/linux/security/ipe/ |
H A D | policy_tests.c | 20 "DEFAULT action=ALLOW", 26 "DEFAULT action=ALLOW", 32 "DEFAULT action=ALLOW\n" 39 "DEFAULT action=ALLOW\n" 46 "DEFAULT\taction=ALLOW\n" 48 "op=EXECUTE boot_verified=TRUE action=ALLOW\n" 51 "op=KMODULE boot_verified=TRUE action=ALLOW\n", 57 "DEFAULT\taction=ALLOW\n", 63 "DEFAULT action=ALLOW", 69 "DEFAULT action=ALLOW", [all …]
|
/linux/drivers/nfc/st-nci/ |
H A D | st-nci.h | 65 * @FACTORY_MODE: Allow to set the driver into a mode where no secure element 67 * @HCI_CLEAR_ALL_PIPES: Allow to execute a HCI clear all pipes command. 69 * @HCI_DM_PUT_DATA: Allow to configure specific CLF registry as for example 71 * @HCI_DM_UPDATE_AID: Allow to configure an AID routing into the CLF routing 73 * @HCI_DM_GET_INFO: Allow to retrieve CLF information. 74 * @HCI_DM_GET_DATA: Allow to retrieve CLF configurable data such as low 76 * @HCI_DM_DIRECT_LOAD: Allow to load a firmware into the CLF. A complete 78 * @HCI_DM_RESET: Allow to run a CLF reset in order to "commit" CLF 80 * @HCI_GET_PARAM: Allow to retrieve an HCI CLF parameter (for example the 82 * @HCI_DM_FIELD_GENERATOR: Allow to generate different kind of RF [all …]
|
/linux/tools/testing/selftests/tc-testing/tc-tests/actions/ |
H A D | ife.json | 20 "cmdUnderTest": "$TC actions add action ife encode allow mark pass index 2", 23 …"matchPattern": "action order [0-9]*: ife encode action pass.*type 0[xX]ED3E.*allow mark.*index 2", 74 "cmdUnderTest": "$TC actions add action ife encode allow mark continue index 2", 77 …"matchPattern": "action order [0-9]*: ife encode action continue.*type 0[xX]ED3E.*allow mark.*inde… 234 "cmdUnderTest": "$TC actions add action ife encode allow prio pass index 9", 237 …"matchPattern": "action order [0-9]*: ife encode action pass.*type 0[xX]ED3E.*allow prio.*index 9", 315 "cmdUnderTest": "$TC actions add action ife encode allow prio drop index 9", 318 …"matchPattern": "action order [0-9]*: ife encode action drop.*type 0[xX]ED3E.*allow prio.*index 9", 448 "cmdUnderTest": "$TC actions add action ife encode allow tcindex pass index 1", 451 …"matchPattern": "action order [0-9]*: ife encode action pass.*type 0[xX]ED3E.*allow tcindex.*index… [all …]
|
/linux/arch/arm64/boot/dts/qcom/ |
H A D | sm8750-qrd.dts | 133 regulator-allow-set-load; 143 regulator-allow-set-load; 153 regulator-allow-set-load; 163 regulator-allow-set-load; 173 regulator-allow-set-load; 183 regulator-allow-set-load; 193 regulator-allow-set-load; 203 regulator-allow-set-load; 213 regulator-allow-set-load; 223 regulator-allow-set-load; [all …]
|
H A D | sm8750-mtp.dts | 134 regulator-allow-set-load; 144 regulator-allow-set-load; 154 regulator-allow-set-load; 164 regulator-allow-set-load; 174 regulator-allow-set-load; 184 regulator-allow-set-load; 195 regulator-allow-set-load; 205 regulator-allow-set-load; 215 regulator-allow-set-load; 225 regulator-allow-set-load; [all …]
|
