| /OK3568_Linux_fs/external/rknpu2/examples/rknn_yolov5_android_apk_demo/app/src/main/java/com/rockchip/gpadc/demo/ |
| H A D | MainActivity.java | 21 String[] permissions = new String[]{ field in MainActivity 40 int i = ContextCompat.checkSelfPermission(this, permissions[0]); in checkPermissions() 41 int l = ContextCompat.checkSelfPermission(this, permissions[1]); in checkPermissions() 42 int m = ContextCompat.checkSelfPermission(this, permissions[2]); in checkPermissions() 62 ActivityCompat.requestPermissions(this, permissions, 321); in startRequestPermission() 65 …public void onRequestPermissionsResult(int requestCode, @NonNull String[] permissions, @NonNull in… in onRequestPermissionsResult() argument 66 super.onRequestPermissionsResult(requestCode, permissions, grantResults); in onRequestPermissionsResult()
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-support/attr/acl/ |
| H A D | 0001-test-patch-out-failing-bits.patch | 13 test/root/permissions.test | 13 ------------- 16 diff --git a/test/root/permissions.test b/test/root/permissions.test 18 --- a/test/root/permissions.test 19 +++ b/test/root/permissions.test 39 Change the owning group. The other permissions should now grant user 52 Verify that permissions in separate matching ACL entries do not
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-support/boost/boost/ |
| H A D | de657e01635306085488290ea83de541ec393f8b.patch | 13 include/boost/interprocess/permissions.hpp | 4 ++++ 16 diff --git a/boost/interprocess/permissions.hpp b/boost/interprocess/permissions.hpp 18 --- a/boost/interprocess/permissions.hpp 19 +++ b/boost/interprocess/permissions.hpp
|
| /OK3568_Linux_fs/kernel/Documentation/filesystems/ |
| H A D | adfs.rst | 39 ownmask=nnn The permission mask for ADFS 'owner' permissions 41 othmask=nnn The permission mask for ADFS 'other' permissions 48 Mapping of ADFS permissions to Linux permissions 51 ADFS permissions consist of the following: 68 Possible owner mode permissions -> -rwx------ 74 Possible other mode permissions -> ----rwxrwx 77 not a UnixExec filetype, then the permissions will be:: 93 desire the permissions should be under Linux.
|
| H A D | isofs.rst | 39 mode=xxx Sets the permissions on files to xxx unless Rock Ridge 40 extensions set the permissions otherwise 41 dmode=xxx Sets the permissions on directories to xxx unless Rock Ridge 42 extensions set the permissions otherwise 43 overriderockperm Set permissions on files and directories according to
|
| /OK3568_Linux_fs/yocto/meta-rockchip/recipes-core/udev/ |
| H A D | udev-conf-rockchip.bb | 9 file://99-rockchip-permissions.rules \ 16 …tall -m 0644 ${WORKDIR}/99-rockchip-permissions.rules ${D}${nonarch_base_libdir}/udev/rules.d/99-r…
|
| /OK3568_Linux_fs/kernel/fs/hfsplus/ |
| H A D | inode.c | 504 hfsplus_get_perms(inode, &folder->permissions, 1); in hfsplus_cat_read_inode() 528 hfsplus_get_perms(inode, &file->permissions, 0); in hfsplus_cat_read_inode() 531 if (file->permissions.dev) in hfsplus_cat_read_inode() 533 be32_to_cpu(file->permissions.dev)); in hfsplus_cat_read_inode() 543 be32_to_cpu(file->permissions.dev)); in hfsplus_cat_read_inode() 584 hfsplus_cat_set_perms(inode, &folder->permissions); in hfsplus_cat_write_inode() 610 hfsplus_cat_set_perms(inode, &file->permissions); in hfsplus_cat_write_inode() 612 (file->permissions.rootflags | in hfsplus_cat_write_inode() 613 file->permissions.userflags)) in hfsplus_cat_write_inode()
|
| /OK3568_Linux_fs/kernel/Documentation/usb/ |
| H A D | text_files.rst | 13 USB devfs drop permissions source 16 .. literalinclude:: usbdevfs-drop-permissions.c
|
| /OK3568_Linux_fs/buildroot/docs/manual/ |
| H A D | customize-device-permission-tables.txt | 5 ==== Setting file permissions and ownership and adding custom devices nodes 7 Sometimes it is needed to set specific permissions or ownership on files 27 It should be noted that if the specific permissions or device nodes are
|
| H A D | makedev-syntax.txt | 8 define changes to be made for permissions, or which device files to 31 - +mode+ are the usual permissions settings (only numerical values 41 Let's say you want to change the permissions of a given file; using
|
| /OK3568_Linux_fs/yocto/poky/meta/files/common-licenses/ |
| H A D | CAL-1.0 | 28 License requires that You provide that third party all the permissions 33 The full permissions, conditions, and other terms are laid out below. 85 The following limitations apply to the permissions granted in section 125 permissions granted to You under this License and for at least one 166 to the Source Code, You cannot use the permissions given under this 180 Throughout any period in which You exercise any of the permissions 200 independently exercise the permissions granted under this License. You 248 If this License is terminated for any reason, all permissions granted 250 will immediately cease exercising any permissions granted in this 257 for non-compliance, Your permissions for the Work under this License [all …]
|
