Home
last modified time | relevance | path

Searched full:subject (Results 1 – 25 of 4051) sorted by relevance

12345678910>>...163

/linux/scripts/
H A Dgit-resolve.sh6 echo "Usage: $(basename "$0") [--selftest] [--force] <commit-id> [commit-subject]"
11 echo " --force Try to find commit by subject if ID lookup fails"
13 echo " commit-subject Optional commit subject to help resolve between multiple matches"
17 # Convert subject with ellipsis to grep pattern
19 local subject="$1"
22 escaped_subject=$(printf '%s\n' "$subject" | sed 's/[[\.*^$()+?{}|]/\\&/g')
37 # Split input into commit ID and subject
40 local subject=""
42 # Extract subject if present (everything after the first space)
44 subject="${input#* }"
[all …]
/linux/security/landlock/
H A Dtask.c270 const struct landlock_cred_security *const subject = in hook_unix_stream_connect() local
275 if (!subject) in hook_unix_stream_connect()
281 if (!sock_is_scoped(other, subject->domain)) in hook_unix_stream_connect()
284 landlock_log_denial(subject, &(struct landlock_request) { in hook_unix_stream_connect()
301 const struct landlock_cred_security *const subject = in hook_unix_may_send() local
305 if (!subject) in hook_unix_may_send()
318 if (!sock_is_scoped(other->sk, subject->domain)) in hook_unix_may_send()
321 landlock_log_denial(subject, &(struct landlock_request) { in hook_unix_may_send()
344 const struct landlock_cred_security *subject; in hook_task_kill() local
362 subject = landlock_get_applicable_subject(cred, signal_scope, in hook_task_kill()
[all …]
H A Dfs.c952 const struct landlock_cred_security *const subject = in current_check_access_path() local
957 if (!subject) in current_check_access_path()
960 access_request = landlock_init_layer_masks(subject->domain, in current_check_access_path()
963 if (is_access_to_paths_allowed(subject->domain, path, access_request, in current_check_access_path()
968 landlock_log_denial(subject, &request); in current_check_access_path()
1133 const struct landlock_cred_security *const subject = in current_check_refer_path() local
1143 if (!subject) in current_check_refer_path()
1170 subject->domain, in current_check_refer_path()
1173 if (is_access_to_paths_allowed(subject->domain, new_dir, in current_check_refer_path()
1179 landlock_log_denial(subject, &request1); in current_check_refer_path()
[all …]
H A Daudit.c356 * @subject: The Landlock subject's credential denying an action.
359 void landlock_log_denial(const struct landlock_cred_security *const subject, in landlock_log_denial() argument
367 if (WARN_ON_ONCE(!subject || !subject->domain || in landlock_log_denial()
368 !subject->domain->hierarchy || !request)) in landlock_log_denial()
378 youngest_layer = get_denied_layer(subject->domain, in landlock_log_denial()
387 get_hierarchy(subject->domain, youngest_layer); in landlock_log_denial()
391 get_hierarchy(subject->domain, youngest_layer); in landlock_log_denial()
409 if (subject->domain_exec & BIT(youngest_layer)) { in landlock_log_denial()
H A Dnet.c58 const struct landlock_cred_security *const subject = in current_check_access_socket() local
62 if (!subject) in current_check_access_socket()
190 rule = landlock_find_rule(subject->domain, id); in current_check_access_socket()
191 access_request = landlock_init_layer_masks(subject->domain, in current_check_access_socket()
201 landlock_log_denial(subject, in current_check_access_socket()
/linux/security/smack/
H A Dsmack_access.c58 * @subject_label: a pointer to the subject's Smack label
62 * This function looks up the subject/object pair in the
105 * smk_access - determine if a subject has a specific access to an object
106 * @subject: a pointer to the subject's Smack label entry
111 * This function looks up the subject/object pair in the
117 int smk_access(struct smack_known *subject, struct smack_known *object, in smk_access() argument
127 * A star subject can't access any object. in smk_access()
129 if (subject == &smack_known_star) { in smk_access()
134 * An internet object can be accessed by any subject. in smk_access()
136 * An internet subject can access any object. in smk_access()
[all …]
/linux/Documentation/admin-guide/LSM/
H A DSmack.rst134 This interface reports whether a subject with the specified
142 This interface reports whether a subject with the specified
159 where the first string is the subject label, the second the
162 "rwxat-". If a rule for a given subject and object exists it will be
223 where the first string is the subject label, the second the
238 where the first string is the subject label, the second the
293 For the ``PTRACE_READ`` a subject needs to have a read access on
298 only allowed when subject's and object's labels are equal.
305 revoke-subject
307 rules with that subject label.
[all …]
/linux/Documentation/security/
H A Dcredentials.rst52 A subject is an object that is acting upon another object.
