/linux-4.1.27/security/smack/ |
D | smack_access.c | 125 int smk_access(struct smack_known *subject, struct smack_known *object, in smk_access() argument 137 if (subject == &smack_known_star) { in smk_access() 146 if (object == &smack_known_web || subject == &smack_known_web) in smk_access() 157 if (subject->smk_known == object->smk_known) in smk_access() 167 if (subject == &smack_known_hat) in smk_access() 178 may = smk_access_entry(subject->smk_known, object->smk_known, in smk_access() 179 &subject->smk_rules); in smk_access() 202 if (subject == smack_unconfined) in smk_access() 209 smack_log(subject->smk_known, object->smk_known, in smk_access() 329 audit_log_untrustedstring(ab, sad->subject); in smack_log_callback() [all …]
|
D | smack.h | 216 char *subject; member
|
D | smackfs.c | 344 static int smk_fill_rule(const char *subject, const char *object, in smk_fill_rule() argument 353 rule->smk_subject = smk_import_entry(subject, len); in smk_fill_rule() 361 cp = smk_parse_smack(subject, len); in smk_fill_rule()
|
/linux-4.1.27/Documentation/security/ |
D | Smack.txt | 111 This interface reports whether a subject with the specified 118 This interface reports whether a subject with the specified 131 where the first string is the subject label, the second the 134 "rwxat-". If a rule for a given subject and object exists it will be 165 where the first string is the subject label, the second the 177 where the first string is the subject label, the second the 217 For the PTRACE_READ a subject needs to have a read access on 220 only allowed when subject's and object's labels are equal. 224 revoke-subject 226 rules with that subject label. [all …]
|
D | credentials.txt | 72 A subject is an object that is acting upon another object. 85 A subject has an additional interpretation of its credentials. A subset 88 subject acts. 97 Linux has a number of actions available that a subject may perform upon an 98 object. The set of actions available depends on the nature of the subject 106 When a subject acts upon an object, a security calculation is made. This 108 action, and searching one or more sets of rules to see whether the subject 121 is an abbreviated ACL with three fixed classes of subject ('user', 138 subject label, the object label and the action and look for a rule
|
/linux-4.1.27/scripts/ |
D | sign-file | 204 my $subject = asn1_extract($tbs->[1], $UNIV | $CONS | $SEQUENCE); 249 while ($subject->[1]->[1] > 0) { 250 my $rdn = asn1_extract($subject->[1], $UNIV | $CONS | $SET);
|
D | get_maintainer.pl | 1810 my $subject = ""; 1814 $subject = $1 if ($line =~ m/$VCS_cmds{"subject_pattern"}/); 1829 @{$ref}[1] eq $subject && 1837 [ ($commit, $subject, $type) ]);
|
/linux-4.1.27/crypto/asymmetric_keys/ |
D | pkcs7_verify.c | 182 x509->subject, in pkcs7_verify_sig_chain() 195 strcmp(x509->subject, x509->issuer) == 0) { in pkcs7_verify_sig_chain() 234 pr_debug("- subject %s\n", p->subject); in pkcs7_verify_sig_chain()
|
D | x509_public_key.c | 261 pr_devel("Cert Subject: %s\n", cert->subject); in x509_key_preparse() 295 sulen = strlen(cert->subject); in x509_key_preparse() 308 p = memcpy(desc, cert->subject, sulen); in x509_key_preparse()
|
D | x509_parser.h | 21 char *subject; /* Name of certificate subject */ member
|
D | x509.asn1 | 13 subject Name ({ x509_note_subject }),
|
D | x509_cert_parser.c | 53 kfree(cert->subject); in x509_free_certificate() 384 return x509_fabricate_name(ctx, hdrlen, tag, &ctx->cert->subject, vlen); in x509_note_subject()
|
D | pkcs7_parser.c | 260 pr_debug("Got cert %u for %s\n", x509->index, x509->subject); in pkcs7_extract_cert()
|
/linux-4.1.27/Documentation/networking/ |
D | ax25.txt | 9 of the message, the subject field is ignored. You don't need to be
|
