Home
last modified time | relevance | path

Searched full:permissions (Results 1 – 25 of 4223) sorted by relevance

12345678910>>...169

/OK3568_Linux_fs/yocto/poky/meta/files/common-licenses/
H A DCAL-1.028 License requires that You provide that third party all the permissions
33 The full permissions, conditions, and other terms are laid out below.
70 ## 3. Permissions
71 ### 3.1. Permissions Granted
83 distributed by Licensor. ### 3.2. Limitations on Permissions Granted
85 The following limitations apply to the permissions granted in section
125 permissions granted to You under this License and for at least one
166 to the Source Code, You cannot use the permissions given under this
180 Throughout any period in which You exercise any of the permissions
200 independently exercise the permissions granted under this License. You
[all …]
H A DCAL-1.0-Combined-Work-Exception28 License requires that You provide that third party all the permissions
33 The full permissions, conditions, and other terms are laid out below.
70 ## 3. Permissions
71 ### 3.1. Permissions Granted
83 distributed by Licensor. ### 3.2. Limitations on Permissions Granted
85 The following limitations apply to the permissions granted in section
125 permissions granted to You under this License and for at least one
166 to the Source Code, You cannot use the permissions given under this
180 Throughout any period in which You exercise any of the permissions
200 independently exercise the permissions granted under this License. You
[all …]
/OK3568_Linux_fs/yocto/poky/meta/recipes-support/attr/acl/
H A D0001-test-patch-out-failing-bits.patch13 test/root/permissions.test | 13 -------------
16 diff --git a/test/root/permissions.test b/test/root/permissions.test
18 --- a/test/root/permissions.test
19 +++ b/test/root/permissions.test
39 Change the owning group. The other permissions should now grant user
52 Verify that permissions in separate matching ACL entries do not
/OK3568_Linux_fs/external/rknpu2/examples/rknn_yolov5_android_apk_demo/app/src/main/java/com/rockchip/gpadc/demo/
H A DMainActivity.java21 String[] permissions = new String[]{ field in MainActivity
40 int i = ContextCompat.checkSelfPermission(this, permissions[0]); in checkPermissions()
41 int l = ContextCompat.checkSelfPermission(this, permissions[1]); in checkPermissions()
42 int m = ContextCompat.checkSelfPermission(this, permissions[2]); in checkPermissions()
62 ActivityCompat.requestPermissions(this, permissions, 321); in startRequestPermission()
65 …public void onRequestPermissionsResult(int requestCode, @NonNull String[] permissions, @NonNull in… in onRequestPermissionsResult() argument
66 super.onRequestPermissionsResult(requestCode, permissions, grantResults); in onRequestPermissionsResult()
/OK3568_Linux_fs/kernel/Documentation/filesystems/
H A Dadfs.rst39 ownmask=nnn The permission mask for ADFS 'owner' permissions
41 othmask=nnn The permission mask for ADFS 'other' permissions
48 Mapping of ADFS permissions to Linux permissions
51 ADFS permissions consist of the following:
68 Possible owner mode permissions -> -rwx------
74 Possible other mode permissions -> ----rwxrwx
77 not a UnixExec filetype, then the permissions will be::
93 desire the permissions should be under Linux.
H A Disofs.rst39 mode=xxx Sets the permissions on files to xxx unless Rock Ridge
40 extensions set the permissions otherwise
41 dmode=xxx Sets the permissions on directories to xxx unless Rock Ridge
42 extensions set the permissions otherwise
43 overriderockperm Set permissions on files and directories according to
/OK3568_Linux_fs/kernel/include/linux/
H A Dlsm_hooks.h41 * new program. This hook may also optionally check permissions
54 * hook may also optionally check permissions (e.g. for transitions
152 * Mount this @sb if allowed by permissions.
