/linux/security/ipe/ |
H A D | policy_tests.c | 20 "DEFAULT action=ALLOW", 26 "DEFAULT action=ALLOW", 32 "DEFAULT action=ALLOW\n" 39 "DEFAULT action=ALLOW\n" 46 "DEFAULT\taction=ALLOW\n" 48 "op=EXECUTE boot_verified=TRUE action=ALLOW\n" 51 "op=KMODULE boot_verified=TRUE action=ALLOW\n", 57 "DEFAULT\taction=ALLOW\n", 63 "DEFAULT action=ALLOW", 69 "DEFAULT action=ALLOW", [all …]
|
/linux/drivers/nfc/st-nci/ |
H A D | st-nci.h | 65 * @FACTORY_MODE: Allow to set the driver into a mode where no secure element 67 * @HCI_CLEAR_ALL_PIPES: Allow to execute a HCI clear all pipes command. 69 * @HCI_DM_PUT_DATA: Allow to configure specific CLF registry as for example 71 * @HCI_DM_UPDATE_AID: Allow to configure an AID routing into the CLF routing 73 * @HCI_DM_GET_INFO: Allow to retrieve CLF information. 74 * @HCI_DM_GET_DATA: Allow to retrieve CLF configurable data such as low 76 * @HCI_DM_DIRECT_LOAD: Allow to load a firmware into the CLF. A complete 78 * @HCI_DM_RESET: Allow to run a CLF reset in order to "commit" CLF 80 * @HCI_GET_PARAM: Allow to retrieve an HCI CLF parameter (for example the 82 * @HCI_DM_FIELD_GENERATOR: Allow to generate different kind of RF [all …]
|
/linux/tools/testing/selftests/tc-testing/tc-tests/actions/ |
H A D | ife.json | 20 "cmdUnderTest": "$TC actions add action ife encode allow mark pass index 2", 23 …"matchPattern": "action order [0-9]*: ife encode action pass.*type 0[xX]ED3E.*allow mark.*index 2", 74 "cmdUnderTest": "$TC actions add action ife encode allow mark continue index 2", 77 …"matchPattern": "action order [0-9]*: ife encode action continue.*type 0[xX]ED3E.*allow mark.*inde… 234 "cmdUnderTest": "$TC actions add action ife encode allow prio pass index 9", 237 …"matchPattern": "action order [0-9]*: ife encode action pass.*type 0[xX]ED3E.*allow prio.*index 9", 315 "cmdUnderTest": "$TC actions add action ife encode allow prio drop index 9", 318 …"matchPattern": "action order [0-9]*: ife encode action drop.*type 0[xX]ED3E.*allow prio.*index 9", 448 "cmdUnderTest": "$TC actions add action ife encode allow tcindex pass index 1", 451 …"matchPattern": "action order [0-9]*: ife encode action pass.*type 0[xX]ED3E.*allow tcindex.*index… [all …]
|
/linux/drivers/nfc/st21nfca/ |
H A D | st21nfca.h | 74 * @FACTORY_MODE: Allow to set the driver into a mode where no secure element 76 * @HCI_CLEAR_ALL_PIPES: Allow to execute a HCI clear all pipes command. 78 * @HCI_DM_PUT_DATA: Allow to configure specific CLF registry as for example 80 * @HCI_DM_UPDATE_AID: Allow to configure an AID routing into the CLF routing 82 * @HCI_DM_GET_INFO: Allow to retrieve CLF information. 83 * @HCI_DM_GET_DATA: Allow to retrieve CLF configurable data such as low 85 * @HCI_DM_LOAD: Allow to load a firmware into the CLF. A complete 87 * @HCI_DM_RESET: Allow to run a CLF reset in order to "commit" CLF 89 * @HCI_GET_PARAM: Allow to retrieve an HCI CLF parameter (for example the 91 * @HCI_DM_FIELD_GENERATOR: Allow to generate different kind of RF [all …]
