/* * max9850.h -- codec driver for max9850 * * Copyright (C) 2011 taskit GmbH * Author: Christian Glindkamp * * This program is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License as published by the * Free Software Foundation; either version 2 of the License, or (at your * option) any later version. * */ #ifndef _MAX9850_H #define _MAX9850_H #define MAX9850_STATUSA 0x00 #define MAX9850_STATUSB 0x01 #define MAX9850_VOLUME 0x02 #define MAX9850_GENERAL_PURPOSE 0x03 #define MAX9850_INTERRUPT 0x04 #define MAX9850_ENABLE 0x05 #define MAX9850_CLOCK 0x06 #define MAX9850_CHARGE_PUMP 0x07 #define MAX9850_LRCLK_MSB 0x08 #define MAX9850_LRCLK_LSB 0x09 #define MAX9850_DIGITAL_AUDIO 0x0a #define MAX9850_CACHEREGNUM 11 /* MAX9850_DIGITAL_AUDIO */ #define MAX9850_MASTER (1<<7) #define MAX9850_INV (1<<6) #define MAX9850_BCINV (1<<5) #define MAX9850_DLY (1<<3) #define MAX9850_RTJ (1<<2) #endif e='emaclite-cleanup'>emaclite-cleanup net-next plumbingsTobias Klauser
summaryrefslogtreecommitdiff
path: root/Documentation
diff options
context:
space:
mode:
authorDavid Howells <dhowells@redhat.com>2016-04-07 09:45:23 +0100
committerDavid Howells <dhowells@redhat.com>2016-04-11 22:49:15 +0100
commit56104cf2b8d20eed32c14eac8ac574c35377ab38 (patch)
tree7fc12f22e49f9b799c998245f226906db293255e /Documentation
parentd3bfe84129f65e0af2450743ebdab33d161d01c9 (diff)
IMA: Use the the system trusted keyrings instead of .ima_mok
Add a config option (IMA_KEYRINGS_PERMIT_SIGNED_BY_BUILTIN_OR_SECONDARY) that, when enabled, allows keys to be added to the IMA keyrings by userspace - with the restriction that each must be signed by a key in the system trusted keyrings. EPERM will be returned if this option is disabled, ENOKEY will be returned if no authoritative key can be found and EKEYREJECTED will be returned if the signature doesn't match. Other errors such as ENOPKG may also be returned. If this new option is enabled, the builtin system keyring is searched, as is the secondary system keyring if that is also enabled. Intermediate keys between the builtin system keyring and the key being added can be added to the secondary keyring (which replaces .ima_mok) to form a trust chain - provided they are also validly signed by a key in one of the trusted keyrings. The .ima_mok keyring is then removed and the IMA blacklist keyring gets its own config option (IMA_BLACKLIST_KEYRING). Signed-off-by: David Howells <dhowells@redhat.com> Signed-off-by: Mimi Zohar <zohar@linux.vnet.ibm.com>
Diffstat (limited to 'Documentation')