Home
last modified time | relevance | path

Searched full:allow (Results 1 – 25 of 5721) sorted by relevance

12345678910>>...229

/OK3568_Linux_fs/prebuilts/gcc/linux-x86/aarch64/gcc-arm-10.3-2021.07-x86_64-aarch64-none-linux-gnu/aarch64-none-linux-gnu/libc/usr/include/linux/
H A Dcapability.h168 * Allow taking bits out of capability bounding set
169 * Allow modification of the securebits for a process
174 /* Allow modification of S_IMMUTABLE and S_APPEND file attributes */
183 /* Allow broadcasting, listen to multicast */
187 /* Allow interface configuration */
188 /* Allow administration of IP firewall, masquerading and accounting */
189 /* Allow setting debug option on sockets */
190 /* Allow modification of routing tables */
191 /* Allow setting arbitrary process / process group ownership on
193 /* Allow binding to any address for transparent proxying (also via NET_RAW) */
[all …]
/OK3568_Linux_fs/prebuilts/gcc/linux-x86/arm/gcc-arm-10.3-2021.07-x86_64-arm-none-linux-gnueabihf/arm-none-linux-gnueabihf/libc/usr/include/linux/
H A Dcapability.h168 * Allow taking bits out of capability bounding set
169 * Allow modification of the securebits for a process
174 /* Allow modification of S_IMMUTABLE and S_APPEND file attributes */
183 /* Allow broadcasting, listen to multicast */
187 /* Allow interface configuration */
188 /* Allow administration of IP firewall, masquerading and accounting */
189 /* Allow setting debug option on sockets */
190 /* Allow modification of routing tables */
191 /* Allow setting arbitrary process / process group ownership on
193 /* Allow binding to any address for transparent proxying (also via NET_RAW) */
[all …]
/OK3568_Linux_fs/kernel/include/uapi/linux/
H A Dcapability.h170 * Allow taking bits out of capability bounding set
171 * Allow modification of the securebits for a process
176 /* Allow modification of S_IMMUTABLE and S_APPEND file attributes */
185 /* Allow broadcasting, listen to multicast */
189 /* Allow interface configuration */
190 /* Allow administration of IP firewall, masquerading and accounting */
191 /* Allow setting debug option on sockets */
192 /* Allow modification of routing tables */
193 /* Allow setting arbitrary process / process group ownership on
195 /* Allow binding to any address for transparent proxying (also via NET_RAW) */
[all …]
/OK3568_Linux_fs/kernel/tools/testing/selftests/tc-testing/tc-tests/actions/
H A Dife.json17 "cmdUnderTest": "$TC actions add action ife encode allow mark pass index 2",
20 …"matchPattern": "action order [0-9]*: ife encode action pass.*type 0[xX]ED3E.*allow mark.*index 2",
65 "cmdUnderTest": "$TC actions add action ife encode allow mark continue index 2",
68 …"matchPattern": "action order [0-9]*: ife encode action continue.*type 0[xX]ED3E.*allow mark.*inde…
207 "cmdUnderTest": "$TC actions add action ife encode allow prio pass index 9",
210 …"matchPattern": "action order [0-9]*: ife encode action pass.*type 0[xX]ED3E.*allow prio.*index 9",
279 "cmdUnderTest": "$TC actions add action ife encode allow prio drop index 9",
282 …"matchPattern": "action order [0-9]*: ife encode action drop.*type 0[xX]ED3E.*allow prio.*index 9",
397 "cmdUnderTest": "$TC actions add action ife encode allow tcindex pass index 1",
400 …"matchPattern": "action order [0-9]*: ife encode action pass.*type 0[xX]ED3E.*allow tcindex.*index…
[all …]
/OK3568_Linux_fs/kernel/drivers/nfc/st-nci/
H A Dst-nci.h65 * @FACTORY_MODE: Allow to set the driver into a mode where no secure element
67 * @HCI_CLEAR_ALL_PIPES: Allow to execute a HCI clear all pipes command.