|
/linux/tools/verification/rv/ |
H A D | Makefile.rv | 3 define allow-override 9 # Allow setting CC and AR, or setting CROSS_COMPILE as a prefix. 10 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 11 $(call allow-override,AR,$(CROSS_COMPILE)ar) 12 $(call allow-override,STRIP,$(CROSS_COMPILE)strip) 13 $(call allow-override,PKG_CONFIG,pkg-config) 14 $(call allow-override,LD_SO_CONF_PATH,/etc/ld.so.conf.d/) 15 $(call allow-override,LDCONFIG,ldconfig)
|
/linux/tools/testing/selftests/landlock/ |
H A D | scoped_multiple_domain_variants.h | 27 * | ####### | P3 -> P2 : allow 46 * # ####### # P3 -> P2 : allow 65 * | .-----. | P3 -> P2 : allow 66 * | P1----| P2 | | P3 -> P1 : allow 83 * .----. ###### P3 -> P2 : allow 84 * | P1 |----# P2 # P3 -> P1 : allow 100 * ###### .-----. P3 -> P2 : allow 101 * # P1 #----| P2 | P3 -> P1 : allow 117 * ###### ###### P3 -> P2 : allow 118 * # P1 #----# P2 # P3 -> P1 : allow
|
H A D | scoped_base_variants.h | 23 * P1-. P1 -> P2 : allow 24 * \ P2 -> P1 : allow 38 * P1--. P1 -> P2 : allow 56 * '------' \ P2 -> P1 : allow 88 * | P1----. | P1 -> P2 : allow 89 * | \ | P2 -> P1 : allow 105 * | P1----. | P1 -> P2 : allow 124 * || P1 ----. | P2 -> P1 : allow
|
/linux/Documentation/admin-guide/cgroup-v1/ |
H A D | devices.rst | 24 An entry is added using devices.allow, and removed using 27 echo 'c 1:3 mr' > /sys/fs/cgroup/1/devices.allow 36 echo a > /sys/fs/cgroup/1/devices.allow 74 A allow "b 8:* rwm", "c 116:1 rw" 103 # echo "c *:3 rwm" >A/devices.allow 113 # echo "c 2:3 rwm" >B/devices.allow 114 # echo "c 50:3 r" >B/devices.allow 118 # echo "c *:3 rwm" >B/devices.allow 120 Allowing or denying all by writing 'a' to devices.allow or devices.deny will 126 device cgroups is implemented internally using a behavior (ALLOW, DENY) and a
|
/linux/lib/ |
H A D | Kconfig.kgdb | 83 bool "KGDB: Allow debugging with traps in notifiers" 88 exception handler which will allow kgdb to step through a 108 0x0002 - allow arbitrary reads from memory and symbol lookup 109 0x0004 - allow arbitrary writes to memory 110 0x0008 - allow current register state to be inspected 111 0x0010 - allow current register state to be modified 112 0x0020 - allow passive inspection (backtrace, process list, lsmod) 113 0x0040 - allow flow control management (breakpoint, single step) 115 0x0100 - allow machine to be rebooted
|
/linux/tools/scripts/ |
H A D | Makefile.include | 48 define allow-override 61 $(call allow-override,CC,$(LLVM_PREFIX)clang$(LLVM_SUFFIX)) 62 $(call allow-override,AR,$(LLVM_PREFIX)llvm-ar$(LLVM_SUFFIX)) 63 $(call allow-override,LD,$(LLVM_PREFIX)ld.lld$(LLVM_SUFFIX)) 64 $(call allow-override,CXX,$(LLVM_PREFIX)clang++$(LLVM_SUFFIX)) 65 $(call allow-override,STRIP,$(LLVM_PREFIX)llvm-strip$(LLVM_SUFFIX)) 67 # Allow setting various cross-compile vars or setting CROSS_COMPILE as a prefix. 68 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 69 $(call allow-override,AR,$(CROSS_COMPILE)ar) 70 $(call allow-override,LD,$(CROSS_COMPILE)ld) [all …]