D | netdev-FAQ.txt | 90 git format-patch --subject-prefix='PATCH net-next' start..finish 94 the above is just the subject text of the outgoing e-mail, and you can
|
D | l2tp.txt | 196 state information because the file format is subject to change. It is
|
D | LICENSE.qlge | 201 original licensor to copy, distribute or modify the Program subject to
|
D | LICENSE.qlcnic | 201 original licensor to copy, distribute or modify the Program subject to
|
/linux-4.1.27/drivers/of/unittest-data/ |
D | testcases.dts | 23 * The format of this data may be subject to change. For the time being consider
|
/linux-4.1.27/drivers/powercap/ |
D | Kconfig | 11 power zones representing parts of the system that can be subject to power
|
/linux-4.1.27/drivers/gpu/drm/nouveau/nvkm/engine/gr/fuc/ |
D | hubgk110.fuc3 | 9 * Software is furnished to do so, subject to the following conditions:
|
D | hubgf100.fuc3 | 9 * Software is furnished to do so, subject to the following conditions:
|
D | gpcgf100.fuc3 | 9 * Software is furnished to do so, subject to the following conditions:
|
D | gpcgf117.fuc3 | 9 * Software is furnished to do so, subject to the following conditions:
|
D | hubgf117.fuc3 | 9 * Software is furnished to do so, subject to the following conditions:
|
D | hubgk104.fuc3 | 9 * Software is furnished to do so, subject to the following conditions:
|
D | gpcgk208.fuc5 | 9 * Software is furnished to do so, subject to the following conditions:
|
D | gpcgk104.fuc3 | 9 * Software is furnished to do so, subject to the following conditions:
|
D | gpcgm107.fuc5 | 9 * Software is furnished to do so, subject to the following conditions:
|
D | hubgm107.fuc5 | 9 * Software is furnished to do so, subject to the following conditions:
|
D | hubgk208.fuc5 | 9 * Software is furnished to do so, subject to the following conditions:
|
D | gpcgk110.fuc3 | 9 * Software is furnished to do so, subject to the following conditions:
|
D | macros.fuc | 9 * Software is furnished to do so, subject to the following conditions:
|
D | com.fuc | 10 * Software is furnished to do so, subject to the following conditions:
|
D | gpc.fuc | 10 * Software is furnished to do so, subject to the following conditions:
|
D | hub.fuc | 10 * Software is furnished to do so, subject to the following conditions:
|
/linux-4.1.27/drivers/gpu/drm/nouveau/nvkm/subdev/pmu/fuc/ |
D | perf.fuc | 9 * Software is furnished to do so, subject to the following conditions:
|
D | test.fuc | 9 * Software is furnished to do so, subject to the following conditions:
|
D | gk208.fuc5 | 9 * Software is furnished to do so, subject to the following conditions:
|
D | gf110.fuc4 | 9 * Software is furnished to do so, subject to the following conditions:
|
D | idle.fuc | 9 * Software is furnished to do so, subject to the following conditions:
|
D | gt215.fuc3 | 9 * Software is furnished to do so, subject to the following conditions:
|
D | gf100.fuc3 | 9 * Software is furnished to do so, subject to the following conditions:
|
D | arith.fuc | 9 * Software is furnished to do so, subject to the folloing conditions:
|
D | host.fuc | 9 * Software is furnished to do so, subject to the following conditions:
|
D | i2c_.fuc | 9 * Software is furnished to do so, subject to the following conditions:
|
D | macros.fuc | 9 * Software is furnished to do so, subject to the following conditions:
|
D | memx.fuc | 9 * Software is furnished to do so, subject to the following conditions:
|
D | kernel.fuc | 9 * Software is furnished to do so, subject to the following conditions:
|
/linux-4.1.27/arch/blackfin/ |
D | Clear_BSD.txt | 6 modification, are permitted (subject to the limitations in the
|
/linux-4.1.27/drivers/media/usb/pvrusb2/ |
D | Kconfig | 33 Note: This feature is experimental and subject to change.
