| /linux/security/apparmor/include/ |
| H A D | perms.h | 70 u32 allow; member 111 accum->allow &= addend->allow & ~addend->deny; in aa_perms_accum_raw() 112 accum->audit |= addend->audit & addend->allow; in aa_perms_accum_raw() 113 accum->quiet &= addend->quiet & ~addend->allow; in aa_perms_accum_raw() 114 accum->kill |= addend->kill & ~addend->allow; in aa_perms_accum_raw() 115 accum->complain |= addend->complain & ~addend->allow & ~addend->deny; in aa_perms_accum_raw() 116 accum->cond |= addend->cond & ~addend->allow & ~addend->deny; in aa_perms_accum_raw() 117 accum->hide &= addend->hide & ~addend->allow; in aa_perms_accum_raw() 118 accum->prompt |= addend->prompt & ~addend->allow & ~addend->deny; in aa_perms_accum_raw() 138 accum->allow &= addend->allow & ~accum->deny; in aa_perms_accum() [all …]
|
| /linux/tools/tracing/rtla/ |
| H A D | Makefile.rtla | 3 define allow-override 10 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 11 $(call allow-override,AR,$(CROSS_COMPILE)ar) 12 $(call allow-override,STRIP,$(CROSS_COMPILE)strip) 13 $(call allow-override,PKG_CONFIG,pkg-config) 14 $(call allow-override,LD_SO_CONF_PATH,/etc/ld.so.conf.d/) 15 $(call allow-override,LDCONFIG,ldconfig)
|
| /linux/tools/verification/rv/ |
| H A D | Makefile.rv | 3 define allow-override 10 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 11 $(call allow-override,AR,$(CROSS_COMPILE)ar) 12 $(call allow-override,STRIP,$(CROSS_COMPILE)strip) 13 $(call allow-override,PKG_CONFIG,pkg-config) 14 $(call allow-override,LD_SO_CONF_PATH,/etc/ld.so.conf.d/) 15 $(call allow-override,LDCONFIG,ldconfig)
|
| /linux/rust/pin-init/examples/ |
| H A D | linked_list.rs | 3 #![allow(clippy::undocumented_unsafe_blocks)] 16 #[allow(unused_attributes)] 18 #[allow(unused_imports)] 42 #[allow(dead_code)] 69 #[allow(dead_code)] 116 #[allow(dead_code)] 121 #[allow(dead_code)] 142 #[allow(dead_code)] 146 #[allow(dead_code)]
|
| H A D | mutex.rs | 3 #![allow(clippy::undocumented_unsafe_blocks)] 6 #![allow(clippy::missing_safety_doc)] 23 #[allow(unused_attributes)] 49 #[allow(clippy::new_without_default)] 116 #[allow(dead_code)] 192 #[allow(dead_code)]
|
| H A D | pthread_mutex.rs | 4 #![allow(clippy::undocumented_unsafe_blocks)] 45 #[allow(dead_code)] 47 #[allow(dead_code)] 65 #[allow(dead_code)] 108 #[allow(dead_code)]
|
| /linux/tools/scripts/ |
| H A D | Makefile.include | 48 define allow-override 61 $(call allow-override,CC,$(LLVM_PREFIX)clang$(LLVM_SUFFIX)) 62 $(call allow-override,AR,$(LLVM_PREFIX)llvm-ar$(LLVM_SUFFIX)) 63 $(call allow-override,LD,$(LLVM_PREFIX)ld.lld$(LLVM_SUFFIX)) 64 $(call allow-override,CXX,$(LLVM_PREFIX)clang++$(LLVM_SUFFIX)) 65 $(call allow-override,STRIP,$(LLVM_PREFIX)llvm-strip$(LLVM_SUFFIX)) 68 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 69 $(call allow-override,AR,$(CROSS_COMPILE)ar) 70 $(call allow-override,LD,$(CROSS_COMPILE)ld) 71 $(call allow-override,CXX,$(CROSS_COMPILE)g++) [all …]
|
| /linux/security/apparmor/ |
| H A D | policy_compat.c | 103 perms->allow |= AA_MAY_GETATTR; in compute_fperms_allow() 107 perms->allow |= AA_MAY_CHANGE_PROFILE; in compute_fperms_allow() 109 perms->allow |= AA_MAY_ONEXEC; in compute_fperms_allow() 117 perms.allow = map_old_perms(dfa_user_allow(dfa, state)); in compute_fperms_user() 132 perms.allow = map_old_perms(dfa_other_allow(dfa, state)); in compute_fperms_other() 192 perms[state].allow = dfa_user_allow(xmatch, state); in compute_xmatch_perms() 216 perms.allow = dfa_user_allow(dfa, state); in compute_perms_entry() 231 perms.allow |= map_other(dfa_other_allow(dfa, state)); in compute_perms_entry() 233 perms.allow |= AA_MAY_LOCK; in compute_perms_entry() 235 perms.allow |= map_xbits(dfa_user_xbits(dfa, state)); in compute_perms_entry() [all …]
