Home
last modified time | relevance | path

Searched refs:allow (Results 1 – 25 of 1581) sorted by relevance

12345678910>>...64

/OK3568_Linux_fs/kernel/security/apparmor/
H A Dlib.c24 struct aa_perms allperms = { .allow = ALL_PERMS_MASK,
329 .allow = dfa_user_allow(dfa, state), in aa_compute_perms()
337 perms->allow |= map_other(dfa_other_allow(dfa, state)); in aa_compute_perms()
351 accum->allow &= addend->allow & ~addend->deny; in aa_perms_accum_raw()
352 accum->audit |= addend->audit & addend->allow; in aa_perms_accum_raw()
353 accum->quiet &= addend->quiet & ~addend->allow; in aa_perms_accum_raw()
354 accum->kill |= addend->kill & ~addend->allow; in aa_perms_accum_raw()
355 accum->stop |= addend->stop & ~addend->allow; in aa_perms_accum_raw()
356 accum->complain |= addend->complain & ~addend->allow & ~addend->deny; in aa_perms_accum_raw()
357 accum->cond |= addend->cond & ~addend->allow & ~addend->deny; in aa_perms_accum_raw()
[all …]
H A Dfile.c122 aad(&sa)->request = aad(&sa)->request & ~perms->allow; in aa_audit_file()
138 aad(&sa)->denied = aad(&sa)->request & ~perms->allow; in aa_audit_file()
224 perms.allow = map_old_perms(dfa_user_allow(dfa, state)); in aa_compute_fperms()
229 perms.allow = map_old_perms(dfa_other_allow(dfa, state)); in aa_compute_fperms()
234 perms.allow |= AA_MAY_GETATTR; in aa_compute_fperms()
238 perms.allow |= AA_MAY_CHANGE_PROFILE; in aa_compute_fperms()
240 perms.allow |= AA_MAY_ONEXEC; in aa_compute_fperms()
275 if (request & ~perms->allow) in __aa_path_perm()
384 if (!(lperms.allow & AA_MAY_LINK)) in profile_path_link()
398 if (!(perms.allow & AA_MAY_LINK)) { in profile_path_link()
[all …]
/OK3568_Linux_fs/kernel/tools/scripts/
H A DMakefile.include47 define allow-override
54 $(call allow-override,CC,clang)
55 $(call allow-override,AR,llvm-ar)
56 $(call allow-override,LD,ld.lld)
57 $(call allow-override,CXX,clang++)
58 $(call allow-override,STRIP,llvm-strip)
61 $(call allow-override,CC,$(CROSS_COMPILE)gcc)
62 $(call allow-override,AR,$(CROSS_COMPILE)ar)
63 $(call allow-override,LD,$(CROSS_COMPILE)ld)
64 $(call allow-override,CXX,$(CROSS_COMPILE)g++)
[all …]
/OK3568_Linux_fs/kernel/include/trace/hooks/
H A Dmmc_core.h31 TP_PROTO(struct mmc_host *host, int err, bool *allow),
32 TP_ARGS(host, err, allow));
43 TP_PROTO(struct sdhci_host *host, bool *allow),
44 TP_ARGS(host, allow));
46 TP_PROTO(struct mmc_host *host, bool *allow),
47 TP_ARGS(host, allow));
H A Dpm_domain.h21 TP_PROTO(struct generic_pm_domain *genpd, uint32_t idx, bool *allow),
22 TP_ARGS(genpd, idx, allow))
/OK3568_Linux_fs/yocto/poky/meta/recipes-support/user-creation/files/
H A Dsystem-xuser.conf5 <allow send_destination="net.connman"/>
6 <allow send_destination="net.connman.vpn"/>
7 <allow send_destination="org.ofono"/>
8 <allow send_destination="org.bluez"/>
/OK3568_Linux_fs/debian/overlay/etc/init.d/
H A Drockchip.sh23 …[ -e /usr/lib/arm-linux-gnueabihf/ ] && apt install -fy --allow-downgrades /camera_engine_$ISP*.deb
29 [ -e /usr/lib/aarch64-linux-gnu/ ] && apt install -fy --allow-downgrades /camera_engine_$ISP*.deb
35 [ -e /usr/lib/aarch64-linux-gnu/ ] && apt install -fy --allow-downgrades /camera_engine_$ISP*.deb
41 [ -e /usr/lib/aarch64-linux-gnu/ ] && apt install -fy --allow-downgrades /camera_engine_$ISP*.deb
47 …[ -e /usr/lib/arm-linux-gnueabihf/ ] && apt install -fy --allow-downgrades /camera_engine_$ISP*.deb
53 [ -e /usr/lib/aarch64-linux-gnu/ ] && apt install -fy --allow-downgrades /camera_engine_$ISP*.deb