292 * Check permissions to create a new directory in the existing directory
300 * Check permissions to create a new directory in the existing directory
320 * Check permissions when creating a special file (or a socket or a fifo
330 * Check permissions when creating a file. Note that this hook is called
370 * Check permissions before setting a watch on events as defined by @mask,
500 * Check file permissions before accessing an open file. This hook is
503 * operations, e.g. to revalidate permissions on use to support privilege
[all …]
/OK3568_Linux_fs/yocto/poky/meta/recipes-support/boost/boost/
H A Dde657e01635306085488290ea83de541ec393f8b.patch13 include/boost/interprocess/permissions.hpp | 4 ++++
16 diff --git a/boost/interprocess/permissions.hpp b/boost/interprocess/permissions.hpp
18 --- a/boost/interprocess/permissions.hpp
19 +++ b/boost/interprocess/permissions.hpp
/OK3568_Linux_fs/kernel/tools/testing/selftests/powerpc/mm/
H A Dpkey_exec_prot.c59 /* Restore permissions in order to continue */ in segv_handler()
63 sigsafe_err("failed to set access permissions\n"); in segv_handler()
82 * permissions. in segv_handler()
85 sigsafe_err("failed to set execute permissions\n"); in segv_handler()
180 printf("read from %p, pkey permissions are %s\n", fault_addr, in test()
197 printf("write to %p, pkey permissions are %s\n", fault_addr, in test()
218 printf("read from %p, pkey permissions are %s\n", fault_addr, in test()
235 printf("write to %p, pkey permissions are %s\n", fault_addr, in test()
271 printf("execute at %p, pkey permissions are %s\n", fault_addr, in test()
/OK3568_Linux_fs/kernel/security/selinux/ss/
H A Davtab.h38 /* extended permissions */
51 * For operations that require more than the 32 permissions provided by the avc
52 * extended permissions may be used to provide 256 bits of permissions.
63 * specifies which permissions are included.
66 /* 256 bits of permissions */
H A Dconstraint.h4 * order for one or more permissions to be granted.
58 u32 permissions; /* constrained permissions */ member
59 struct constraint_expr *expr; /* constraint on permissions */
/OK3568_Linux_fs/kernel/security/keys/
H A Dpermission.c24 * permissions bits or the LSM check.
53 /* use the second 8-bits of permissions for keys the caller owns */ in key_task_permission()
59 /* use the third 8-bits of permissions for keys the caller has a group in key_task_permission()
79 /* use the top 8-bits of permissions for keys the caller possesses in key_task_permission()
80 * - possessor permissions are additive with other permissions in key_task_permission()
/OK3568_Linux_fs/kernel/security/selinux/
H A Davc.c560 * (@ssid, @tsid), interpreting the permissions
611 * @xp_node: resulting extended permissions
858 * then we must not add permissions to a cache entry in avc_update_node()
861 * will find the permissions already granted in the cache entry in avc_update_node()
977 * avc_ss_reset - Flush the cache and revalidate migrated permissions.
1042 * The avc extended permissions logic adds an additional 256 bits of
1043 * permissions to an avc node when extended permissions for that node are
1044 * specified in the avtab. If the additional 256 permissions is not adequate,
1077 /* if extended permissions are not defined, only consider av_decision */ in avc_has_extended_perms()
1126 * avc_has_perm_noaudit - Check permissions but perform no auditing.
[all …]
/OK3568_Linux_fs/kernel/security/apparmor/
H A Dfile.c78 * @perms: the permissions computed for the request (NOT NULL)
80 * @request: permissions requested
121 /* only report permissions that were denied */ in aa_audit_file()
218 * splits the permissions from the dfa. This mapping can be in aa_compute_fperms()
251 * @perms: Returns - the permissions found when matching @name
303 * aa_path_perm - do permissions check & audit for @path
306 * @path: path to check permissions of (NOT NULL)
308 * @request: requested permissions
341 * test target x permissions are equal OR a subset of link x permissions
343 * a subset of permissions that the target has.
[all …]
/OK3568_Linux_fs/kernel/arch/arm64/include/asm/
H A Dkvm_pgtable.h90 * enum kvm_pgtable_prot - Page-table permissions and attributes.
178 * @prot: Permissions and attributes for the mapping.
242 * @prot: Permissions and attributes for the mapping.
255 * permissions. Instead, the vCPU will exit one more time from guest if still
256 * needed and then go through the path of relaxing permissions.
318 * calling this function to ensure that the updated permissions are visible
350 * calling this function to ensure that the updated permissions are visible
358 * kvm_pgtable_stage2_relax_perms() - Relax the permissions enforced by a
362 * @prot: Additional permissions to grant for the mapping.
367 * relax the permissions in that entry according to the read, write and
[all …]
/OK3568_Linux_fs/kernel/security/selinux/include/
H A Davc.h79 * actual permissions that were denied. As an example lets in avc_audit_required()
106 * avc_audit - Audit the granting or denial of permissions.
