Home
last modified time | relevance | path

Searched refs:permissions (Results 1 – 25 of 841) sorted by relevance

12345678910>>...34

/OK3568_Linux_fs/external/rknpu2/examples/rknn_yolov5_android_apk_demo/app/src/main/java/com/rockchip/gpadc/demo/
H A DMainActivity.java21 String[] permissions = new String[]{ field in MainActivity
40 int i = ContextCompat.checkSelfPermission(this, permissions[0]); in checkPermissions()
41 int l = ContextCompat.checkSelfPermission(this, permissions[1]); in checkPermissions()
42 int m = ContextCompat.checkSelfPermission(this, permissions[2]); in checkPermissions()
62 ActivityCompat.requestPermissions(this, permissions, 321); in startRequestPermission()
65 …public void onRequestPermissionsResult(int requestCode, @NonNull String[] permissions, @NonNull in… in onRequestPermissionsResult() argument
66 super.onRequestPermissionsResult(requestCode, permissions, grantResults); in onRequestPermissionsResult()
/OK3568_Linux_fs/yocto/poky/meta/recipes-support/attr/acl/
H A D0001-test-patch-out-failing-bits.patch13 test/root/permissions.test | 13 -------------
16 diff --git a/test/root/permissions.test b/test/root/permissions.test
18 --- a/test/root/permissions.test
19 +++ b/test/root/permissions.test
39 Change the owning group. The other permissions should now grant user
52 Verify that permissions in separate matching ACL entries do not
/OK3568_Linux_fs/yocto/poky/meta/recipes-support/boost/boost/
H A Dde657e01635306085488290ea83de541ec393f8b.patch13 include/boost/interprocess/permissions.hpp | 4 ++++
16 diff --git a/boost/interprocess/permissions.hpp b/boost/interprocess/permissions.hpp
18 --- a/boost/interprocess/permissions.hpp
19 +++ b/boost/interprocess/permissions.hpp
/OK3568_Linux_fs/kernel/Documentation/filesystems/
H A Dadfs.rst39 ownmask=nnn The permission mask for ADFS 'owner' permissions
41 othmask=nnn The permission mask for ADFS 'other' permissions
48 Mapping of ADFS permissions to Linux permissions
51 ADFS permissions consist of the following:
68 Possible owner mode permissions -> -rwx------
74 Possible other mode permissions -> ----rwxrwx
77 not a UnixExec filetype, then the permissions will be::
93 desire the permissions should be under Linux.
H A Disofs.rst39 mode=xxx Sets the permissions on files to xxx unless Rock Ridge
40 extensions set the permissions otherwise
41 dmode=xxx Sets the permissions on directories to xxx unless Rock Ridge
42 extensions set the permissions otherwise
43 overriderockperm Set permissions on files and directories according to
/OK3568_Linux_fs/yocto/meta-rockchip/recipes-core/udev/
H A Dudev-conf-rockchip.bb9 file://99-rockchip-permissions.rules \
16 …tall -m 0644 ${WORKDIR}/99-rockchip-permissions.rules ${D}${nonarch_base_libdir}/udev/rules.d/99-r…
/OK3568_Linux_fs/kernel/fs/hfsplus/
H A Dinode.c504 hfsplus_get_perms(inode, &folder->permissions, 1); in hfsplus_cat_read_inode()
528 hfsplus_get_perms(inode, &file->permissions, 0); in hfsplus_cat_read_inode()
531 if (file->permissions.dev) in hfsplus_cat_read_inode()
533 be32_to_cpu(file->permissions.dev)); in hfsplus_cat_read_inode()
543 be32_to_cpu(file->permissions.dev)); in hfsplus_cat_read_inode()
584 hfsplus_cat_set_perms(inode, &folder->permissions); in hfsplus_cat_write_inode()
610 hfsplus_cat_set_perms(inode, &file->permissions); in hfsplus_cat_write_inode()
612 (file->permissions.rootflags | in hfsplus_cat_write_inode()
613 file->permissions.userflags)) in hfsplus_cat_write_inode()
/OK3568_Linux_fs/kernel/Documentation/usb/
H A Dtext_files.rst13 USB devfs drop permissions source
16 .. literalinclude:: usbdevfs-drop-permissions.c
/OK3568_Linux_fs/buildroot/docs/manual/
H A Dcustomize-device-permission-tables.txt5 ==== Setting file permissions and ownership and adding custom devices nodes
7 Sometimes it is needed to set specific permissions or ownership on files
27 It should be noted that if the specific permissions or device nodes are
H A Dmakedev-syntax.txt8 define changes to be made for permissions, or which device files to
31 - +mode+ are the usual permissions settings (only numerical values
41 Let's say you want to change the permissions of a given file; using
/OK3568_Linux_fs/yocto/poky/meta/files/common-licenses/
H A DCAL-1.028 License requires that You provide that third party all the permissions
33 The full permissions, conditions, and other terms are laid out below.
85 The following limitations apply to the permissions granted in section
125 permissions granted to You under this License and for at least one
166 to the Source Code, You cannot use the permissions given under this
180 Throughout any period in which You exercise any of the permissions
200 independently exercise the permissions granted under this License. You
248 If this License is terminated for any reason, all permissions granted
250 will immediately cease exercising any permissions granted in this
257 for non-compliance, Your permissions for the Work under this License
[all …]
H A DCAL-1.0-Combined-Work-Exception28 License requires that You provide that third party all the permissions