65 A subject has an additional interpretation of its credentials. A subset
68 subject acts.
77 Linux has a number of actions available that a subject may perform upon an
78 object. The set of actions available depends on the nature of the subject
86 When a subject acts upon an object, a security calculation is made. This
88 action, and searching one or more sets of rules to see whether the subject
101 is an abbreviated ACL with three fixed classes of subject ('user',
118 subject label, the object label and the action and look for a rule
/linux/crypto/asymmetric_keys/
H A Dx509_public_key.c175 pr_devel("Cert Subject: %s\n", cert->subject); in x509_key_preparse()
194 sulen = strlen(cert->subject); in x509_key_preparse()
206 p = memcpy(desc, cert->subject, sulen); in x509_key_preparse()
/linux/include/uapi/drm/
H A Dvgem_drm.h10 * permit persons to whom the Software is furnished to do so, subject to
37 * subject to backwards-compatibility constraints.
H A Dqxl_drm.h10 * Software is furnished to do so, subject to the following conditions:
34 * subject to backwards-compatibility constraints.
/linux/LICENSES/dual/
H A DCC-BY-4.033 original works of authorship and other material subject to copyright
47 material not subject to the license. This includes other CC-
85 a. Adapted Material means material subject to Copyright and Similar
121 g. Licensed Rights means the rights granted to You subject to the
151 1. Subject to the terms and conditions of this Public License,
226 Your exercise of the Licensed Rights is expressly made subject to the
H A Dcopyleft-next-0.3.122 Subject to the terms of this License, I grant You:
103 longer subject to the conditions in sections 3 through 5.
114 a license to My Work from Me, subject to the terms of this License.
130 rights of those who have received copies or rights from You subject to
H A DMPL-1.199 non-exclusive license, subject to third party intellectual property
123 Subject to third party intellectual property claims, each Contributor
412 This License represents the complete agreement concerning subject
421 subject to the jurisdiction of the Federal Courts of the Northern
450 ``The contents of this file are subject to the Mozilla Public License
H A DCDDL-1.088 Conditioned upon Your compliance with Section 3.1 below and subject
119 Conditioned upon Your compliance with Section 3.1 below and subject
340 This License represents the complete agreement concerning subject
347 provisions. Any litigation relating to this License shall be subject to
/linux/Documentation/bpf/
H A Dbpf_devel_QA.rst142 following subject lines (``yyyy-mm-dd`` is the date of the pull
153 so please read up on it. The subject line must indicate whether the
157 For fixes eventually landing in bpf -> net tree, the subject must
160 git format-patch --subject-prefix='PATCH bpf' start..finish
163 bpf-next -> net-next, the subject must look like::
165 git format-patch --subject-prefix='PATCH bpf-next' start..finish
169 problem either if the subject line says net or net-next as target.
179 version number (``v2``, ``v3``, ...) into the subject prefix::
181 git format-patch --subject-prefix='PATCH bpf-next v2' start..finish
264 be subject to change.
[all …]
/linux/include/xen/
H A Dxenbus_dev.h10 * software packages, subject to the following license:
16 * and to permit persons to whom the Software is furnished to do so, subject to
H A Dacpi.h12 * software packages, subject to the following license:
18 * and to permit persons to whom the Software is furnished to do so, subject to
/linux/arch/arm/xen/
H A Dgrant-table.c11 * software packages, subject to the following license:
17 * and to permit persons to whom the Software is furnished to do so, subject to
H A Dhypercall.S12 * software packages, subject to the following license:
18 * and to permit persons to whom the Software is furnished to do so, subject to
/linux/include/keys/
H A Dasymmetric-type.h36 * (2) Issuer & Subject Unique IDs. Optional. These were the original way to
39 * (3) Auth & Subject Key Identifiers. Optional. SKIDs are only provided on
/linux/include/xen/arm/
H A Dhypercall.h12 * software packages, subject to the following license:
18 * and to permit persons to whom the Software is furnished to do so, subject to
/linux/include/uapi/xen/
H A Devtchn.h13 * software packages, subject to the following license:
19 * and to permit persons to whom the Software is furnished to do so, subject to
/linux/drivers/xen/
H A Dacpi.c12 * software packages, subject to the following license:
18 * and to permit persons to whom the Software is furnished to do so, subject to
/linux/Documentation/translations/zh_TW/process/
H A Dsubmitting-patches.rst459 Subject: [PATCH 001/123] 子系統:一句話概述
495 概述的前綴可以用方括號括起來:“Subject: [PATCH <tag>...] <概述>”。標記
504 Subject: [patch 2/5] ext2: improve scalability of bitmap searching
505 Subject: [PATCHv2 001/207] x86: fix eflags tracking

12345678910>>...163