|
/linux-4.1.27/Documentation/power/ |
D | power_supply_class.txt | 19 The core attribute set is subject to the standard Linux evolution (i.e. 207 model is not subject of work for a battery driver. Such functionality 211 voltage and so on. But full-fledged battery model is likely not subject
|
/linux-4.1.27/arch/arm/boot/dts/ |
D | imx6dl-cubox-i.dts | 27 * Software is furnished to do so, subject to the following
|
D | imx6qdl-microsom.dtsi | 27 * Software is furnished to do so, subject to the following
|
D | imx6q-hummingboard.dts | 28 * Software is furnished to do so, subject to the following
|
D | rk3288-firefly.dts | 27 * Software is furnished to do so, subject to the following
|
D | imx6q-cubox-i.dts | 27 * Software is furnished to do so, subject to the following
|
D | rk3288-firefly-beta.dts | 27 * Software is furnished to do so, subject to the following
|
D | imx6dl-hummingboard.dts | 28 * Software is furnished to do so, subject to the following
|
D | at91sam9xe.dtsi | 30 * Software is furnished to do so, subject to the following
|
D | armada-388.dtsi | 25 * Software is furnished to do so, subject to the following
|
D | armada-398.dtsi | 31 * Software is furnished to do so, subject to the following
|
D | armada-390.dtsi | 31 * Software is furnished to do so, subject to the following
|
D | cx92755_equinox.dts | 31 * Software is furnished to do so, subject to the following
|
D | sun6i-a31s.dtsi | 32 * Software is furnished to do so, subject to the following
|
D | meson6-atv1200.dts | 32 * Software is furnished to do so, subject to the following
|
D | meson6.dtsi | 32 * Software is furnished to do so, subject to the following
|
D | sun8i-a23-ippo-q8h-v1.2.dts | 32 * Software is furnished to do so, subject to the following
|
D | ls1021a-twr.dts | 32 * Software is furnished to do so, subject to the following
|
D | axp209.dtsi | 34 * Software is furnished to do so, subject to the following
|
D | armada-xp-matrix.dts | 31 * Software is furnished to do so, subject to the following
|
D | sun4i-a10-hyundai-a7hd.dts | 32 * Software is furnished to do so, subject to the following
|
D | meson8-minix-neo-x8.dts | 27 * Software is furnished to do so, subject to the following
|
D | sun6i-a31s-cs908.dts | 32 * Software is furnished to do so, subject to the following
|
D | sun4i-a10-mk802.dts | 32 * Software is furnished to do so, subject to the following
|
D | sun4i-a10-chuwi-v7-cw0825.dts | 32 * Software is furnished to do so, subject to the following
|
D | sun6i-a31-app4-evb1.dts | 34 * Software is furnished to do so, subject to the following
|
D | sun4i-a10-mk802ii.dts | 32 * Software is furnished to do so, subject to the following
|
D | cx92755.dtsi | 31 * Software is furnished to do so, subject to the following
|
D | sun5i-a10s-mk802.dts | 32 * Software is furnished to do so, subject to the following
|
D | imx6qdl-microsom-ar8035.dtsi | 30 * Software is furnished to do so, subject to the following
|
D | sun4i-a10-inet97fv2.dts | 34 * Software is furnished to do so, subject to the following
|
D | armada-388-rd.dts | 33 * Software is furnished to do so, subject to the following
|
D | armada-398-db.dts | 31 * Software is furnished to do so, subject to the following
|
D | sun4i-a10-ba10-tvbox.dts | 32 * Software is furnished to do so, subject to the following
|
D | sun8i-a23-ippo-q8h-v5.dts | 34 * Software is furnished to do so, subject to the following
|
D | sun6i-a31-colombus.dts | 34 * Software is furnished to do so, subject to the following
|
D | sun4i-a10-mini-xplus.dts | 34 * Software is furnished to do so, subject to the following
|
D | sun5i-a13-olinuxino-micro.dts | 33 * Software is furnished to do so, subject to the following
|
D | sun6i-a31-m9.dts | 32 * Software is furnished to do so, subject to the following
|
D | sun6i-a31-hummingbird.dts | 34 * Software is furnished to do so, subject to the following
|
D | sun5i-a10s-r7-tv-dongle.dts | 32 * Software is furnished to do so, subject to the following
|