69 * @HCI_DM_PUT_DATA: Allow to configure specific CLF registry as for example
71 * @HCI_DM_UPDATE_AID: Allow to configure an AID routing into the CLF routing
73 * @HCI_DM_GET_INFO: Allow to retrieve CLF information.
74 * @HCI_DM_GET_DATA: Allow to retrieve CLF configurable data such as low
76 * @HCI_DM_DIRECT_LOAD: Allow to load a firmware into the CLF. A complete
78 * @HCI_DM_RESET: Allow to run a CLF reset in order to "commit" CLF
80 * @HCI_GET_PARAM: Allow to retrieve an HCI CLF parameter (for example the
82 * @HCI_DM_FIELD_GENERATOR: Allow to generate different kind of RF
[all …]
/OK3568_Linux_fs/kernel/drivers/gpu/drm/amd/display/dc/dcn10/
H A Ddcn10_hubbub.c93 void hubbub1_allow_self_refresh_control(struct hubbub *hubbub, bool allow) in hubbub1_allow_self_refresh_control() argument
97 * DCHUBBUB_ARB_ALLOW_SELF_REFRESH_FORCE_ENABLE = 1 means do not allow stutter in hubbub1_allow_self_refresh_control()
98 * DCHUBBUB_ARB_ALLOW_SELF_REFRESH_FORCE_ENABLE = 0 means allow stutter in hubbub1_allow_self_refresh_control()
103 DCHUBBUB_ARB_ALLOW_SELF_REFRESH_FORCE_ENABLE, !allow); in hubbub1_allow_self_refresh_control()
123 /* pstate latency is ~20us so if we wait over 40us and pstate allow in hubbub1_verify_allow_pstate_change_high()
139 /* we hacked to force pstate allow to prevent hang last time in hubbub1_verify_allow_pstate_change_high()
153 * 0: Pipe0 Plane0 Allow Pstate Change in hubbub1_verify_allow_pstate_change_high()
154 * 1: Pipe0 Plane1 Allow Pstate Change in hubbub1_verify_allow_pstate_change_high()
155 * 2: Pipe0 Cursor0 Allow Pstate Change in hubbub1_verify_allow_pstate_change_high()
156 * 3: Pipe0 Cursor1 Allow Pstate Change in hubbub1_verify_allow_pstate_change_high()
[all …]
/OK3568_Linux_fs/kernel/security/apparmor/include/
H A Dperms.h67 u32 allow; member
68 u32 audit; /* set only when allow is set */
70 u32 deny; /* explicit deny, or conflict if allow also set */
71 u32 quiet; /* set only when ~allow | deny */
72 u32 kill; /* set only when ~allow | deny */
73 u32 stop; /* set only when ~allow | deny */
75 u32 complain; /* accumulates only used when ~allow & ~deny */
76 u32 cond; /* set only when ~allow and ~deny */
78 u32 hide; /* set only when ~allow | deny */
79 u32 prompt; /* accumulates only used when ~allow & ~deny */
[all …]
/OK3568_Linux_fs/kernel/security/apparmor/
H A Dlib.c24 struct aa_perms allperms = { .allow = ALL_PERMS_MASK,
329 .allow = dfa_user_allow(dfa, state), in aa_compute_perms()
337 perms->allow |= map_other(dfa_other_allow(dfa, state)); in aa_compute_perms()
351 accum->allow &= addend->allow & ~addend->deny; in aa_perms_accum_raw()
352 accum->audit |= addend->audit & addend->allow; in aa_perms_accum_raw()
353 accum->quiet &= addend->quiet & ~addend->allow; in aa_perms_accum_raw()
354 accum->kill |= addend->kill & ~addend->allow; in aa_perms_accum_raw()
355 accum->stop |= addend->stop & ~addend->allow; in aa_perms_accum_raw()
356 accum->complain |= addend->complain & ~addend->allow & ~addend->deny; in aa_perms_accum_raw()