|
/linux/tools/tracing/rtla/ |
H A D | Makefile.rtla | 3 define allow-override 9 # Allow setting CC and AR, or setting CROSS_COMPILE as a prefix. 10 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 11 $(call allow-override,AR,$(CROSS_COMPILE)ar) 12 $(call allow-override,STRIP,$(CROSS_COMPILE)strip) 13 $(call allow-override,PKG_CONFIG,pkg-config) 14 $(call allow-override,LD_SO_CONF_PATH,/etc/ld.so.conf.d/) 15 $(call allow-override,LDCONFIG,ldconfig)
|
/linux/drivers/net/wireless/ath/ |
H A D | hw.c | 97 * allow = (IFRAME-01 & bssid_mask) == (bssid_mask & MAC) ? 1 : 0; 98 * --> allow = (0110 & 0010) == (0010 & 0001) ? 1 : 0; 99 * --> allow = (0010) == 0000 ? 1 : 0; 100 * --> allow = 0 104 * IFRAME-02: 0001 (we should allow) 106 * allow = (IFRAME-02 & bssid_mask) == (bssid_mask & MAC) ? 1 : 0; 107 * --> allow = (0001 & 0010) == (0010 & 0001) ? 1 :0; 108 * --> allow = (0000) == (0000) 109 * --> allow = 1
|
/linux/samples/seccomp/ |
H A D | bpf-fancy.c | 38 SYSCALL(__NR_exit, ALLOW), in main() 39 SYSCALL(__NR_exit_group, ALLOW), in main() 51 ALLOW, in main() 68 JLT(sizeof(msg1), ALLOW), in main() 73 JLT(sizeof(msg2), ALLOW), in main() 78 JLT(sizeof(buf), ALLOW), in main()
|
/linux/arch/arm64/boot/dts/qcom/ |
H A D | sdm660-xiaomi-lavender.dts | 146 regulator-allow-set-load; 154 regulator-allow-set-load; 161 regulator-allow-set-load; 172 regulator-allow-set-load; 186 regulator-allow-set-load; 255 regulator-allow-set-load; 279 regulator-allow-set-load; 294 regulator-allow-set-load; 301 regulator-allow-set-load; 308 regulator-allow-set-load; [all …]
|
H A D | sdm630-sony-xperia-nile.dtsi | 324 regulator-allow-set-load; 339 regulator-allow-set-load; 350 regulator-allow-set-load; 362 regulator-allow-set-load; 377 regulator-allow-set-load; 463 regulator-allow-set-load; 490 regulator-allow-set-load; 508 regulator-allow-set-load; 516 regulator-allow-set-load; 524 regulator-allow-set-load; [all …]
|
H A D | sm6125-xiaomi-laurel-sprout.dts | 250 regulator-allow-set-load; 256 regulator-allow-set-load; 282 regulator-allow-set-load; 288 regulator-allow-set-load; 324 regulator-allow-set-load; 345 regulator-allow-set-load; 356 regulator-allow-set-load;
|
/linux/security/apparmor/ |
H A D | policy_compat.c | 103 perms->allow |= AA_MAY_GETATTR; in compute_fperms_allow() 107 perms->allow |= AA_MAY_CHANGE_PROFILE; in compute_fperms_allow() 109 perms->allow |= AA_MAY_ONEXEC; in compute_fperms_allow() 117 perms.allow = map_old_perms(dfa_user_allow(dfa, state)); in compute_fperms_user() 132 perms.allow = map_old_perms(dfa_other_allow(dfa, state)); in compute_fperms_other() 192 perms[state].allow = dfa_user_allow(xmatch, state); in compute_xmatch_perms() 216 perms.allow = dfa_user_allow(dfa, state); in compute_perms_entry() 231 perms.allow |= map_other(dfa_other_allow(dfa, state)); in compute_perms_entry() 233 perms.allow |= AA_MAY_LOCK; in compute_perms_entry() 235 perms.allow |= map_xbits(dfa_user_xbits(dfa, state)); in compute_perms_entry()