33 The full permissions, conditions, and other terms are laid out below.
85 The following limitations apply to the permissions granted in section
125 permissions granted to You under this License and for at least one
166 to the Source Code, You cannot use the permissions given under this
180 Throughout any period in which You exercise any of the permissions
200 independently exercise the permissions granted under this License. You
248 If this License is terminated for any reason, all permissions granted
250 will immediately cease exercising any permissions granted in this
257 for non-compliance, Your permissions for the Work under this License
[all …]
/OK3568_Linux_fs/yocto/poky/meta/files/
H A Dfs-perms-persistent-log.txt1 # This file contains a list of files and directories with known permissions.
2 # It is used by the packaging class to ensure that the permissions, owners and
57 # Special permissions from base-files
H A Dfs-perms.txt1 # This file contains a list of files and directories with known permissions.
2 # It is used by the packaging class to ensure that the permissions, owners and
58 # Special permissions from base-files
/OK3568_Linux_fs/yocto/meta-openembedded/meta-networking/recipes-support/netperf/files/
H A Dnetserver_permissions.patch4 Subject: [PATCH] netserver: don't change permissions on /dev/null
6 the (now default) suppress_debug=1 changes permissions on /dev/null
/OK3568_Linux_fs/kernel/fs/notify/fanotify/
H A DKconfig16 bool "fanotify permissions checking"
21 Say Y here is you want fanotify listeners to be able to make permissions
/OK3568_Linux_fs/kernel/drivers/staging/gasket/
H A Dgasket_core.c447 if (bar_desc.permissions == GASKET_NOMAP) in gasket_write_mappable_regions()
721 if (coh_buff_desc.permissions != GASKET_NOMAP) { in gasket_is_coherent_region()
741 if (bar_desc.permissions != GASKET_NOMAP) { in gasket_get_bar_index()
974 ulong permissions; in gasket_mmap_coherent() local
982 permissions = driver_desc->coherent_buffer_description.permissions; in gasket_mmap_coherent()
983 if (!gasket_mmap_has_permissions(gasket_dev, vma, permissions)) { in gasket_mmap_coherent()
1016 ulong permissions; in gasket_mmap() local
1076 permissions = bar_desc->permissions; in gasket_mmap()
1077 if (!gasket_mmap_has_permissions(gasket_dev, vma, permissions)) { in gasket_mmap()
1092 bar_desc->permissions)) { in gasket_mmap()
/OK3568_Linux_fs/prebuilts/gcc/linux-x86/arm/gcc-arm-10.3-2021.07-x86_64-arm-none-linux-gnueabihf/arm-none-linux-gnueabihf/include/c++/10.3.1/bits/
H A Dfs_ops.h249 permissions(const path& __p, perms __prms, in _GLIBCXX_VISIBILITY()
253 permissions(const path& __p, perms __prms, error_code& __ec) noexcept in _GLIBCXX_VISIBILITY()
254 { permissions(__p, __prms, perm_options::replace, __ec); } in _GLIBCXX_VISIBILITY()
257 permissions(const path& __p, perms __prms, perm_options __opts, in _GLIBCXX_VISIBILITY()
/OK3568_Linux_fs/prebuilts/gcc/linux-x86/aarch64/gcc-arm-10.3-2021.07-x86_64-aarch64-none-linux-gnu/aarch64-none-linux-gnu/include/c++/10.3.1/bits/
H A Dfs_ops.h249 permissions(const path& __p, perms __prms, in _GLIBCXX_VISIBILITY()
253 permissions(const path& __p, perms __prms, error_code& __ec) noexcept in _GLIBCXX_VISIBILITY()
254 { permissions(__p, __prms, perm_options::replace, __ec); } in _GLIBCXX_VISIBILITY()
257 permissions(const path& __p, perms __prms, perm_options __opts, in _GLIBCXX_VISIBILITY()
/OK3568_Linux_fs/yocto/poky/meta/recipes-core/systemd/systemd/
H A DCVE-2022-4415-2.patch7 When the user starts a program which elevates its permissions via setuid,
31 user permissions to view the coredump file. If people report that we're missing
247 … return log_warning_errno(SYNTHETIC_ERRNO(ENODATA), "No auxv data, not adjusting permissions.");
261 … "Core file does not have ELF header, not adjusting permissions.");
265 + "Core file has strange ELF class, not adjusting permissions.…
269 … "Core file has non-native endianness, not adjusting permissions.");
322 …return log_error_errno(r, "Failed to fix permissions and finalize coredump %s into %s: %m", coredu…
/OK3568_Linux_fs/kernel/Documentation/admin-guide/LSM/
H A Dapparmor.rst12 permissions.
33 For AppArmor to enforce any restrictions beyond standard Linux DAC permissions
/OK3568_Linux_fs/buildroot/package/makedevs/
H A DREADME6 For example, if you want to adjust the permissions on a particular
12 root (regardless of what its permissions are on the host filesystem.
/OK3568_Linux_fs/buildroot/support/misc/
H A Dtarget-dir-warning.txt6 cannot create device files and set the permissions and ownership of
28 and set ownership/permissions properly even if Buildroot does not run
/OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-support/atop/atop/
H A Dfix-permissions.patch4 Subject: [PATCH] Fix permissions
6 Update permissions of executable files that remove setuid bit and make
/OK3568_Linux_fs/kernel/Documentation/core-api/
H A Dprotection-keys.rst30 permissions are enforced on data access only and have no effect on
45 directly in order to change access permissions to memory covered
100 the plain mprotect() permissions are violated.

12345678910>>...34