| /OK3568_Linux_fs/yocto/poky/meta/files/common-licenses/ |
| H A D | CAL-1.0 | 28 License requires that You provide that third party all the permissions 33 The full permissions, conditions, and other terms are laid out below. 70 ## 3. Permissions 71 ### 3.1. Permissions Granted 83 distributed by Licensor. ### 3.2. Limitations on Permissions Granted 85 The following limitations apply to the permissions granted in section 125 permissions granted to You under this License and for at least one 166 to the Source Code, You cannot use the permissions given under this 180 Throughout any period in which You exercise any of the permissions 200 independently exercise the permissions granted under this License. You [all …]
|
| H A D | CAL-1.0-Combined-Work-Exception | 28 License requires that You provide that third party all the permissions 33 The full permissions, conditions, and other terms are laid out below. 70 ## 3. Permissions 71 ### 3.1. Permissions Granted 83 distributed by Licensor. ### 3.2. Limitations on Permissions Granted 85 The following limitations apply to the permissions granted in section 125 permissions granted to You under this License and for at least one 166 to the Source Code, You cannot use the permissions given under this 180 Throughout any period in which You exercise any of the permissions 200 independently exercise the permissions granted under this License. You [all …]
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-support/attr/acl/ |
| H A D | 0001-test-patch-out-failing-bits.patch | 13 test/root/permissions.test | 13 ------------- 16 diff --git a/test/root/permissions.test b/test/root/permissions.test 18 --- a/test/root/permissions.test 19 +++ b/test/root/permissions.test 39 Change the owning group. The other permissions should now grant user 52 Verify that permissions in separate matching ACL entries do not
|
| /OK3568_Linux_fs/external/rknpu2/examples/rknn_yolov5_android_apk_demo/app/src/main/java/com/rockchip/gpadc/demo/ |
| H A D | MainActivity.java | 21 String[] permissions = new String[]{ field in MainActivity 40 int i = ContextCompat.checkSelfPermission(this, permissions[0]); in checkPermissions() 41 int l = ContextCompat.checkSelfPermission(this, permissions[1]); in checkPermissions() 42 int m = ContextCompat.checkSelfPermission(this, permissions[2]); in checkPermissions() 62 ActivityCompat.requestPermissions(this, permissions, 321); in startRequestPermission() 65 …public void onRequestPermissionsResult(int requestCode, @NonNull String[] permissions, @NonNull in… in onRequestPermissionsResult() argument 66 super.onRequestPermissionsResult(requestCode, permissions, grantResults); in onRequestPermissionsResult()
|
| /OK3568_Linux_fs/kernel/Documentation/filesystems/ |
| H A D | adfs.rst | 39 ownmask=nnn The permission mask for ADFS 'owner' permissions 41 othmask=nnn The permission mask for ADFS 'other' permissions 48 Mapping of ADFS permissions to Linux permissions 51 ADFS permissions consist of the following: 68 Possible owner mode permissions -> -rwx------ 74 Possible other mode permissions -> ----rwxrwx 77 not a UnixExec filetype, then the permissions will be:: 93 desire the permissions should be under Linux.