357 accum->cond |= addend->cond & ~addend->allow & ~addend->deny; in aa_perms_accum_raw()
[all …]
H A Dfile.c122 aad(&sa)->request = aad(&sa)->request & ~perms->allow; in aa_audit_file()
138 aad(&sa)->denied = aad(&sa)->request & ~perms->allow; in aa_audit_file()
224 perms.allow = map_old_perms(dfa_user_allow(dfa, state)); in aa_compute_fperms()
229 perms.allow = map_old_perms(dfa_other_allow(dfa, state)); in aa_compute_fperms()
234 perms.allow |= AA_MAY_GETATTR; in aa_compute_fperms()
238 perms.allow |= AA_MAY_CHANGE_PROFILE; in aa_compute_fperms()
240 perms.allow |= AA_MAY_ONEXEC; in aa_compute_fperms()
275 if (request & ~perms->allow) in __aa_path_perm()
384 if (!(lperms.allow & AA_MAY_LINK)) in profile_path_link()
398 if (!(perms.allow & AA_MAY_LINK)) { in profile_path_link()
[all …]
/OK3568_Linux_fs/yocto/meta-openembedded/meta-initramfs/recipes-devtools/klibc/files/
H A Dklcc-cross-accept-clang-options.patch13 + # Allow clang options
16 + # Allow clang options
19 + # Allow clang options
22 + # Allow clang options
25 + # Allow clang options
28 + # Allow clang options
31 + # Allow clang options
34 + # Allow clang options
/OK3568_Linux_fs/kernel/tools/scripts/
H A DMakefile.include47 define allow-override
54 $(call allow-override,CC,clang)
55 $(call allow-override,AR,llvm-ar)
56 $(call allow-override,LD,ld.lld)
57 $(call allow-override,CXX,clang++)
58 $(call allow-override,STRIP,llvm-strip)
60 # Allow setting various cross-compile vars or setting CROSS_COMPILE as a prefix.
61 $(call allow-override,CC,$(CROSS_COMPILE)gcc)
62 $(call allow-override,AR,$(CROSS_COMPILE)ar)
63 $(call allow-override,LD,$(CROSS_COMPILE)ld)
[all …]
/OK3568_Linux_fs/kernel/drivers/nfc/st21nfca/
H A Dst21nfca.h74 * @FACTORY_MODE: Allow to set the driver into a mode where no secure element
76 * @HCI_CLEAR_ALL_PIPES: Allow to execute a HCI clear all pipes command.
78 * @HCI_DM_PUT_DATA: Allow to configure specific CLF registry as for example
80 * @HCI_DM_UPDATE_AID: Allow to configure an AID routing into the CLF routing
82 * @HCI_DM_GET_INFO: Allow to retrieve CLF information.
83 * @HCI_DM_GET_DATA: Allow to retrieve CLF configurable data such as low
85 * @HCI_DM_LOAD: Allow to load a firmware into the CLF. A complete
87 * @HCI_DM_RESET: Allow to run a CLF reset in order to "commit" CLF
89 * @HCI_GET_PARAM: Allow to retrieve an HCI CLF parameter (for example the
91 * @HCI_DM_FIELD_GENERATOR: Allow to generate different kind of RF
[all …]
/OK3568_Linux_fs/kernel/Documentation/admin-guide/cgroup-v1/
H A Ddevices.rst24 An entry is added using devices.allow, and removed using
27 echo 'c 1:3 mr' > /sys/fs/cgroup/1/devices.allow
36 echo a > /sys/fs/cgroup/1/devices.allow
74 A allow "b 8:* rwm", "c 116:1 rw"
103 # echo "c *:3 rwm" >A/devices.allow
113 # echo "c 2:3 rwm" >B/devices.allow
114 # echo "c 50:3 r" >B/devices.allow
118 # echo "c *:3 rwm" >B/devices.allow
120 Allowing or denying all by writing 'a' to devices.allow or devices.deny will
