Home
last modified time | relevance | path

Searched refs:allow (Results 1 – 25 of 817) sorted by relevance

12345678910>>...33

/linux/security/apparmor/include/
H A Dperms.h70 u32 allow; member
111 accum->allow &= addend->allow & ~addend->deny; in aa_perms_accum_raw()
112 accum->audit |= addend->audit & addend->allow; in aa_perms_accum_raw()
113 accum->quiet &= addend->quiet & ~addend->allow; in aa_perms_accum_raw()
114 accum->kill |= addend->kill & ~addend->allow; in aa_perms_accum_raw()
115 accum->complain |= addend->complain & ~addend->allow & ~addend->deny; in aa_perms_accum_raw()
116 accum->cond |= addend->cond & ~addend->allow & ~addend->deny; in aa_perms_accum_raw()
117 accum->hide &= addend->hide & ~addend->allow; in aa_perms_accum_raw()
118 accum->prompt |= addend->prompt & ~addend->allow & ~addend->deny; in aa_perms_accum_raw()
138 accum->allow &= addend->allow & ~accum->deny; in aa_perms_accum()
[all …]
/linux/tools/tracing/rtla/
H A DMakefile.rtla3 define allow-override
10 $(call allow-override,CC,$(CROSS_COMPILE)gcc)
11 $(call allow-override,AR,$(CROSS_COMPILE)ar)
12 $(call allow-override,STRIP,$(CROSS_COMPILE)strip)
13 $(call allow-override,PKG_CONFIG,pkg-config)
14 $(call allow-override,LD_SO_CONF_PATH,/etc/ld.so.conf.d/)
15 $(call allow-override,LDCONFIG,ldconfig)
/linux/tools/verification/rv/
H A DMakefile.rv3 define allow-override
10 $(call allow-override,CC,$(CROSS_COMPILE)gcc)
11 $(call allow-override,AR,$(CROSS_COMPILE)ar)
12 $(call allow-override,STRIP,$(CROSS_COMPILE)strip)
13 $(call allow-override,PKG_CONFIG,pkg-config)
14 $(call allow-override,LD_SO_CONF_PATH,/etc/ld.so.conf.d/)
15 $(call allow-override,LDCONFIG,ldconfig)
/linux/rust/pin-init/examples/
H A Dlinked_list.rs3 #![allow(clippy::undocumented_unsafe_blocks)]
16 #[allow(unused_attributes)]
18 #[allow(unused_imports)]
42 #[allow(dead_code)]
69 #[allow(dead_code)]
116 #[allow(dead_code)]
121 #[allow(dead_code)]
142 #[allow(dead_code)]
146 #[allow(dead_code)]
H A Dmutex.rs3 #![allow(clippy::undocumented_unsafe_blocks)]
6 #![allow(clippy::missing_safety_doc)]
23 #[allow(unused_attributes)]
49 #[allow(clippy::new_without_default)]
116 #[allow(dead_code)]
192 #[allow(dead_code)]
H A Dpthread_mutex.rs4 #![allow(clippy::undocumented_unsafe_blocks)]
45 #[allow(dead_code)]
47 #[allow(dead_code)]
65 #[allow(dead_code)]
108 #[allow(dead_code)]
/linux/tools/scripts/
H A DMakefile.include48 define allow-override
61 $(call allow-override,CC,$(LLVM_PREFIX)clang$(LLVM_SUFFIX))
62 $(call allow-override,AR,$(LLVM_PREFIX)llvm-ar$(LLVM_SUFFIX))
63 $(call allow-override,LD,$(LLVM_PREFIX)ld.lld$(LLVM_SUFFIX))
64 $(call allow-override,CXX,$(LLVM_PREFIX)clang++$(LLVM_SUFFIX))
65 $(call allow-override,STRIP,$(LLVM_PREFIX)llvm-strip$(LLVM_SUFFIX))
68 $(call allow-override,CC,$(CROSS_COMPILE)gcc)
69 $(call allow-override,AR,$(CROSS_COMPILE)ar)
70 $(call allow-override,LD,$(CROSS_COMPILE)ld)
71 $(call allow-override,CXX,$(CROSS_COMPILE)g++)
[all …]
/linux/security/apparmor/
H A Dpolicy_compat.c103 perms->allow |= AA_MAY_GETATTR; in compute_fperms_allow()
107 perms->allow |= AA_MAY_CHANGE_PROFILE; in compute_fperms_allow()
109 perms->allow |= AA_MAY_ONEXEC; in compute_fperms_allow()
117 perms.allow = map_old_perms(dfa_user_allow(dfa, state)); in compute_fperms_user()