|
H A D | file.c | 127 ad.request = ad.request & ~perms->allow; in aa_audit_file() 143 ad.denied = ad.request & ~perms->allow; in aa_audit_file() 228 if (request & ~perms->allow) in __aa_path_perm() 347 if (!(lperms.allow & AA_MAY_LINK)) in profile_path_link() 361 if (!(perms.allow & AA_MAY_LINK)) { in profile_path_link() 368 if (!(perms.allow & AA_LINK_SUBSET)) in profile_path_link() 378 request = lperms.allow & ~AA_MAY_LINK; in profile_path_link() 379 lperms.allow &= perms.allow | AA_MAY_LINK; in profile_path_link() 381 request |= AA_AUDIT_FILE_MASK & (lperms.allow & ~perms.allow); in profile_path_link() 382 if (request & ~lperms.allow) { in profile_path_link() [all …]
|
/linux/tools/testing/selftests/bpf/ |
H A D | test_sysctl.c | 59 .descr = "sysctl:read allow all", 92 /* else return ALLOW; */ 113 /* else return ALLOW; */ 169 /* return ALLOW; */ 196 /* return ALLOW; */ 254 /* return ALLOW; */ 296 /* return ALLOW; */ 351 /* return ALLOW; */ 400 /* return ALLOW; */ 442 /* return ALLOW; */ [all …]
|
/linux/drivers/misc/cb710/ |
H A D | debug.c | 13 static const u16 allow[CB710_REG_COUNT/16] = { variable 17 static const char *const prefix[ARRAY_SIZE(allow)] = { 26 return ((allow[block] >> offset) & mask) == mask; in allow_reg_read() 35 for (i = 0; i < ARRAY_SIZE(allow); ++i, reg += 16/(t/8)) { \ 63 for (i = 0; i < ARRAY_SIZE(allow); ++i, reg += 16/(t/8)) { \
|
/linux/drivers/dma-buf/ |
H A D | selftest.c | 54 bool allow = true; in apply_subtest_filter() local 58 allow = false; in apply_subtest_filter() 69 if (allow) in apply_subtest_filter() 77 if (allow) in apply_subtest_filter() 82 result = allow; in apply_subtest_filter()
|
/linux/Documentation/netlink/specs/ |
H A D | ovs_datapath.yaml | 27 doc: Allow last Netlink attribute to be unaligned 30 doc: Allow datapath to associate multiple Netlink PIDs to each vport 33 doc: Allow tc offload recirc sharing 36 doc: Allow per-cpu dispatch of upcalls
|
/linux/include/linux/soc/apple/ |
H A D | sart.h | 7 * Regions of physical memory must be added to the SART's allow 31 * Adds the region [paddr, paddr+size] to the DMA allow list. 41 * Removes the region [paddr, paddr+size] from the DMA allow list.
|
/linux/Documentation/devicetree/bindings/soc/aspeed/ |
H A D | uart-routing.yaml | 16 The Aspeed UART routing control allow to dynamically route the inputs for 21 allow access to the Host's serial console. 23 This driver is for the BMC side. The sysfs files allow the BMC userspace
|
/linux/arch/x86/include/asm/ |
H A D | sgx.h | 110 * %SGX_ATTR_DEBUG: Allow ENCLS(EDBGRD) and ENCLS(EDBGWR). 112 * %SGX_ATTR_PROVISIONKEY: Allow to use provisioning keys for remote 114 * %SGX_ATTR_KSS: Allow to use key separation and sharing (KSS). 115 * %SGX_ATTR_EINITTOKENKEY: Allow to use token signing key that is used to 118 * %SGX_ATTR_ASYNC_EXIT_NOTIFY: Allow enclaves to be notified after an 278 * %SGX_SECINFO_R: allow read 279 * %SGX_SECINFO_W: allow write 280 * %SGX_SECINFO_X: allow execution
|