|
| H A D | file.c | 129 ad.request = ad.request & ~perms->allow; in aa_audit_file() 145 ad.denied = ad.request & ~perms->allow; in aa_audit_file() 239 if (request & ~perms->allow) in __aa_path_perm() 357 if (!(lperms.allow & AA_MAY_LINK)) in profile_path_link() 371 if (!(perms.allow & AA_MAY_LINK)) { in profile_path_link() 378 if (!(perms.allow & AA_LINK_SUBSET)) in profile_path_link() 388 request = lperms.allow & ~AA_MAY_LINK; in profile_path_link() 389 lperms.allow &= perms.allow | AA_MAY_LINK; in profile_path_link() 391 request |= AA_AUDIT_FILE_MASK & (lperms.allow & ~perms.allow); in profile_path_link() 392 if (request & ~lperms.allow) { in profile_path_link() [all …]
|
| /linux/drivers/gpu/nova-core/gsp/fw/ |
| H A D | r570_144.rs | 10 #![cfg_attr(test, allow(deref_nullptr))] 11 #![cfg_attr(test, allow(unaligned_references))] 12 #![cfg_attr(test, allow(unsafe_op_in_unsafe_fn))] 13 #![allow(
|
| /linux/drivers/misc/cb710/ |
| H A D | debug.c | 13 static const u16 allow[CB710_REG_COUNT/16] = { variable 17 static const char *const prefix[ARRAY_SIZE(allow)] = { 26 return ((allow[block] >> offset) & mask) == mask; in allow_reg_read() 35 for (i = 0; i < ARRAY_SIZE(allow); ++i, reg += 16/(t/8)) { \ 63 for (i = 0; i < ARRAY_SIZE(allow); ++i, reg += 16/(t/8)) { \
|
| /linux/drivers/dma-buf/ |
| H A D | selftest.c | 54 bool allow = true; in apply_subtest_filter() local 58 allow = false; in apply_subtest_filter() 69 if (allow) in apply_subtest_filter() 77 if (allow) in apply_subtest_filter() 82 result = allow; in apply_subtest_filter()
|
| /linux/rust/kernel/drm/ |
| H A D | ioctl.rs | 12 #[allow(non_snake_case)] 19 #[allow(non_snake_case)] 26 #[allow(non_snake_case)] 33 #[allow(non_snake_case)] 122 #[allow(non_snake_case)]
|
| /linux/arch/arm64/boot/dts/qcom/ |
| H A D | sdm660-xiaomi-lavender.dts | 147 regulator-allow-set-load; 155 regulator-allow-set-load; 162 regulator-allow-set-load; 173 regulator-allow-set-load; 187 regulator-allow-set-load; 256 regulator-allow-set-load; 280 regulator-allow-set-load; 295 regulator-allow-set-load; 302 regulator-allow-set-load; 309 regulator-allow-set-load; [all …]
|
| H A D | sm6125-xiaomi-laurel-sprout.dts | 250 regulator-allow-set-load; 256 regulator-allow-set-load; 282 regulator-allow-set-load; 288 regulator-allow-set-load; 324 regulator-allow-set-load; 345 regulator-allow-set-load; 356 regulator-allow-set-load;
|
| H A D | sda660-inforce-ifc6560.dts | 298 regulator-allow-set-load; 311 regulator-allow-set-load; 320 regulator-allow-set-load; 328 regulator-allow-set-load; 346 regulator-allow-set-load; 376 regulator-allow-set-load; 384 regulator-allow-set-load; 396 regulator-allow-set-load; 412 regulator-allow-set-load;
|
| H A D | sdm630-sony-xperia-nile.dtsi | 324 regulator-allow-set-load; 339 regulator-allow-set-load; 350 regulator-allow-set-load; 362 regulator-allow-set-load; 377 regulator-allow-set-load; 463 regulator-allow-set-load; 490 regulator-allow-set-load; 508 regulator-allow-set-load; 516 regulator-allow-set-load; 524 regulator-allow-set-load; [all …]