132 perms.allow = map_old_perms(dfa_other_allow(dfa, state)); in compute_fperms_other()
192 perms[state].allow = dfa_user_allow(xmatch, state); in compute_xmatch_perms()
216 perms.allow = dfa_user_allow(dfa, state); in compute_perms_entry()
231 perms.allow |= map_other(dfa_other_allow(dfa, state)); in compute_perms_entry()
233 perms.allow |= AA_MAY_LOCK; in compute_perms_entry()
235 perms.allow |= map_xbits(dfa_user_xbits(dfa, state)); in compute_perms_entry()
[all …]
H A Dfile.c129 ad.request = ad.request & ~perms->allow; in aa_audit_file()
145 ad.denied = ad.request & ~perms->allow; in aa_audit_file()
239 if (request & ~perms->allow) in __aa_path_perm()
357 if (!(lperms.allow & AA_MAY_LINK)) in profile_path_link()
371 if (!(perms.allow & AA_MAY_LINK)) { in profile_path_link()
378 if (!(perms.allow & AA_LINK_SUBSET)) in profile_path_link()
388 request = lperms.allow & ~AA_MAY_LINK; in profile_path_link()
389 lperms.allow &= perms.allow | AA_MAY_LINK; in profile_path_link()
391 request |= AA_AUDIT_FILE_MASK & (lperms.allow & ~perms.allow); in profile_path_link()
392 if (request & ~lperms.allow) { in profile_path_link()
[all …]
/linux/drivers/gpu/nova-core/gsp/fw/
H A Dr570_144.rs10 #![cfg_attr(test, allow(deref_nullptr))]
11 #![cfg_attr(test, allow(unaligned_references))]
12 #![cfg_attr(test, allow(unsafe_op_in_unsafe_fn))]
13 #![allow(
/linux/drivers/misc/cb710/
H A Ddebug.c13 static const u16 allow[CB710_REG_COUNT/16] = { variable
17 static const char *const prefix[ARRAY_SIZE(allow)] = {
26 return ((allow[block] >> offset) & mask) == mask; in allow_reg_read()
35 for (i = 0; i < ARRAY_SIZE(allow); ++i, reg += 16/(t/8)) { \
63 for (i = 0; i < ARRAY_SIZE(allow); ++i, reg += 16/(t/8)) { \
/linux/drivers/dma-buf/
H A Dselftest.c54 bool allow = true; in apply_subtest_filter() local
58 allow = false; in apply_subtest_filter()
69 if (allow) in apply_subtest_filter()
77 if (allow) in apply_subtest_filter()
82 result = allow; in apply_subtest_filter()
/linux/rust/kernel/drm/
H A Dioctl.rs12 #[allow(non_snake_case)]
19 #[allow(non_snake_case)]
26 #[allow(non_snake_case)]
33 #[allow(non_snake_case)]
122 #[allow(non_snake_case)]
/linux/arch/arm64/boot/dts/qcom/
H A Dsdm660-xiaomi-lavender.dts147 regulator-allow-set-load;
155 regulator-allow-set-load;
162 regulator-allow-set-load;
173 regulator-allow-set-load;
187 regulator-allow-set-load;
256 regulator-allow-set-load;
280 regulator-allow-set-load;
295 regulator-allow-set-load;
302 regulator-allow-set-load;
309 regulator-allow-set-load;
[all …]
H A Dsm6125-xiaomi-laurel-sprout.dts250 regulator-allow-set-load;
256 regulator-allow-set-load;
282 regulator-allow-set-load;
288 regulator-allow-set-load;
324 regulator-allow-set-load;
345 regulator-allow-set-load;
356 regulator-allow-set-load;
H A Dsda660-inforce-ifc6560.dts298 regulator-allow-set-load;
311 regulator-allow-set-load;
320 regulator-allow-set-load;
328 regulator-allow-set-load;
346 regulator-allow-set-load;
376 regulator-allow-set-load;
384 regulator-allow-set-load;
396 regulator-allow-set-load;
412 regulator-allow-set-load;
H A Dsdm630-sony-xperia-nile.dtsi324 regulator-allow-set-load;
339 regulator-allow-set-load;
350 regulator-allow-set-load;
362 regulator-allow-set-load;
377 regulator-allow-set-load;
463 regulator-allow-set-load;
490 regulator-allow-set-load;
