113 # echo "c 2:3 rwm" >B/devices.allow
114 # echo "c 50:3 r" >B/devices.allow
118 # echo "c *:3 rwm" >B/devices.allow
120 Allowing or denying all by writing 'a' to devices.allow or devices.deny will
/linux-6.12.1/fs/nfsd/
Dnfs4acl.c422 u32 allow; member
486 state->mask.allow |= astate->allow; in add_to_mask()
520 low_mode_from_nfs4(state->owner.allow, &pace->e_perm, flags); in posix_state_to_acl()
525 low_mode_from_nfs4(state->users->aces[i].perms.allow, in posix_state_to_acl()
533 low_mode_from_nfs4(state->group.allow, &pace->e_perm, flags); in posix_state_to_acl()
539 low_mode_from_nfs4(state->groups->aces[i].perms.allow, in posix_state_to_acl()
548 low_mode_from_nfs4(state->mask.allow, &pace->e_perm, flags); in posix_state_to_acl()
553 low_mode_from_nfs4(state->other.allow, &pace->e_perm, flags); in posix_state_to_acl()
561 astate->allow |= mask & ~astate->deny; in allow_bits()
567 astate->deny |= mask & ~astate->allow; in deny_bits()
[all …]
/linux-6.12.1/arch/arm/mach-s3c/
Dpm.c63 #define any_allowed(mask, allow) (((mask) & (allow)) != (allow)) argument
/linux-6.12.1/tools/build/
DMakefile9 define allow-override
15 $(call allow-override,CC,$(CROSS_COMPILE)gcc)
16 $(call allow-override,LD,$(CROSS_COMPILE)ld)
/linux-6.12.1/rust/kernel/
Derror.rs136 #[allow(dead_code)]
138 #[cfg_attr(target_pointer_width = "32", allow(clippy::useless_conversion))] in to_ptr()
272 #[allow(dead_code)]
289 #[allow(clippy::unnecessary_cast)] in from_err_ptr()
319 #[allow(dead_code)]
/linux-6.12.1/fs/smb/server/
Dsmbacl.c306 pace->e_perm = state->owner.allow; in posix_state_to_acl()
311 pace->e_perm = state->users->aces[i].perms.allow; in posix_state_to_acl()
316 pace->e_perm = state->group.allow; in posix_state_to_acl()
322 pace->e_perm = state->groups->aces[i].perms.allow; in posix_state_to_acl()
328 pace->e_perm = state->mask.allow; in posix_state_to_acl()
333 pace->e_perm = state->other.allow; in posix_state_to_acl()
502 acl_state.owner.allow = ((acl_mode & 0700) >> 6) | 0004; in parse_dacl()
505 acl_state.users->aces[acl_state.users->n++].perms.allow = in parse_dacl()
507 default_acl_state.owner.allow = ((acl_mode & 0700) >> 6) | 0004; in parse_dacl()
510 default_acl_state.users->aces[default_acl_state.users->n++].perms.allow = in parse_dacl()
[all …]
/linux-6.12.1/lib/
DKconfig.kgdb88 exception handler which will allow kgdb to step through a
108 0x0002 - allow arbitrary reads from memory and symbol lookup
109 0x0004 - allow arbitrary writes to memory
110 0x0008 - allow current register state to be inspected
111 0x0010 - allow current register state to be modified
112 0x0020 - allow passive inspection (backtrace, process list, lsmod)
113 0x0040 - allow flow control management (breakpoint, single step)
115 0x0100 - allow machine to be rebooted

12345678910>>...43