H A D | qcs8300-ride.dts | 61 regulator-allow-set-load; 71 regulator-allow-set-load; 81 regulator-allow-set-load; 91 regulator-allow-set-load; 101 regulator-allow-set-load; 111 regulator-allow-set-load; 121 regulator-allow-set-load; 143 regulator-allow-set-load; 153 regulator-allow-set-load; 163 regulator-allow-set-load; [all …]
|
H A D | sm8550-hdk.dts | 381 regulator-allow-set-load; 391 regulator-allow-set-load; 401 regulator-allow-set-load; 411 regulator-allow-set-load; 421 regulator-allow-set-load; 431 regulator-allow-set-load; 441 regulator-allow-set-load; 451 regulator-allow-set-load; 461 regulator-allow-set-load; 471 regulator-allow-set-load; [all …]
|
H A D | sdm660-xiaomi-lavender.dts | 147 regulator-allow-set-load; 155 regulator-allow-set-load; 162 regulator-allow-set-load; 173 regulator-allow-set-load; 187 regulator-allow-set-load; 256 regulator-allow-set-load; 280 regulator-allow-set-load; 295 regulator-allow-set-load; 302 regulator-allow-set-load; 309 regulator-allow-set-load; [all …]
|
H A D | sa8775p-ride.dtsi | 164 regulator-allow-set-load; 174 regulator-allow-set-load; 184 regulator-allow-set-load; 194 regulator-allow-set-load; 204 regulator-allow-set-load; 214 regulator-allow-set-load; 229 regulator-allow-set-load; 239 regulator-allow-set-load; 249 regulator-allow-set-load; 260 * FIXME: This should have regulator-allow-set-load but [all …]
|
H A D | sm6125-xiaomi-ginkgo.dts | 140 regulator-allow-set-load; 146 regulator-allow-set-load; 172 regulator-allow-set-load; 178 regulator-allow-set-load; 214 regulator-allow-set-load; 235 regulator-allow-set-load; 246 regulator-allow-set-load;
|
/linux/rust/bindings/ |
H A D | lib.rs | 13 #![cfg_attr(test, allow(deref_nullptr))] 14 #![cfg_attr(test, allow(unaligned_references))] 15 #![cfg_attr(test, allow(unsafe_op_in_unsafe_fn))] 16 #![allow( 27 #[allow(dead_code)] 28 #[allow(clippy::undocumented_unsafe_blocks)] 29 #[cfg_attr(CONFIG_RUSTC_HAS_UNNECESSARY_TRANSMUTES, allow(unnecessary_transmutes))] 48 #[allow(dead_code)]
|
/linux/drivers/nfc/st21nfca/ |
H A D | st21nfca.h | 74 * @FACTORY_MODE: Allow to set the driver into a mode where no secure element 76 * @HCI_CLEAR_ALL_PIPES: Allow to execute a HCI clear all pipes command. 78 * @HCI_DM_PUT_DATA: Allow to configure specific CLF registry as for example 80 * @HCI_DM_UPDATE_AID: Allow to configure an AID routing into the CLF routing 82 * @HCI_DM_GET_INFO: Allow to retrieve CLF information. 83 * @HCI_DM_GET_DATA: Allow to retrieve CLF configurable data such as low 85 * @HCI_DM_LOAD: Allow to load a firmware into the CLF. A complete 87 * @HCI_DM_RESET: Allow to run a CLF reset in order to "commit" CLF 89 * @HCI_GET_PARAM: Allow to retrieve an HCI CLF parameter (for example the 91 * @HCI_DM_FIELD_GENERATOR: Allow to generate different kind of RF [all …]
|
/linux/tools/verification/rv/ |
H A D | Makefile.rv | 3 define allow-override 9 # Allow setting CC and AR, or setting CROSS_COMPILE as a prefix. 10 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 11 $(call allow-override,AR,$(CROSS_COMPILE)ar) 12 $(call allow-override,STRIP,$(CROSS_COMPILE)strip) 13 $(call allow-override,PKG_CONFIG,pkg-config) 14 $(call allow-override,LD_SO_CONF_PATH,/etc/ld.so.conf.d/) 15 $(call allow-override,LDCONFIG,ldconfig)