|
| H A D | isofs.rst | 39 mode=xxx Sets the permissions on files to xxx unless Rock Ridge 40 extensions set the permissions otherwise 41 dmode=xxx Sets the permissions on directories to xxx unless Rock Ridge 42 extensions set the permissions otherwise 43 overriderockperm Set permissions on files and directories according to
|
| /OK3568_Linux_fs/kernel/include/linux/ |
| H A D | lsm_hooks.h | 41 * new program. This hook may also optionally check permissions 54 * hook may also optionally check permissions (e.g. for transitions 152 * Mount this @sb if allowed by permissions. 292 * Check permissions to create a new directory in the existing directory 300 * Check permissions to create a new directory in the existing directory 320 * Check permissions when creating a special file (or a socket or a fifo 330 * Check permissions when creating a file. Note that this hook is called 370 * Check permissions before setting a watch on events as defined by @mask, 500 * Check file permissions before accessing an open file. This hook is 503 * operations, e.g. to revalidate permissions on use to support privilege [all …]
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-support/boost/boost/ |
| H A D | de657e01635306085488290ea83de541ec393f8b.patch | 13 include/boost/interprocess/permissions.hpp | 4 ++++ 16 diff --git a/boost/interprocess/permissions.hpp b/boost/interprocess/permissions.hpp 18 --- a/boost/interprocess/permissions.hpp 19 +++ b/boost/interprocess/permissions.hpp
|
| /OK3568_Linux_fs/kernel/tools/testing/selftests/powerpc/mm/ |
| H A D | pkey_exec_prot.c | 59 /* Restore permissions in order to continue */ in segv_handler() 63 sigsafe_err("failed to set access permissions\n"); in segv_handler() 82 * permissions. in segv_handler() 85 sigsafe_err("failed to set execute permissions\n"); in segv_handler() 180 printf("read from %p, pkey permissions are %s\n", fault_addr, in test() 197 printf("write to %p, pkey permissions are %s\n", fault_addr, in test() 218 printf("read from %p, pkey permissions are %s\n", fault_addr, in test() 235 printf("write to %p, pkey permissions are %s\n", fault_addr, in test() 271 printf("execute at %p, pkey permissions are %s\n", fault_addr, in test()
|
| /OK3568_Linux_fs/kernel/security/selinux/ss/ |
| H A D | avtab.h | 38 /* extended permissions */ 51 * For operations that require more than the 32 permissions provided by the avc 52 * extended permissions may be used to provide 256 bits of permissions. 63 * specifies which permissions are included. 66 /* 256 bits of permissions */
|
| H A D | constraint.h | 4 * order for one or more permissions to be granted. 58 u32 permissions; /* constrained permissions */ member 59 struct constraint_expr *expr; /* constraint on permissions */
|
| /OK3568_Linux_fs/kernel/security/keys/ |
| H A D | permission.c | 24 * permissions bits or the LSM check. 53 /* use the second 8-bits of permissions for keys the caller owns */ in key_task_permission() 59 /* use the third 8-bits of permissions for keys the caller has a group in key_task_permission() 79 /* use the top 8-bits of permissions for keys the caller possesses in key_task_permission() 80 * - possessor permissions are additive with other permissions in key_task_permission()
|
| /OK3568_Linux_fs/kernel/security/selinux/ |
| H A D | avc.c | 560 * (@ssid, @tsid), interpreting the permissions 611 * @xp_node: resulting extended permissions 858 * then we must not add permissions to a cache entry in avc_update_node() 861 * will find the permissions already granted in the cache entry in avc_update_node() 977 * avc_ss_reset - Flush the cache and revalidate migrated permissions. 1042 * The avc extended permissions logic adds an additional 256 bits of 1043 * permissions to an avc node when extended permissions for that node are 1044 * specified in the avtab. If the additional 256 permissions is not adequate, 1077 /* if extended permissions are not defined, only consider av_decision */ in avc_has_extended_perms() 1126 * avc_has_perm_noaudit - Check permissions but perform no auditing. [all …]
|
| /OK3568_Linux_fs/kernel/security/apparmor/ |
| H A D | file.c | 78 * @perms: the permissions computed for the request (NOT NULL) 80 * @request: permissions requested 121 /* only report permissions that were denied */ in aa_audit_file() 218 * splits the permissions from the dfa. This mapping can be in aa_compute_fperms() 251 * @perms: Returns - the permissions found when matching @name 303 * aa_path_perm - do permissions check & audit for @path 306 * @path: path to check permissions of (NOT NULL) 308 * @request: requested permissions 341 * test target x permissions are equal OR a subset of link x permissions 343 * a subset of permissions that the target has. [all …]
|
| /OK3568_Linux_fs/kernel/arch/arm64/include/asm/ |