| H A D | CAL-1.0-Combined-Work-Exception | 28 License requires that You provide that third party all the permissions 33 The full permissions, conditions, and other terms are laid out below. 85 The following limitations apply to the permissions granted in section 125 permissions granted to You under this License and for at least one 166 to the Source Code, You cannot use the permissions given under this 180 Throughout any period in which You exercise any of the permissions 200 independently exercise the permissions granted under this License. You 248 If this License is terminated for any reason, all permissions granted 250 will immediately cease exercising any permissions granted in this 257 for non-compliance, Your permissions for the Work under this License [all …]
|
| /OK3568_Linux_fs/yocto/poky/meta/files/ |
| H A D | fs-perms-persistent-log.txt | 1 # This file contains a list of files and directories with known permissions. 2 # It is used by the packaging class to ensure that the permissions, owners and 57 # Special permissions from base-files
|
| H A D | fs-perms.txt | 1 # This file contains a list of files and directories with known permissions. 2 # It is used by the packaging class to ensure that the permissions, owners and 58 # Special permissions from base-files
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-networking/recipes-support/netperf/files/ |
| H A D | netserver_permissions.patch | 4 Subject: [PATCH] netserver: don't change permissions on /dev/null 6 the (now default) suppress_debug=1 changes permissions on /dev/null
|
| /OK3568_Linux_fs/kernel/fs/notify/fanotify/ |
| H A D | Kconfig | 16 bool "fanotify permissions checking" 21 Say Y here is you want fanotify listeners to be able to make permissions
|
| /OK3568_Linux_fs/kernel/drivers/staging/gasket/ |
| H A D | gasket_core.c | 447 if (bar_desc.permissions == GASKET_NOMAP) in gasket_write_mappable_regions() 721 if (coh_buff_desc.permissions != GASKET_NOMAP) { in gasket_is_coherent_region() 741 if (bar_desc.permissions != GASKET_NOMAP) { in gasket_get_bar_index() 974 ulong permissions; in gasket_mmap_coherent() local 982 permissions = driver_desc->coherent_buffer_description.permissions; in gasket_mmap_coherent() 983 if (!gasket_mmap_has_permissions(gasket_dev, vma, permissions)) { in gasket_mmap_coherent() 1016 ulong permissions; in gasket_mmap() local 1076 permissions = bar_desc->permissions; in gasket_mmap() 1077 if (!gasket_mmap_has_permissions(gasket_dev, vma, permissions)) { in gasket_mmap() 1092 bar_desc->permissions)) { in gasket_mmap()
|
| /OK3568_Linux_fs/prebuilts/gcc/linux-x86/arm/gcc-arm-10.3-2021.07-x86_64-arm-none-linux-gnueabihf/arm-none-linux-gnueabihf/include/c++/10.3.1/bits/ |
| H A D | fs_ops.h | 249 permissions(const path& __p, perms __prms, in _GLIBCXX_VISIBILITY() 253 permissions(const path& __p, perms __prms, error_code& __ec) noexcept in _GLIBCXX_VISIBILITY() 254 { permissions(__p, __prms, perm_options::replace, __ec); } in _GLIBCXX_VISIBILITY() 257 permissions(const path& __p, perms __prms, perm_options __opts, in _GLIBCXX_VISIBILITY()
|
| /OK3568_Linux_fs/prebuilts/gcc/linux-x86/aarch64/gcc-arm-10.3-2021.07-x86_64-aarch64-none-linux-gnu/aarch64-none-linux-gnu/include/c++/10.3.1/bits/ |
| H A D | fs_ops.h | 249 permissions(const path& __p, perms __prms, in _GLIBCXX_VISIBILITY() 253 permissions(const path& __p, perms __prms, error_code& __ec) noexcept in _GLIBCXX_VISIBILITY() 254 { permissions(__p, __prms, perm_options::replace, __ec); } in _GLIBCXX_VISIBILITY() 257 permissions(const path& __p, perms __prms, perm_options __opts, in _GLIBCXX_VISIBILITY()
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-core/systemd/systemd/ |
| H A D | CVE-2022-4415-2.patch | 7 When the user starts a program which elevates its permissions via setuid, 31 user permissions to view the coredump file. If people report that we're missing 247 … return log_warning_errno(SYNTHETIC_ERRNO(ENODATA), "No auxv data, not adjusting permissions."); 261 … "Core file does not have ELF header, not adjusting permissions."); 265 + "Core file has strange ELF class, not adjusting permissions.… 269 … "Core file has non-native endianness, not adjusting permissions."); 322 …return log_error_errno(r, "Failed to fix permissions and finalize coredump %s into %s: %m", coredu…
|
| /OK3568_Linux_fs/kernel/Documentation/admin-guide/LSM/ |
| H A D | apparmor.rst | 12 permissions. 33 For AppArmor to enforce any restrictions beyond standard Linux DAC permissions
|
| /OK3568_Linux_fs/buildroot/package/makedevs/ |
| H A D | README | 6 For example, if you want to adjust the permissions on a particular 12 root (regardless of what its permissions are on the host filesystem.
|
| /OK3568_Linux_fs/buildroot/support/misc/ |
| H A D | target-dir-warning.txt | 6 cannot create device files and set the permissions and ownership of 28 and set ownership/permissions properly even if Buildroot does not run
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-support/atop/atop/ |
| H A D | fix-permissions.patch | 4 Subject: [PATCH] Fix permissions 6 Update permissions of executable files that remove setuid bit and make
|
| /OK3568_Linux_fs/kernel/Documentation/core-api/ |
| H A D | protection-keys.rst | 30 permissions are enforced on data access only and have no effect on 45 directly in order to change access permissions to memory covered 100 the plain mprotect() permissions are violated.
|