/linux/tools/verification/rv/ |
H A D | Makefile.rv | 3 define allow-override 10 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 11 $(call allow-override,AR,$(CROSS_COMPILE)ar) 12 $(call allow-override,STRIP,$(CROSS_COMPILE)strip) 13 $(call allow-override,PKG_CONFIG,pkg-config) 14 $(call allow-override,LD_SO_CONF_PATH,/etc/ld.so.conf.d/) 15 $(call allow-override,LDCONFIG,ldconfig)
|
/linux/tools/tracing/rtla/ |
H A D | Makefile.rtla | 3 define allow-override 10 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 11 $(call allow-override,AR,$(CROSS_COMPILE)ar) 12 $(call allow-override,STRIP,$(CROSS_COMPILE)strip) 13 $(call allow-override,PKG_CONFIG,pkg-config) 14 $(call allow-override,LD_SO_CONF_PATH,/etc/ld.so.conf.d/) 15 $(call allow-override,LDCONFIG,ldconfig)
|
/linux/tools/scripts/ |
H A D | Makefile.include | 48 define allow-override 61 $(call allow-override,CC,$(LLVM_PREFIX)clang$(LLVM_SUFFIX)) 62 $(call allow-override,AR,$(LLVM_PREFIX)llvm-ar$(LLVM_SUFFIX)) 63 $(call allow-override,LD,$(LLVM_PREFIX)ld.lld$(LLVM_SUFFIX)) 64 $(call allow-override,CXX,$(LLVM_PREFIX)clang++$(LLVM_SUFFIX)) 65 $(call allow-override,STRIP,$(LLVM_PREFIX)llvm-strip$(LLVM_SUFFIX)) 68 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 69 $(call allow-override,AR,$(CROSS_COMPILE)ar) 70 $(call allow-override,LD,$(CROSS_COMPILE)ld) 71 $(call allow-override,CXX,$(CROSS_COMPILE)g++) [all …]
|
/linux/security/apparmor/ |
H A D | policy_compat.c | 103 perms->allow |= AA_MAY_GETATTR; in compute_fperms_allow() 107 perms->allow |= AA_MAY_CHANGE_PROFILE; in compute_fperms_allow() 109 perms->allow |= AA_MAY_ONEXEC; in compute_fperms_allow() 117 perms.allow = map_old_perms(dfa_user_allow(dfa, state)); in compute_fperms_user() 132 perms.allow = map_old_perms(dfa_other_allow(dfa, state)); in compute_fperms_other() 192 perms[state].allow = dfa_user_allow(xmatch, state); in compute_xmatch_perms() 216 perms.allow = dfa_user_allow(dfa, state); in compute_perms_entry() 231 perms.allow |= map_other(dfa_other_allow(dfa, state)); in compute_perms_entry() 233 perms.allow |= AA_MAY_LOCK; in compute_perms_entry() 235 perms.allow |= map_xbits(dfa_user_xbits(dfa, state)); in compute_perms_entry()
|
H A D | file.c | 127 ad.request = ad.request & ~perms->allow; in aa_audit_file() 143 ad.denied = ad.request & ~perms->allow; in aa_audit_file() 228 if (request & ~perms->allow) in __aa_path_perm() 347 if (!(lperms.allow & AA_MAY_LINK)) in profile_path_link() 361 if (!(perms.allow & AA_MAY_LINK)) { in profile_path_link() 368 if (!(perms.allow & AA_LINK_SUBSET)) in profile_path_link() 378 request = lperms.allow & ~AA_MAY_LINK; in profile_path_link() 379 lperms.allow &= perms.allow | AA_MAY_LINK; in profile_path_link() 381 request |= AA_AUDIT_FILE_MASK & (lperms.allow & ~perms.allow); in profile_path_link() 382 if (request & ~lperms.allow) { in profile_path_link() [all …]
|
/linux/drivers/misc/cb710/ |
H A D | debug.c | 13 static const u16 allow[CB710_REG_COUNT/16] = { variable 17 static const char *const prefix[ARRAY_SIZE(allow)] = { 26 return ((allow[block] >> offset) & mask) == mask; in allow_reg_read() 35 for (i = 0; i < ARRAY_SIZE(allow); ++i, reg += 16/(t/8)) { \ 63 for (i = 0; i < ARRAY_SIZE(allow); ++i, reg += 16/(t/8)) { \