| H A D | kvm_pgtable.h | 90 * enum kvm_pgtable_prot - Page-table permissions and attributes. 178 * @prot: Permissions and attributes for the mapping. 242 * @prot: Permissions and attributes for the mapping. 255 * permissions. Instead, the vCPU will exit one more time from guest if still 256 * needed and then go through the path of relaxing permissions. 318 * calling this function to ensure that the updated permissions are visible 350 * calling this function to ensure that the updated permissions are visible 358 * kvm_pgtable_stage2_relax_perms() - Relax the permissions enforced by a 362 * @prot: Additional permissions to grant for the mapping. 367 * relax the permissions in that entry according to the read, write and [all …]
|
| /OK3568_Linux_fs/kernel/security/selinux/include/ |
| H A D | avc.h | 79 * actual permissions that were denied. As an example lets in avc_audit_required() 106 * avc_audit - Audit the granting or denial of permissions. 110 * @requested: requested permissions 116 * Audit the granting or denial of permissions in accordance 146 #define AVC_EXTENDED_PERMS 2 /* update extended permissions */
|
| /OK3568_Linux_fs/yocto/meta-rockchip/recipes-core/udev/ |
| H A D | udev-conf-rockchip.bb | 9 file://99-rockchip-permissions.rules \ 16 …tall -m 0644 ${WORKDIR}/99-rockchip-permissions.rules ${D}${nonarch_base_libdir}/udev/rules.d/99-r…
|
| /OK3568_Linux_fs/kernel/ipc/ |
| H A D | util.c | 268 * Add an entry 'new' to the ipc ids idr. The permissions object is 350 * ipc_check_perms - check security and permissions for an ipc object 509 * ipcperms - check ipc permissions 514 * Check user, group, other permissions for access 546 * kernel_to_ipc64_perm - convert kernel ipc permissions to user 547 * @in: kernel permissions 548 * @out: new style ipc permissions 550 * Turn the kernel object @in into a set of permissions descriptions 565 * ipc64_perm_to_ipc_perm - convert new ipc permissions to old 566 * @in: new style ipc permissions [all …]
|
| /OK3568_Linux_fs/buildroot/docs/manual/ |
| H A D | customize-device-permission-tables.txt | 5 ==== Setting file permissions and ownership and adding custom devices nodes 7 Sometimes it is needed to set specific permissions or ownership on files 27 It should be noted that if the specific permissions or device nodes are
|
| /OK3568_Linux_fs/kernel/arch/x86/kernel/ |
| H A D | ioport.c | 63 * This changes the io permissions bitmap in the current task. 84 /* No point to allocate a bitmap just to clear permissions */ in ksys_ioperm() 111 * permissions are dropped has the pointer set up. in ksys_ioperm() 135 /* All permissions dropped? */ in ksys_ioperm() 168 * Setting IOPL to level 0-2 is disabling I/O permissions. Level 3
|
| /OK3568_Linux_fs/kernel/drivers/staging/gasket/ |
| H A D | gasket_core.h | 179 /* Describe the offset, size, and permissions for a device bar. */ 191 /* The permissions for this bar. (Should be VM_WRITE/VM_READ/VM_EXEC, 195 ulong permissions; member 208 /* Describes the offset, size, and permissions for a coherent buffer. */ 213 /* The permissions for this bar. (Should be VM_WRITE/VM_READ/VM_EXEC, 217 ulong permissions; member 235 /* Description of Gasket-specific permissions in the mmap field. */ 309 /* Type of the ioctl permissions check callback. See below. */ 455 * ioctl_permissions_cb: Check permissions for generic ioctls. 563 * Get the ioctl permissions callback.
|
| /OK3568_Linux_fs/kernel/fs/coda/ |
| H A D | coda_fs_i.h | 28 unsigned int c_cached_epoch; /* epoch for cached permissions */ 29 kuid_t c_uid; /* fsuid for cached permissions */ 30 unsigned int c_cached_perm; /* cached access permissions */
|
| /OK3568_Linux_fs/kernel/fs/hfsplus/ |
| H A D | inode.c | 504 hfsplus_get_perms(inode, &folder->permissions, 1); in hfsplus_cat_read_inode() 528 hfsplus_get_perms(inode, &file->permissions, 0); in hfsplus_cat_read_inode() 531 if (file->permissions.dev) in hfsplus_cat_read_inode() 533 be32_to_cpu(file->permissions.dev)); in hfsplus_cat_read_inode() 543 be32_to_cpu(file->permissions.dev)); in hfsplus_cat_read_inode() 584 hfsplus_cat_set_perms(inode, &folder->permissions); in hfsplus_cat_write_inode() 610 hfsplus_cat_set_perms(inode, &file->permissions); in hfsplus_cat_write_inode() 612 (file->permissions.rootflags | in hfsplus_cat_write_inode() 613 file->permissions.userflags)) in hfsplus_cat_write_inode()
|
| /OK3568_Linux_fs/yocto/poky/meta/files/ |
| H A D | fs-perms.txt | 1 # This file contains a list of files and directories with known permissions. 2 # It is used by the packaging class to ensure that the permissions, owners and 58 # Special permissions from base-files
|
| H A D | fs-perms-persistent-log.txt | 1 # This file contains a list of files and directories with known permissions. 2 # It is used by the packaging class to ensure that the permissions, owners and 57 # Special permissions from base-files
|