110 * @requested: requested permissions
116 * Audit the granting or denial of permissions in accordance
146 #define AVC_EXTENDED_PERMS 2 /* update extended permissions */
/OK3568_Linux_fs/yocto/meta-rockchip/recipes-core/udev/
H A Dudev-conf-rockchip.bb9 file://99-rockchip-permissions.rules \
16 …tall -m 0644 ${WORKDIR}/99-rockchip-permissions.rules ${D}${nonarch_base_libdir}/udev/rules.d/99-r…
/OK3568_Linux_fs/kernel/ipc/
H A Dutil.c268 * Add an entry 'new' to the ipc ids idr. The permissions object is
350 * ipc_check_perms - check security and permissions for an ipc object
509 * ipcperms - check ipc permissions
514 * Check user, group, other permissions for access
546 * kernel_to_ipc64_perm - convert kernel ipc permissions to user
547 * @in: kernel permissions
548 * @out: new style ipc permissions
550 * Turn the kernel object @in into a set of permissions descriptions
565 * ipc64_perm_to_ipc_perm - convert new ipc permissions to old
566 * @in: new style ipc permissions
[all …]
/OK3568_Linux_fs/buildroot/docs/manual/
H A Dcustomize-device-permission-tables.txt5 ==== Setting file permissions and ownership and adding custom devices nodes
7 Sometimes it is needed to set specific permissions or ownership on files
27 It should be noted that if the specific permissions or device nodes are
/OK3568_Linux_fs/kernel/arch/x86/kernel/
H A Dioport.c63 * This changes the io permissions bitmap in the current task.
84 /* No point to allocate a bitmap just to clear permissions */ in ksys_ioperm()
111 * permissions are dropped has the pointer set up. in ksys_ioperm()
135 /* All permissions dropped? */ in ksys_ioperm()
168 * Setting IOPL to level 0-2 is disabling I/O permissions. Level 3
/OK3568_Linux_fs/kernel/drivers/staging/gasket/
H A Dgasket_core.h179 /* Describe the offset, size, and permissions for a device bar. */
191 /* The permissions for this bar. (Should be VM_WRITE/VM_READ/VM_EXEC,
195 ulong permissions; member
208 /* Describes the offset, size, and permissions for a coherent buffer. */
213 /* The permissions for this bar. (Should be VM_WRITE/VM_READ/VM_EXEC,
217 ulong permissions; member
235 /* Description of Gasket-specific permissions in the mmap field. */
309 /* Type of the ioctl permissions check callback. See below. */
455 * ioctl_permissions_cb: Check permissions for generic ioctls.
563 * Get the ioctl permissions callback.
/OK3568_Linux_fs/kernel/fs/coda/
H A Dcoda_fs_i.h28 unsigned int c_cached_epoch; /* epoch for cached permissions */
29 kuid_t c_uid; /* fsuid for cached permissions */
30 unsigned int c_cached_perm; /* cached access permissions */
/OK3568_Linux_fs/kernel/fs/hfsplus/
H A Dinode.c504 hfsplus_get_perms(inode, &folder->permissions, 1); in hfsplus_cat_read_inode()
528 hfsplus_get_perms(inode, &file->permissions, 0); in hfsplus_cat_read_inode()
531 if (file->permissions.dev) in hfsplus_cat_read_inode()
533 be32_to_cpu(file->permissions.dev)); in hfsplus_cat_read_inode()
543 be32_to_cpu(file->permissions.dev)); in hfsplus_cat_read_inode()
584 hfsplus_cat_set_perms(inode, &folder->permissions); in hfsplus_cat_write_inode()
610 hfsplus_cat_set_perms(inode, &file->permissions); in hfsplus_cat_write_inode()
612 (file->permissions.rootflags | in hfsplus_cat_write_inode()
613 file->permissions.userflags)) in hfsplus_cat_write_inode()
/OK3568_Linux_fs/yocto/poky/meta/files/
H A Dfs-perms.txt1 # This file contains a list of files and directories with known permissions.
2 # It is used by the packaging class to ensure that the permissions, owners and
58 # Special permissions from base-files
H A Dfs-perms-persistent-log.txt1 # This file contains a list of files and directories with known permissions.
2 # It is used by the packaging class to ensure that the permissions, owners and
57 # Special permissions from base-files

12345678910>>...169