D | sun4i-a10-marsboard.dts | 33 * Software is furnished to do so, subject to the following
|
D | armada-388-db.dts | 32 * Software is furnished to do so, subject to the following
|
D | sun9i-a80-optimus.dts | 34 * Software is furnished to do so, subject to the following
|
D | meson8.dtsi | 30 * Software is furnished to do so, subject to the following
|
D | rk3066a-marsboard.dts | 27 * Software is furnished to do so, subject to the following
|
D | meson.dtsi | 32 * Software is furnished to do so, subject to the following
|
D | armada-xp-axpwifiap.dts | 36 * Software is furnished to do so, subject to the following
|
D | sun4i-a10-olinuxino-lime.dts | 32 * Software is furnished to do so, subject to the following
|
D | at91-sama5d4_xplained.dts | 30 * Software is furnished to do so, subject to the following
|
D | sun7i-a20-olinuxino-lime.dts | 35 * Software is furnished to do so, subject to the following
|
D | sun4i-a10-hackberry.dts | 34 * Software is furnished to do so, subject to the following
|
D | sun5i-a13-olinuxino.dts | 34 * Software is furnished to do so, subject to the following
|
D | sunxi-common-regulators.dtsi | 34 * Software is furnished to do so, subject to the following
|
D | sun7i-a20-m3.dts | 34 * Software is furnished to do so, subject to the following
|
D | sun4i-a10-pcduino.dts | 33 * Software is furnished to do so, subject to the following
|
D | armada-380.dtsi | 33 * Software is furnished to do so, subject to the following
|
D | armada-370-mirabox.dts | 29 * Software is furnished to do so, subject to the following
|
D | sun4i-a10-a1000.dts | 34 * Software is furnished to do so, subject to the following
|
D | sun5i-a13-hsg-h702.dts | 32 * Software is furnished to do so, subject to the following
|
D | armada-375-db.dts | 33 * Software is furnished to do so, subject to the following
|
D | armada-385-db-ap.dts | 26 * Software is furnished to do so, subject to the following
|
D | armada-xp-openblocks-ax3-4.dts | 31 * Software is furnished to do so, subject to the following
|
D | sun7i-a20-bananapi.dts | 34 * Software is furnished to do so, subject to the following
|
D | ls1021a-qds.dts | 32 * Software is furnished to do so, subject to the following
|
D | sun4i-a10-cubieboard.dts | 33 * Software is furnished to do so, subject to the following
|
D | sun7i-a20-cubieboard2.dts | 34 * Software is furnished to do so, subject to the following
|
D | sun7i-a20-pcduino3.dts | 33 * Software is furnished to do so, subject to the following
|
D | imx6sl-warp.dts | 32 * Software is furnished to do so, subject to the following
|
D | imx6qdl-cubox-i.dtsi | 27 * Software is furnished to do so, subject to the following
|
D | armada-370-rd.dts | 32 * Software is furnished to do so, subject to the following
|
D | sun7i-a20-olinuxino-lime2.dts | 32 * Software is furnished to do so, subject to the following
|
D | sun7i-a20-i12-tvbox.dts | 32 * Software is furnished to do so, subject to the following
|
D | armada-xp-db.dts | 34 * Software is furnished to do so, subject to the following
|
D | sun7i-a20-bananapro.dts | 32 * Software is furnished to do so, subject to the following
|
D | armada-385.dtsi | 33 * Software is furnished to do so, subject to the following
|
D | imx6qdl-hummingboard.dtsi | 27 * Software is furnished to do so, subject to the following
|
D | sun5i-a10s-olinuxino-micro.dts | 34 * Software is furnished to do so, subject to the following
|
D | armada-xp-mv78230.dtsi | 31 * Software is furnished to do so, subject to the following
|
D | armada-370-netgear-rn104.dts | 29 * Software is furnished to do so, subject to the following
|
D | at91-sama5d4ek.dts | 30 * Software is furnished to do so, subject to the following
|
D | armada-xp-gp.dts | 34 * Software is furnished to do so, subject to the following
|
D | sun7i-a20-cubietruck.dts | 34 * Software is furnished to do so, subject to the following
|
D | armada-370-netgear-rn102.dts | 29 * Software is furnished to do so, subject to the following
|