59 [ -e /usr/lib/aarch64-linux-gnu/ ] && apt install -fy --allow-downgrades /camera_engine_$ISP*.deb
65 [ -e /usr/lib/aarch64-linux-gnu/ ] && apt install -fy --allow-downgrades /camera_engine_$ISP*.deb
72 apt install -fy --allow-downgrades /libmali-*$MALI*-x11*.deb
/OK3568_Linux_fs/buildroot/board/forlinx/ok3568/fs-overlay/etc/dbus-1/system.d/
H A Dobexd.conf6 <allow own="org.bluez.obex"/>
7 <allow send_destination="org.bluez.obex"/>
10 <allow send_destination="org.bluez.obex"/>
13 <allow send_destination="org.bluez.obex"/>
/OK3568_Linux_fs/kernel/drivers/misc/cb710/
H A Ddebug.c13 static const u16 allow[CB710_REG_COUNT/16] = { variable
17 static const char *const prefix[ARRAY_SIZE(allow)] = {
26 return ((allow[block] >> offset) & mask) == mask; in allow_reg_read()
35 for (i = 0; i < ARRAY_SIZE(allow); ++i, reg += 16/(t/8)) { \
63 for (i = 0; i < ARRAY_SIZE(allow); ++i, reg += 16/(t/8)) { \
/OK3568_Linux_fs/kernel/drivers/dma-buf/
H A Dselftest.c54 bool allow = true; in apply_subtest_filter() local
58 allow = false; in apply_subtest_filter()
69 if (allow) in apply_subtest_filter()
77 if (allow) in apply_subtest_filter()
82 result = allow; in apply_subtest_filter()
/OK3568_Linux_fs/yocto/poky/meta/recipes-core/systemd/systemd/
H A Dorg.freedesktop.hostname1_no_polkit.conf7 <allow own="org.freedesktop.hostname1"/>
8 <allow send_destination="org.freedesktop.hostname1"/>
9 <allow receive_sender="org.freedesktop.hostname1"/>
/OK3568_Linux_fs/kernel/Documentation/admin-guide/cgroup-v1/
H A Ddevices.rst24 An entry is added using devices.allow, and removed using
27 echo 'c 1:3 mr' > /sys/fs/cgroup/1/devices.allow
36 echo a > /sys/fs/cgroup/1/devices.allow
74 A allow "b 8:* rwm", "c 116:1 rw"
103 # echo "c *:3 rwm" >A/devices.allow
113 # echo "c 2:3 rwm" >B/devices.allow
114 # echo "c 50:3 r" >B/devices.allow
118 # echo "c *:3 rwm" >B/devices.allow
120 Allowing or denying all by writing 'a' to devices.allow or devices.deny will
/OK3568_Linux_fs/kernel/fs/nfsd/
H A Dnfs4acl.c422 u32 allow; member
487 state->mask.allow |= astate->allow; in add_to_mask()
521 low_mode_from_nfs4(state->owner.allow, &pace->e_perm, flags); in posix_state_to_acl()
526 low_mode_from_nfs4(state->users->aces[i].perms.allow, in posix_state_to_acl()
534 low_mode_from_nfs4(state->group.allow, &pace->e_perm, flags); in posix_state_to_acl()
540 low_mode_from_nfs4(state->groups->aces[i].perms.allow, in posix_state_to_acl()
549 low_mode_from_nfs4(state->mask.allow, &pace->e_perm, flags); in posix_state_to_acl()
554 low_mode_from_nfs4(state->other.allow, &pace->e_perm, flags); in posix_state_to_acl()
562 astate->allow |= mask & ~astate->deny; in allow_bits()
568 astate->deny |= mask & ~astate->allow; in deny_bits()
[all …]
/OK3568_Linux_fs/kernel/tools/lib/traceevent/plugins/
H A DMakefile11 define allow-override
18 $(call allow-override,CC,$(CROSS_COMPILE)gcc)
19 $(call allow-override,AR,$(CROSS_COMPILE)ar)
20 $(call allow-override,NM,$(CROSS_COMPILE)nm)
21 $(call allow-override,PKG_CONFIG,pkg-config)
/OK3568_Linux_fs/kernel/arch/arm64/boot/dts/qcom/
H A Dmsm8998-clamshell.dtsi140 regulator-allow-set-load;
153 regulator-allow-set-load;
158 regulator-allow-set-load;
175 regulator-allow-set-load;
216 regulator-allow-set-load;
229 regulator-allow-set-load;
234 regulator-allow-set-load;
252 regulator-allow-set-load;
/OK3568_Linux_fs/kernel/tools/lib/lockdep/
H A DMakefile12 define allow-override
19 $(call allow-override,CC,$(CROSS_COMPILE)gcc)
20 $(call allow-override,AR,$(CROSS_COMPILE)ar)
21 $(call allow-override,LD,$(CROSS_COMPILE)ld)