508 regulator-allow-set-load;
516 regulator-allow-set-load;
524 regulator-allow-set-load;
[all …]
/linux/Documentation/admin-guide/cgroup-v1/
H A Ddevices.rst24 An entry is added using devices.allow, and removed using
27 echo 'c 1:3 mr' > /sys/fs/cgroup/1/devices.allow
36 echo a > /sys/fs/cgroup/1/devices.allow
74 A allow "b 8:* rwm", "c 116:1 rw"
103 # echo "c *:3 rwm" >A/devices.allow
113 # echo "c 2:3 rwm" >B/devices.allow
114 # echo "c 50:3 r" >B/devices.allow
118 # echo "c *:3 rwm" >B/devices.allow
120 Allowing or denying all by writing 'a' to devices.allow or devices.deny will
/linux/arch/arm/mach-s3c/
H A Dpm.c63 #define any_allowed(mask, allow) (((mask) & (allow)) != (allow)) argument
/linux/rust/syn/
H A Dcustom_keyword.rs94 #[allow(non_camel_case_types)]
96 #[allow(dead_code)]
101 #[allow(dead_code, non_snake_case)]
206 #[allow(clippy::expl_impl_clone_on_copy)]
/linux/lib/
H A DKconfig.kgdb88 exception handler which will allow kgdb to step through a
108 0x0002 - allow arbitrary reads from memory and symbol lookup
109 0x0004 - allow arbitrary writes to memory
110 0x0008 - allow current register state to be inspected
111 0x0010 - allow current register state to be modified
112 0x0020 - allow passive inspection (backtrace, process list, lsmod)
113 0x0040 - allow flow control management (breakpoint, single step)
115 0x0100 - allow machine to be rebooted
/linux/rust/kernel/sync/atomic/
H A Dpredefine.rs60 #[allow(non_camel_case_types)]
64 #[allow(non_camel_case_types)]
69 #[allow(non_camel_case_types)] in rhs_into_delta()
73 #[allow(non_camel_case_types)]
/linux/fs/smb/server/
H A Dsmbacl.c311 pace->e_perm = state->owner.allow; in posix_state_to_acl()
316 pace->e_perm = state->users->aces[i].perms.allow; in posix_state_to_acl()
321 pace->e_perm = state->group.allow; in posix_state_to_acl()
327 pace->e_perm = state->groups->aces[i].perms.allow; in posix_state_to_acl()
333 pace->e_perm = state->mask.allow; in posix_state_to_acl()
338 pace->e_perm = state->other.allow; in posix_state_to_acl()
510 acl_state.owner.allow = ((acl_mode & 0700) >> 6) | 0004; in parse_dacl()
513 acl_state.users->aces[acl_state.users->n++].perms.allow = in parse_dacl()
515 default_acl_state.owner.allow = ((acl_mode & 0700) >> 6) | 0004; in parse_dacl()
518 default_acl_state.users->aces[default_acl_state.users->n++].perms.allow = in parse_dacl()
[all …]
/linux/rust/kernel/
H A Dslice.rs40 #[allow(clippy::incompatible_msrv)]
45 #[allow(clippy::incompatible_msrv)]
/linux/tools/testing/selftests/net/
H A Dxfrm_policy.sh38 …rc $lnet dst $rnet dir out tmpl src $me dst $remote proto esp mode tunnel priority 100 action allow
40 …rc $rnet dst $lnet dir fwd tmpl src $remote dst $me proto esp mode tunnel priority 100 action allow
145 ip -net $ns xfrm policy add dst $plain dir out priority 10 action allow
148 …y add dst $encryptip dir out tmpl src $me dst $remote proto esp mode tunnel priority 1 action allow
272 …::0014:0000:0001 dir in tmpl src :: dst :: proto esp mode tunnel priority 100 action allow || break
275 …000 dst ff01::01 dir in tmpl src :: dst :: proto esp mode tunnel priority 100 action allow || break
299 ip -net $ns xfrm policy add dst $j.0.0.0/24 dir out priority 10 action allow
313 ip -net $ns xfrm policy add dst $addr dir out priority 10 action allow

12345678910>>...33