D | armada-370-db.dts | 34 * Software is furnished to do so, subject to the following
|
D | armada-xp-lenovo-ix4-300d.dts | 29 * Software is furnished to do so, subject to the following
|
D | armada-xp.dtsi | 34 * Software is furnished to do so, subject to the following
|
D | imx6q-tbs2910.dts | 32 * Software is furnished to do so, subject to the following
|
D | armada-xp-linksys-mamba.dts | 34 * Software is furnished to do so, subject to the following
|
D | armada-370-xp.dtsi | 34 * Software is furnished to do so, subject to the following
|
D | armada-xp-netgear-rn2120.dts | 29 * Software is furnished to do so, subject to the following
|
D | armada-388-gp.dts | 26 * Software is furnished to do so, subject to the following
|
D | rk3288-popmetal.dts | 27 * Software is furnished to do so, subject to the following
|
D | armada-370.dtsi | 33 * Software is furnished to do so, subject to the following
|
D | arm-realview-pb1176.dts | 9 * furnished to do so, subject to the following conditions:
|
D | armada-xp-mv78460.dtsi | 31 * Software is furnished to do so, subject to the following
|
D | armada-xp-synology-ds414.dts | 29 * Software is furnished to do so, subject to the following
|
D | ls1021a.dtsi | 32 * Software is furnished to do so, subject to the following
|
D | armada-370-synology-ds213j.dts | 29 * Software is furnished to do so, subject to the following
|
D | rk3066a-rayeager.dts | 27 * Software is furnished to do so, subject to the following
|
D | rk3288-firefly.dtsi | 27 * Software is furnished to do so, subject to the following
|
D | armada-xp-mv78260.dtsi | 31 * Software is furnished to do so, subject to the following
|
D | armada-39x.dtsi | 31 * Software is furnished to do so, subject to the following
|
D | armada-375.dtsi | 32 * Software is furnished to do so, subject to the following
|
D | armada-38x.dtsi | 33 * Software is furnished to do so, subject to the following
|
D | sun9i-a80.dtsi | 34 * Software is furnished to do so, subject to the following
|
D | sun8i-a23.dtsi | 34 * Software is furnished to do so, subject to the following
|
D | sun6i-a31.dtsi | 34 * Software is furnished to do so, subject to the following
|
/linux-4.1.27/Documentation/devicetree/bindings/powerpc/fsl/cpm_qe/ |
D | cpm.txt | 40 Ranges must be set up subject to the following restrictions:
|
/linux-4.1.27/firmware/dsp56k/ |
D | bootstrap.asm | 3 ; This file is subject to the terms and conditions of the GNU General Public
|
/linux-4.1.27/arch/arm64/boot/dts/cavium/ |
D | thunder-88xx.dts | 34 * Software is furnished to do so, subject to the following
|
D | thunder-88xx.dtsi | 34 * Software is furnished to do so, subject to the following
|
/linux-4.1.27/arch/arm64/boot/dts/freescale/ |
D | fsl-ls2085a-simu.dts | 36 * Software is furnished to do so, subject to the following
|
D | fsl-ls2085a.dtsi | 36 * Software is furnished to do so, subject to the following
|
/linux-4.1.27/Documentation/arm/Atmel/ |
D | README | 14 git branches/tags and email subject always contain this "at91" sub-string.
|
/linux-4.1.27/Documentation/blockdev/ |
D | floppy.txt | 231 be sure to include the word "floppy" (or "FLOPPY") in the subject 233 sure to mention also the type of the filesystem in the subject line.
|
D | paride.txt | 406 in the body of the mail message (not in the subject line). Please be
|
/linux-4.1.27/Documentation/ |
D | SubmittingPatches | 397 10) Include PATCH in the subject 401 convention to prefix your subject line with [PATCH]. This lets Linus 481 message (just after the subject line) to facilitate tracking. For instance, 581 understand the subject area and to perform thorough reviews, will normally 606 The canonical patch subject line is: 630 alphabetically by subject line - pretty much any email reader will 732 A pull request should have [GIT] or [PULL] in the subject line. The
|
D | kernel-doc-nano-HOWTO.txt | 71 The short description following the subject can span multiple lines 326 * hardware, software, or its subject(s).