|
| /linux/Documentation/admin-guide/cgroup-v1/ |
| H A D | devices.rst | 24 An entry is added using devices.allow, and removed using 27 echo 'c 1:3 mr' > /sys/fs/cgroup/1/devices.allow 36 echo a > /sys/fs/cgroup/1/devices.allow 74 A allow "b 8:* rwm", "c 116:1 rw" 103 # echo "c *:3 rwm" >A/devices.allow 113 # echo "c 2:3 rwm" >B/devices.allow 114 # echo "c 50:3 r" >B/devices.allow 118 # echo "c *:3 rwm" >B/devices.allow 120 Allowing or denying all by writing 'a' to devices.allow or devices.deny will
|
| /linux/arch/arm/mach-s3c/ |
| H A D | pm.c | 63 #define any_allowed(mask, allow) (((mask) & (allow)) != (allow)) argument
|
| /linux/rust/syn/ |
| H A D | custom_keyword.rs | 94 #[allow(non_camel_case_types)] 96 #[allow(dead_code)] 101 #[allow(dead_code, non_snake_case)] 206 #[allow(clippy::expl_impl_clone_on_copy)]
|
| /linux/lib/ |
| H A D | Kconfig.kgdb | 88 exception handler which will allow kgdb to step through a 108 0x0002 - allow arbitrary reads from memory and symbol lookup 109 0x0004 - allow arbitrary writes to memory 110 0x0008 - allow current register state to be inspected 111 0x0010 - allow current register state to be modified 112 0x0020 - allow passive inspection (backtrace, process list, lsmod) 113 0x0040 - allow flow control management (breakpoint, single step) 115 0x0100 - allow machine to be rebooted
|
| /linux/rust/kernel/sync/atomic/ |
| H A D | predefine.rs | 60 #[allow(non_camel_case_types)] 64 #[allow(non_camel_case_types)] 69 #[allow(non_camel_case_types)] in rhs_into_delta() 73 #[allow(non_camel_case_types)]
|
| /linux/fs/smb/server/ |
| H A D | smbacl.c | 311 pace->e_perm = state->owner.allow; in posix_state_to_acl() 316 pace->e_perm = state->users->aces[i].perms.allow; in posix_state_to_acl() 321 pace->e_perm = state->group.allow; in posix_state_to_acl() 327 pace->e_perm = state->groups->aces[i].perms.allow; in posix_state_to_acl() 333 pace->e_perm = state->mask.allow; in posix_state_to_acl() 338 pace->e_perm = state->other.allow; in posix_state_to_acl() 510 acl_state.owner.allow = ((acl_mode & 0700) >> 6) | 0004; in parse_dacl() 513 acl_state.users->aces[acl_state.users->n++].perms.allow = in parse_dacl() 515 default_acl_state.owner.allow = ((acl_mode & 0700) >> 6) | 0004; in parse_dacl() 518 default_acl_state.users->aces[default_acl_state.users->n++].perms.allow = in parse_dacl() [all …]
|
| /linux/rust/kernel/ |
| H A D | slice.rs | 40 #[allow(clippy::incompatible_msrv)] 45 #[allow(clippy::incompatible_msrv)]
|
| /linux/tools/testing/selftests/net/ |
| H A D | xfrm_policy.sh | 38 …rc $lnet dst $rnet dir out tmpl src $me dst $remote proto esp mode tunnel priority 100 action allow 40 …rc $rnet dst $lnet dir fwd tmpl src $remote dst $me proto esp mode tunnel priority 100 action allow 145 ip -net $ns xfrm policy add dst $plain dir out priority 10 action allow 148 …y add dst $encryptip dir out tmpl src $me dst $remote proto esp mode tunnel priority 1 action allow 272 …::0014:0000:0001 dir in tmpl src :: dst :: proto esp mode tunnel priority 100 action allow || break 275 …000 dst ff01::01 dir in tmpl src :: dst :: proto esp mode tunnel priority 100 action allow || break 299 ip -net $ns xfrm policy add dst $j.0.0.0/24 dir out priority 10 action allow 313 ip -net $ns xfrm policy add dst $addr dir out priority 10 action allow
|