/OK3568_Linux_fs/kernel/lib/
H A DKconfig.kgdb88 exception handler which will allow kgdb to step through a
108 0x0002 - allow arbitrary reads from memory and symbol lookup
109 0x0004 - allow arbitrary writes to memory
110 0x0008 - allow current register state to be inspected
111 0x0010 - allow current register state to be modified
112 0x0020 - allow passive inspection (backtrace, process list, lsmod)
113 0x0040 - allow flow control management (breakpoint, single step)
115 0x0100 - allow machine to be rebooted
/OK3568_Linux_fs/kernel/arch/arm/mach-s3c/
H A Dpm.c63 #define any_allowed(mask, allow) (((mask) & (allow)) != (allow)) argument
/OK3568_Linux_fs/kernel/tools/build/
H A DMakefile9 define allow-override
15 $(call allow-override,CC,$(CROSS_COMPILE)gcc)
16 $(call allow-override,LD,$(CROSS_COMPILE)ld)
/OK3568_Linux_fs/kernel/tools/lib/traceevent/
H A DMakefile18 define allow-override
25 $(call allow-override,CC,$(CROSS_COMPILE)gcc)
26 $(call allow-override,AR,$(CROSS_COMPILE)ar)
27 $(call allow-override,NM,$(CROSS_COMPILE)nm)
28 $(call allow-override,PKG_CONFIG,pkg-config)
/OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-support/monit/monit/
H A Dmonitrc36 allow 0.0.0.0/0 # allow localhost to connect to the server and
37 allow admin:monit # require user 'admin' with password 'monit'
/OK3568_Linux_fs/kernel/drivers/gpu/drm/i915/selftests/
H A Di915_selftest.c250 bool allow = true; in apply_subtest_filter() local
254 allow = false; in apply_subtest_filter()
265 if (allow) in apply_subtest_filter()
273 if (allow) in apply_subtest_filter()
278 result = allow; in apply_subtest_filter()
/OK3568_Linux_fs/buildroot/package/at/
H A D0002-Makefile.in-fix-make-install-for-non-root-don-t-stri.patch44 - test -f $(DESTDIR)$(etcdir)/at.allow || test -f $(DESTDIR)$(etcdir)/at.deny || $(INSTALL) -o root…
46 + test -f $(DESTDIR)$(etcdir)/at.allow || test -f $(DESTDIR)$(etcdir)/at.deny || $(INSTALL) -m 640 …
73 - $(INSTALL) -g root -o root -m 644 at.allow.5 $(DESTDIR)$(man5dir)/
74 + $(INSTALL) -m 644 at.allow.5 $(DESTDIR)$(man5dir)/
75 cd $(DESTDIR)$(man5dir) && $(LN_S) -f at.allow.5 at.deny.5
H A D0001-Makefile.in-replace-IROOT-by-DESTDIR.patch48 - test -f $(IROOT)$(etcdir)/at.allow || test -f $(IROOT)$(etcdir)/at.deny || $(INSTALL) -o root -g …
73 + test -f $(DESTDIR)$(etcdir)/at.allow || test -f $(DESTDIR)$(etcdir)/at.deny || $(INSTALL) -o root…
91 - $(INSTALL) -g root -o root -m 644 at.allow.5 $(IROOT)$(man5dir)/
92 - cd $(IROOT)$(man5dir) && $(LN_S) -f at.allow.5 at.deny.5
97 + $(INSTALL) -g root -o root -m 644 at.allow.5 $(DESTDIR)$(man5dir)/
98 + cd $(DESTDIR)$(man5dir) && $(LN_S) -f at.allow.5 at.deny.5
/OK3568_Linux_fs/kernel/tools/testing/selftests/net/
H A Dxfrm_policy.sh39 …rc $lnet dst $rnet dir out tmpl src $me dst $remote proto esp mode tunnel priority 100 action allow
41 …rc $rnet dst $lnet dir fwd tmpl src $remote dst $me proto esp mode tunnel priority 100 action allow
146 ip -net $ns xfrm policy add dst $plain dir out priority 10 action allow
149 …y add dst $encryptip dir out tmpl src $me dst $remote proto esp mode tunnel priority 1 action allow
273 …::0014:0000:0001 dir in tmpl src :: dst :: proto esp mode tunnel priority 100 action allow || break
276 …000 dst ff01::01 dir in tmpl src :: dst :: proto esp mode tunnel priority 100 action allow || break
300 ip -net $ns xfrm policy add dst $j.0.0.0/24 dir out priority 10 action allow
314 ip -net $ns xfrm policy add dst $addr dir out priority 10 action allow

12345678910>>...64