|
D | stable_kernel_rules.txt | 51 stable@vger.kernel.org containing the subject of the patch, the commit ID,
|
D | lzo.txt | 9 decompressor as implemented in the Linux kernel understands. The file subject
|
D | robust-futex-ABI.txt | 175 3) if the list contains more than 1 million (subject to
|
D | intel_txt.txt | 67 code/data, much of which is subject to change from boot to boot
|
D | sysrq.txt | 229 Sysrq output is subject to the same console loglevel control as all
|
D | HOWTO | 110 subject to scrutiny for content and style), but not following them 312 subject to review which primarily happens on mailing lists (see the
|
/linux-4.1.27/firmware/ |
D | WHENCE | 710 Software is furnished to do so, subject to the following conditions: 740 * Software is furnished to do so, subject to the following conditions: 798 * Software is furnished to do so, subject to the following conditions:
|
/linux-4.1.27/Documentation/crypto/ |
D | api-intro.txt | 44 subject to block size requirements (i.e., non-stream ciphers can only
|
/linux-4.1.27/Documentation/powerpc/ |
D | pmu-ebb.txt | 32 processes, subject to standard permission checks. This is also true of EBB
|
D | eeh-pci-error-recovery.txt | 62 kernel does it. The actual implementation is subject to change, 142 seen in /proc/ppc64/eeh (subject to change). Normally, almost
|
/linux-4.1.27/fs/cramfs/ |
D | README | 108 PAGE_CACHE_SIZE is subject to change between kernel versions
|
/linux-4.1.27/Documentation/kbuild/ |
D | kconfig.txt | 72 settings are still subject to normal dependency checks.
|
/linux-4.1.27/Documentation/input/ |
D | ff.txt | 45 This information is subject to change.
|
/linux-4.1.27/ |
D | REPORTING-BUGS | 105 post it to the mailing list with a subject of "PROBLEM: <one line
|
/linux-4.1.27/Documentation/devicetree/bindings/arm/ |
D | idle-states.txt | 35 The device tree binding definition for ARM idle states is the subject of this 203 properties specification that is the subject of the following sections.
|
/linux-4.1.27/tools/perf/Documentation/ |
D | perf-record.txt | 220 levels are subject to permissions. When sampling on multiple events, branch stack sampling
|
/linux-4.1.27/drivers/staging/rtl8192e/ |
D | license | 2 "This software program is licensed subject to the GNU General Public License 194 original licensor to copy, distribute or modify the Program subject to
|
/linux-4.1.27/Documentation/devicetree/bindings/powerpc/fsl/ |
D | dcsr.txt | 5 NOTE: The bindings described in this document are preliminary and subject
|
/linux-4.1.27/Documentation/filesystems/ |
D | logfs.txt | 45 is subject to frequent change. At mount time, it has to be scanned
|
/linux-4.1.27/Documentation/ioctl/ |
D | hdio.txt | 115 drive geometry is an abstraction which is actually subject 256 probed. Some of this information is subject to change, and
|
/linux-4.1.27/Documentation/usb/ |
D | ehci.txt | 161 20 MByte/sec transfer rates. This is of course subject to change;
|
/linux-4.1.27/Documentation/ABI/testing/ |
D | sysfs-devices-power | 49 be subject to automatic power management, depending on their
|
/linux-4.1.27/Documentation/development-process/ |
D | 2.Process | 404 long-running conversations can drift away from the original subject 405 without changing the email subject line) and the people who are
|
D | 5.Posting | 287 Patches need good subject lines. The canonical format for a patch line is
|
/linux-4.1.27/Documentation/scsi/ |
D | LICENSE.qla4xxx | 202 original licensor to copy, distribute or modify the Program subject to
|
D | LICENSE.qla2xxx | 203 original licensor to copy, distribute or modify the Program subject to
|
/linux-4.1.27/Documentation/trace/ |
D | events.txt | 309 subject to any restrictions that individual commands may have in that
|
/linux-4.1.27/Documentation/RCU/ |
D | whatisRCU.txt | 282 RCU, in particular, flagging a pointer that is subject to changing 912 example, is your code subject to network-based denial-of-service
|
/linux-4.1.27/Documentation/filesystems/caching/ |
D | cachefiles.txt | 427 security data as that affects the process as an object, not just as a subject.
|
/linux-4.1.27/drivers/gpu/drm/nouveau/nvkm/engine/ce/fuc/ |
D | com.fuc | 10 * Software is furnished to do so, subject to the following conditions:
|