|
/linux/tools/testing/selftests/landlock/ |
H A D | scoped_multiple_domain_variants.h | 27 * | ####### | P3 -> P2 : allow 46 * # ####### # P3 -> P2 : allow 65 * | .-----. | P3 -> P2 : allow 66 * | P1----| P2 | | P3 -> P1 : allow 83 * .----. ###### P3 -> P2 : allow 84 * | P1 |----# P2 # P3 -> P1 : allow 100 * ###### .-----. P3 -> P2 : allow 101 * # P1 #----| P2 | P3 -> P1 : allow 117 * ###### ###### P3 -> P2 : allow 118 * # P1 #----# P2 # P3 -> P1 : allow
|
H A D | scoped_base_variants.h | 23 * P1-. P1 -> P2 : allow 24 * \ P2 -> P1 : allow 38 * P1--. P1 -> P2 : allow 56 * '------' \ P2 -> P1 : allow 88 * | P1----. | P1 -> P2 : allow 89 * | \ | P2 -> P1 : allow 105 * | P1----. | P1 -> P2 : allow 124 * || P1 ----. | P2 -> P1 : allow
|
/linux/Documentation/admin-guide/cgroup-v1/ |
H A D | devices.rst | 24 An entry is added using devices.allow, and removed using 27 echo 'c 1:3 mr' > /sys/fs/cgroup/1/devices.allow 36 echo a > /sys/fs/cgroup/1/devices.allow 74 A allow "b 8:* rwm", "c 116:1 rw" 103 # echo "c *:3 rwm" >A/devices.allow 113 # echo "c 2:3 rwm" >B/devices.allow 114 # echo "c 50:3 r" >B/devices.allow 118 # echo "c *:3 rwm" >B/devices.allow 120 Allowing or denying all by writing 'a' to devices.allow or devices.deny will 126 device cgroups is implemented internally using a behavior (ALLOW, DENY) and a
|
/linux/lib/ |
H A D | Kconfig.kgdb | 83 bool "KGDB: Allow debugging with traps in notifiers" 88 exception handler which will allow kgdb to step through a 108 0x0002 - allow arbitrary reads from memory and symbol lookup 109 0x0004 - allow arbitrary writes to memory 110 0x0008 - allow current register state to be inspected 111 0x0010 - allow current register state to be modified 112 0x0020 - allow passive inspection (backtrace, process list, lsmod) 113 0x0040 - allow flow control management (breakpoint, single step) 115 0x0100 - allow machine to be rebooted
|
/linux/tools/scripts/ |
H A D | Makefile.include | 48 define allow-override 61 $(call allow-override,CC,$(LLVM_PREFIX)clang$(LLVM_SUFFIX)) 62 $(call allow-override,AR,$(LLVM_PREFIX)llvm-ar$(LLVM_SUFFIX)) 63 $(call allow-override,LD,$(LLVM_PREFIX)ld.lld$(LLVM_SUFFIX)) 64 $(call allow-override,CXX,$(LLVM_PREFIX)clang++$(LLVM_SUFFIX)) 65 $(call allow-override,STRIP,$(LLVM_PREFIX)llvm-strip$(LLVM_SUFFIX)) 67 # Allow setting various cross-compile vars or setting CROSS_COMPILE as a prefix. 68 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 69 $(call allow-override,AR,$(CROSS_COMPILE)ar) 70 $(call allow-override,LD,$(CROSS_COMPILE)ld) [all …]
|
/linux/tools/tracing/rtla/ |
H A D | Makefile.rtla | 3 define allow-override 9 # Allow setting CC and AR, or setting CROSS_COMPILE as a prefix. 10 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 11 $(call allow-override,AR,$(CROSS_COMPILE)ar) 12 $(call allow-override,STRIP,$(CROSS_COMPILE)strip) 13 $(call allow-override,PKG_CONFIG,pkg-config) 14 $(call allow-override,LD_SO_CONF_PATH,/etc/ld.so.conf.d/) 15 $(call allow-override,LDCONFIG,ldconfig)