126 device cgroups is implemented internally using a behavior (ALLOW, DENY) and a
/OK3568_Linux_fs/kernel/lib/
H A DKconfig.kgdb83 bool "KGDB: Allow debugging with traps in notifiers"
88 exception handler which will allow kgdb to step through a
108 0x0002 - allow arbitrary reads from memory and symbol lookup
109 0x0004 - allow arbitrary writes to memory
110 0x0008 - allow current register state to be inspected
111 0x0010 - allow current register state to be modified
112 0x0020 - allow passive inspection (backtrace, process list, lsmod)
113 0x0040 - allow flow control management (breakpoint, single step)
115 0x0100 - allow machine to be rebooted
/OK3568_Linux_fs/kernel/include/trace/hooks/
H A Dmmc_core.h31 TP_PROTO(struct mmc_host *host, int err, bool *allow),
32 TP_ARGS(host, err, allow));
43 TP_PROTO(struct sdhci_host *host, bool *allow),
44 TP_ARGS(host, allow));
46 TP_PROTO(struct mmc_host *host, bool *allow),
47 TP_ARGS(host, allow));
/OK3568_Linux_fs/external/rkwifibt/drivers/rtl8852bs/phl/hal_g6/mac/
H A Derrors.h113 #define MACIOERRPWR 93 /* IO not allow when power not on */
114 #define MACIOERRSERL1 94 /* IO not allow when SER Lv1 */
115 #define MACIOERRLPS 95 /* IO not allow when LPS */
116 #define MACIOERRDMAC 96 /* IO not allow when dmac not en */
117 #define MACIOERRCMAC0 97 /* IO not allow when cmac0 not en */
118 #define MACIOERRCMAC1 98 /* IO not allow when cmac1 not en */
119 #define MACIOERRBB0 99 /* IO not allow when bb0 not en */
120 #define MACIOERRBB1 100 /* IO not allow when bb1 not en */
121 #define MACIOERRRF 101 /* IO not allow when rf not en */
122 #define MACIOERRIND 102 /* IO not allow when indirect access */
[all …]
/OK3568_Linux_fs/external/rkwifibt/drivers/rtl8852be/phl/hal_g6/mac/
H A Derrors.h113 #define MACIOERRPWR 93 /* IO not allow when power not on */
114 #define MACIOERRSERL1 94 /* IO not allow when SER Lv1 */
115 #define MACIOERRLPS 95 /* IO not allow when LPS */
116 #define MACIOERRDMAC 96 /* IO not allow when dmac not en */
117 #define MACIOERRCMAC0 97 /* IO not allow when cmac0 not en */
118 #define MACIOERRCMAC1 98 /* IO not allow when cmac1 not en */
119 #define MACIOERRBB0 99 /* IO not allow when bb0 not en */
120 #define MACIOERRBB1 100 /* IO not allow when bb1 not en */
121 #define MACIOERRRF 101 /* IO not allow when rf not en */
122 #define MACIOERRIND 102 /* IO not allow when indirect access */
[all …]
/OK3568_Linux_fs/yocto/poky/bitbake/
H A DChangeLog6 - Allow operations other than assignment on flag variables
37 - Allow the -b -e option combination to take regular expressions
62 - Add MULTI_PROVIDER_WHITELIST variable to allow known safe multiple providers to be listed
75 - Allow multiple options for deptask flag
83 - Disable task number acceleration since it can allow the tasks to run
113 - Make fetcher timestamp updating non-fatal when permissions don't allow
145 - Allow to checkout CVS by Date and Time. Just add HHmm to the SRCDATE.