|
/linux/drivers/dma-buf/ |
H A D | selftest.c | 54 bool allow = true; in apply_subtest_filter() local 58 allow = false; in apply_subtest_filter() 69 if (allow) in apply_subtest_filter() 77 if (allow) in apply_subtest_filter() 82 result = allow; in apply_subtest_filter()
|
/linux/arch/arm64/boot/dts/qcom/ |
H A D | sdm660-xiaomi-lavender.dts | 146 regulator-allow-set-load; 154 regulator-allow-set-load; 161 regulator-allow-set-load; 172 regulator-allow-set-load; 186 regulator-allow-set-load; 255 regulator-allow-set-load; 279 regulator-allow-set-load; 294 regulator-allow-set-load; 301 regulator-allow-set-load; 308 regulator-allow-set-load; [all …]
|
H A D | sm6125-xiaomi-laurel-sprout.dts | 250 regulator-allow-set-load; 256 regulator-allow-set-load; 282 regulator-allow-set-load; 288 regulator-allow-set-load; 324 regulator-allow-set-load; 345 regulator-allow-set-load; 356 regulator-allow-set-load;
|
H A D | sdm630-sony-xperia-nile.dtsi | 324 regulator-allow-set-load; 339 regulator-allow-set-load; 350 regulator-allow-set-load; 362 regulator-allow-set-load; 377 regulator-allow-set-load; 463 regulator-allow-set-load; 490 regulator-allow-set-load; 508 regulator-allow-set-load; 516 regulator-allow-set-load; 524 regulator-allow-set-load; [all …]
|
H A D | msm8994-sony-xperia-kitakami.dtsi | 240 regulator-allow-set-load; 268 regulator-allow-set-load; 315 regulator-allow-set-load; 327 regulator-allow-set-load; 364 regulator-allow-set-load; 371 regulator-allow-set-load; 413 regulator-allow-set-load; 432 regulator-allow-set-load;
|
H A D | msm8992-lg-h815.dts | 156 regulator-allow-set-load; 169 regulator-allow-set-load; 177 regulator-allow-set-load; 185 regulator-allow-set-load;
|
H A D | msm8956-sony-xperia-loire.dtsi | 175 regulator-allow-set-load; 192 regulator-allow-set-load; 209 regulator-allow-set-load; 216 regulator-allow-set-load;
|
/linux/Documentation/admin-guide/cgroup-v1/ |
H A D | devices.rst | 24 An entry is added using devices.allow, and removed using 27 echo 'c 1:3 mr' > /sys/fs/cgroup/1/devices.allow 36 echo a > /sys/fs/cgroup/1/devices.allow 74 A allow "b 8:* rwm", "c 116:1 rw" 103 # echo "c *:3 rwm" >A/devices.allow 113 # echo "c 2:3 rwm" >B/devices.allow 114 # echo "c 50:3 r" >B/devices.allow 118 # echo "c *:3 rwm" >B/devices.allow 120 Allowing or denying all by writing 'a' to devices.allow or devices.deny will
|
/linux/arch/arm/mach-s3c/ |
H A D | pm.c | 63 #define any_allowed(mask, allow) (((mask) & (allow)) != (allow)) argument
|
/linux/tools/build/ |
H A D | Makefile | 9 define allow-override 15 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 16 $(call allow-override,LD,$(CROSS_COMPILE)ld)
|
H A D | Makefile | 9 define allow-override 15 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 16 $(call allow-override,LD,$(CROSS_COMPILE)ld)
|
/linux/fs/smb/server/ |