|
/linux/rust/uapi/ |
H A D | lib.rs | 12 #![cfg_attr(test, allow(deref_nullptr))] 13 #![cfg_attr(test, allow(unaligned_references))] 14 #![cfg_attr(test, allow(unsafe_op_in_unsafe_fn))] 15 #![allow( 27 #![cfg_attr(CONFIG_RUSTC_HAS_UNNECESSARY_TRANSMUTES, allow(unnecessary_transmutes))]
|
/linux/drivers/net/wireless/ath/ |
H A D | hw.c | 97 * allow = (IFRAME-01 & bssid_mask) == (bssid_mask & MAC) ? 1 : 0; 98 * --> allow = (0110 & 0010) == (0010 & 0001) ? 1 : 0; 99 * --> allow = (0010) == 0000 ? 1 : 0; 100 * --> allow = 0 104 * IFRAME-02: 0001 (we should allow) 106 * allow = (IFRAME-02 & bssid_mask) == (bssid_mask & MAC) ? 1 : 0; 107 * --> allow = (0001 & 0010) == (0010 & 0001) ? 1 :0; 108 * --> allow = (0000) == (0000) 109 * --> allow = 1
|
/linux/samples/seccomp/ |
H A D | bpf-fancy.c | 38 SYSCALL(__NR_exit, ALLOW), in main() 39 SYSCALL(__NR_exit_group, ALLOW), in main() 51 ALLOW, in main() 68 JLT(sizeof(msg1), ALLOW), in main() 73 JLT(sizeof(msg2), ALLOW), in main() 78 JLT(sizeof(buf), ALLOW), in main()
|
/linux/security/apparmor/ |
H A D | policy_compat.c | 103 perms->allow |= AA_MAY_GETATTR; in compute_fperms_allow() 107 perms->allow |= AA_MAY_CHANGE_PROFILE; in compute_fperms_allow() 109 perms->allow |= AA_MAY_ONEXEC; in compute_fperms_allow() 117 perms.allow = map_old_perms(dfa_user_allow(dfa, state)); in compute_fperms_user() 132 perms.allow = map_old_perms(dfa_other_allow(dfa, state)); in compute_fperms_other() 192 perms[state].allow = dfa_user_allow(xmatch, state); in compute_xmatch_perms() 216 perms.allow = dfa_user_allow(dfa, state); in compute_perms_entry() 231 perms.allow |= map_other(dfa_other_allow(dfa, state)); in compute_perms_entry() 233 perms.allow |= AA_MAY_LOCK; in compute_perms_entry() 235 perms.allow |= map_xbits(dfa_user_xbits(dfa, state)); in compute_perms_entry()
|
H A D | file.c | 127 ad.request = ad.request & ~perms->allow; in aa_audit_file() 143 ad.denied = ad.request & ~perms->allow; in aa_audit_file() 228 if (request & ~perms->allow) in __aa_path_perm() 347 if (!(lperms.allow & AA_MAY_LINK)) in profile_path_link() 361 if (!(perms.allow & AA_MAY_LINK)) { in profile_path_link() 368 if (!(perms.allow & AA_LINK_SUBSET)) in profile_path_link() 378 request = lperms.allow & ~AA_MAY_LINK; in profile_path_link() 379 lperms.allow &= perms.allow | AA_MAY_LINK; in profile_path_link() 381 request |= AA_AUDIT_FILE_MASK & (lperms.allow & ~perms.allow); in profile_path_link() 382 if (request & ~lperms.allow) { in profile_path_link() [all …]
|
/linux/tools/testing/selftests/bpf/prog_tests/ |
H A D | test_sysctl.c | 45 .descr = "sysctl:read allow all", 78 /* else return ALLOW; */ 99 /* else return ALLOW; */ 155 /* return ALLOW; */ 182 /* return ALLOW; */ 240 /* return ALLOW; */ 282 /* return ALLOW; */ 337 /* return ALLOW; */ 386 /* return ALLOW; */ 428 /* return ALLOW; */ [all …]
|