168 - Export more variables to the fetcher commands to allow ssh checkouts and checkouts through
170 - Also allow user and pswd options in SRC_URIs globally (from Poky)
194 - Allow debug domains to be specified on the commandline (-l)
[all …]
/OK3568_Linux_fs/debian/overlay/etc/init.d/
H A Drockchip.sh23 …[ -e /usr/lib/arm-linux-gnueabihf/ ] && apt install -fy --allow-downgrades /camera_engine_$ISP*.deb
29 [ -e /usr/lib/aarch64-linux-gnu/ ] && apt install -fy --allow-downgrades /camera_engine_$ISP*.deb
35 [ -e /usr/lib/aarch64-linux-gnu/ ] && apt install -fy --allow-downgrades /camera_engine_$ISP*.deb
41 [ -e /usr/lib/aarch64-linux-gnu/ ] && apt install -fy --allow-downgrades /camera_engine_$ISP*.deb
47 …[ -e /usr/lib/arm-linux-gnueabihf/ ] && apt install -fy --allow-downgrades /camera_engine_$ISP*.deb
53 [ -e /usr/lib/aarch64-linux-gnu/ ] && apt install -fy --allow-downgrades /camera_engine_$ISP*.deb
59 [ -e /usr/lib/aarch64-linux-gnu/ ] && apt install -fy --allow-downgrades /camera_engine_$ISP*.deb
65 [ -e /usr/lib/aarch64-linux-gnu/ ] && apt install -fy --allow-downgrades /camera_engine_$ISP*.deb
72 apt install -fy --allow-downgrades /libmali-*$MALI*-x11*.deb
/OK3568_Linux_fs/kernel/drivers/net/wireless/ath/
H A Dhw.c97 * allow = (IFRAME-01 & bssid_mask) == (bssid_mask & MAC) ? 1 : 0;
98 * --> allow = (0110 & 0010) == (0010 & 0001) ? 1 : 0;
99 * --> allow = (0010) == 0000 ? 1 : 0;
100 * --> allow = 0
104 * IFRAME-02: 0001 (we should allow)
106 * allow = (IFRAME-02 & bssid_mask) == (bssid_mask & MAC) ? 1 : 0;
107 * --> allow = (0001 & 0010) == (0010 & 0001) ? 1 :0;
108 * --> allow = (0000) == (0000)
109 * --> allow = 1
/OK3568_Linux_fs/kernel/samples/seccomp/
H A Dbpf-fancy.c38 SYSCALL(__NR_exit, ALLOW), in main()
39 SYSCALL(__NR_exit_group, ALLOW), in main()
51 ALLOW, in main()
68 JLT(sizeof(msg1), ALLOW), in main()
73 JLT(sizeof(msg2), ALLOW), in main()
78 JLT(sizeof(buf), ALLOW), in main()
/OK3568_Linux_fs/yocto/poky/meta/recipes-support/user-creation/files/
H A Dsystem-xuser.conf5 <allow send_destination="net.connman"/>
6 <allow send_destination="net.connman.vpn"/>
7 <allow send_destination="org.ofono"/>
8 <allow send_destination="org.bluez"/>
/OK3568_Linux_fs/kernel/fs/nfsd/
H A Dnfs4acl.c145 /* allocate for worst case: one (deny, allow) pair each: */ in nfsd4_get_nfs4_acl()
296 /* In the case of groups, we apply allow ACEs first, then deny ACEs, in _posix_to_nfsv4_one()
299 /* allow ACEs */ in _posix_to_nfsv4_one()
422 u32 allow; member
487 state->mask.allow |= astate->allow; in add_to_mask()
521 low_mode_from_nfs4(state->owner.allow, &pace->e_perm, flags); in posix_state_to_acl()
526 low_mode_from_nfs4(state->users->aces[i].perms.allow, in posix_state_to_acl()
534 low_mode_from_nfs4(state->group.allow, &pace->e_perm, flags); in posix_state_to_acl()
540 low_mode_from_nfs4(state->groups->aces[i].perms.allow, in posix_state_to_acl()
549 low_mode_from_nfs4(state->mask.allow, &pace->e_perm, flags); in posix_state_to_acl()
[all …]
/OK3568_Linux_fs/yocto/poky/meta/recipes-devtools/distcc/files/
H A Ddistcc42 ALLOW=""
45 ALLOW="$ALLOW --allow $net"
64 --exec $DAEMON -- $DAEMON_ARGS $ALLOW ||
96 --exec $DAEMON -- $DAEMON_ARGS $ALLOW ||
/OK3568_Linux_fs/kernel/tools/testing/selftests/bpf/
H A Dtest_sysctl.c59 .descr = "sysctl:read allow all",
92 /* else return ALLOW; */
113 /* else return ALLOW; */
169 /* return ALLOW; */
196 /* return ALLOW; */
254 /* return ALLOW; */
296 /* return ALLOW; */
351 /* return ALLOW; */
400 /* return ALLOW; */
442 /* return ALLOW; */
[all …]

12345678910>>...229