H A D | smbacl.c | 306 pace->e_perm = state->owner.allow; in posix_state_to_acl() 311 pace->e_perm = state->users->aces[i].perms.allow; in posix_state_to_acl() 316 pace->e_perm = state->group.allow; in posix_state_to_acl() 322 pace->e_perm = state->groups->aces[i].perms.allow; in posix_state_to_acl() 328 pace->e_perm = state->mask.allow; in posix_state_to_acl() 333 pace->e_perm = state->other.allow; in posix_state_to_acl() 505 acl_state.owner.allow = ((acl_mode & 0700) >> 6) | 0004; in parse_dacl() 508 acl_state.users->aces[acl_state.users->n++].perms.allow = in parse_dacl() 510 default_acl_state.owner.allow = ((acl_mode & 0700) >> 6) | 0004; in parse_dacl() 513 default_acl_state.users->aces[default_acl_state.users->n++].perms.allow = in parse_dacl() [all …]
|
/linux/lib/ |
H A D | Kconfig.kgdb | 88 exception handler which will allow kgdb to step through a 108 0x0002 - allow arbitrary reads from memory and symbol lookup 109 0x0004 - allow arbitrary writes to memory 110 0x0008 - allow current register state to be inspected 111 0x0010 - allow current register state to be modified 112 0x0020 - allow passive inspection (backtrace, process list, lsmod) 113 0x0040 - allow flow control management (breakpoint, single step) 115 0x0100 - allow machine to be rebooted
|
/linux/tools/testing/selftests/net/ |
H A D | xfrm_policy.sh | 38 …rc $lnet dst $rnet dir out tmpl src $me dst $remote proto esp mode tunnel priority 100 action allow 40 …rc $rnet dst $lnet dir fwd tmpl src $remote dst $me proto esp mode tunnel priority 100 action allow 145 ip -net $ns xfrm policy add dst $plain dir out priority 10 action allow 148 …y add dst $encryptip dir out tmpl src $me dst $remote proto esp mode tunnel priority 1 action allow 272 …::0014:0000:0001 dir in tmpl src :: dst :: proto esp mode tunnel priority 100 action allow || break 275 …000 dst ff01::01 dir in tmpl src :: dst :: proto esp mode tunnel priority 100 action allow || break 299 ip -net $ns xfrm policy add dst $j.0.0.0/24 dir out priority 10 action allow 313 ip -net $ns xfrm policy add dst $addr dir out priority 10 action allow
|
/linux/Documentation/ABI/testing/ |
H A D | sysfs-class-iommu | 7 given IOMMU here to allow association of IOMMU to 16 given device here to allow association of device to
|
/linux/drivers/gpu/drm/i915/selftests/ |
H A D | i915_selftest.c | 310 bool allow = true; in apply_subtest_filter() local 314 allow = false; in apply_subtest_filter() 325 if (allow) in apply_subtest_filter() 333 if (allow) in apply_subtest_filter() 338 result = allow; in apply_subtest_filter()
|
/linux/Documentation/networking/device_drivers/ethernet/freescale/dpaa2/ |
H A D | dpio-driver.rst | 34 A. allow other drivers, such as the Ethernet driver, to enqueue and dequeue 36 B. allow drivers to register callbacks for data availability notifications 38 C. allow drivers to manage hardware buffer pools 112 will typically allocate 1 DPIO object per CPU to allow queuing operations
|
/linux/tools/testing/selftests/cgroup/ |
H A D | test_cpuset.c | 65 static int test_cpuset_perms_object(const char *root, bool allow) in test_cpuset_perms_object() argument 112 if (allow && chown(parent_procs, test_euid, -1)) in test_cpuset_perms_object() 126 if (allow ^ (cg_run(child_dst, do_migration_fn, (void *)(size_t)object_pid) == EXIT_SUCCESS)) in test_cpuset_perms_object()
|
/linux/drivers/gpu/drm/nouveau/nvkm/subdev/mc/ |
H A D | gp100.c | 69 intr->func->allow(intr, i, intr->mask[i]); in gp100_mc_intr_rearm() 87 .allow = gp100_mc_intr_allow,
|