| /OK3568_Linux_fs/kernel/security/apparmor/ |
| H A D | lib.c | 24 struct aa_perms allperms = { .allow = ALL_PERMS_MASK, 329 .allow = dfa_user_allow(dfa, state), in aa_compute_perms() 337 perms->allow |= map_other(dfa_other_allow(dfa, state)); in aa_compute_perms() 351 accum->allow &= addend->allow & ~addend->deny; in aa_perms_accum_raw() 352 accum->audit |= addend->audit & addend->allow; in aa_perms_accum_raw() 353 accum->quiet &= addend->quiet & ~addend->allow; in aa_perms_accum_raw() 354 accum->kill |= addend->kill & ~addend->allow; in aa_perms_accum_raw() 355 accum->stop |= addend->stop & ~addend->allow; in aa_perms_accum_raw() 356 accum->complain |= addend->complain & ~addend->allow & ~addend->deny; in aa_perms_accum_raw() 357 accum->cond |= addend->cond & ~addend->allow & ~addend->deny; in aa_perms_accum_raw() [all …]
|
| H A D | file.c | 122 aad(&sa)->request = aad(&sa)->request & ~perms->allow; in aa_audit_file() 138 aad(&sa)->denied = aad(&sa)->request & ~perms->allow; in aa_audit_file() 224 perms.allow = map_old_perms(dfa_user_allow(dfa, state)); in aa_compute_fperms() 229 perms.allow = map_old_perms(dfa_other_allow(dfa, state)); in aa_compute_fperms() 234 perms.allow |= AA_MAY_GETATTR; in aa_compute_fperms() 238 perms.allow |= AA_MAY_CHANGE_PROFILE; in aa_compute_fperms() 240 perms.allow |= AA_MAY_ONEXEC; in aa_compute_fperms() 275 if (request & ~perms->allow) in __aa_path_perm() 384 if (!(lperms.allow & AA_MAY_LINK)) in profile_path_link() 398 if (!(perms.allow & AA_MAY_LINK)) { in profile_path_link() [all …]
|
| /OK3568_Linux_fs/kernel/tools/scripts/ |
| H A D | Makefile.include | 47 define allow-override 54 $(call allow-override,CC,clang) 55 $(call allow-override,AR,llvm-ar) 56 $(call allow-override,LD,ld.lld) 57 $(call allow-override,CXX,clang++) 58 $(call allow-override,STRIP,llvm-strip) 61 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 62 $(call allow-override,AR,$(CROSS_COMPILE)ar) 63 $(call allow-override,LD,$(CROSS_COMPILE)ld) 64 $(call allow-override,CXX,$(CROSS_COMPILE)g++) [all …]
|
| /OK3568_Linux_fs/kernel/include/trace/hooks/ |
| H A D | mmc_core.h | 31 TP_PROTO(struct mmc_host *host, int err, bool *allow), 32 TP_ARGS(host, err, allow)); 43 TP_PROTO(struct sdhci_host *host, bool *allow), 44 TP_ARGS(host, allow)); 46 TP_PROTO(struct mmc_host *host, bool *allow), 47 TP_ARGS(host, allow));
|
| H A D | pm_domain.h | 21 TP_PROTO(struct generic_pm_domain *genpd, uint32_t idx, bool *allow), 22 TP_ARGS(genpd, idx, allow))
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-support/user-creation/files/ |
| H A D | system-xuser.conf | 5 <allow send_destination="net.connman"/> 6 <allow send_destination="net.connman.vpn"/> 7 <allow send_destination="org.ofono"/> 8 <allow send_destination="org.bluez"/>
|
| /OK3568_Linux_fs/debian/overlay/etc/init.d/ |
| H A D | rockchip.sh | 23 …[ -e /usr/lib/arm-linux-gnueabihf/ ] && apt install -fy --allow-downgrades /camera_engine_$ISP*.deb 29 [ -e /usr/lib/aarch64-linux-gnu/ ] && apt install -fy --allow-downgrades /camera_engine_$ISP*.deb 35 [ -e /usr/lib/aarch64-linux-gnu/ ] && apt install -fy --allow-downgrades /camera_engine_$ISP*.deb 41 [ -e /usr/lib/aarch64-linux-gnu/ ] && apt install -fy --allow-downgrades /camera_engine_$ISP*.deb 47 …[ -e /usr/lib/arm-linux-gnueabihf/ ] && apt install -fy --allow-downgrades /camera_engine_$ISP*.deb 53 [ -e /usr/lib/aarch64-linux-gnu/ ] && apt install -fy --allow-downgrades /camera_engine_$ISP*.deb 59 [ -e /usr/lib/aarch64-linux-gnu/ ] && apt install -fy --allow-downgrades /camera_engine_$ISP*.deb 65 [ -e /usr/lib/aarch64-linux-gnu/ ] && apt install -fy --allow-downgrades /camera_engine_$ISP*.deb 72 apt install -fy --allow-downgrades /libmali-*$MALI*-x11*.deb
|
| /OK3568_Linux_fs/buildroot/board/forlinx/ok3568/fs-overlay/etc/dbus-1/system.d/ |
| H A D | obexd.conf | 6 <allow own="org.bluez.obex"/> 7 <allow send_destination="org.bluez.obex"/> 10 <allow send_destination="org.bluez.obex"/> 13 <allow send_destination="org.bluez.obex"/>
|
| /OK3568_Linux_fs/kernel/drivers/misc/cb710/ |
| H A D | debug.c | 13 static const u16 allow[CB710_REG_COUNT/16] = { variable 17 static const char *const prefix[ARRAY_SIZE(allow)] = { 26 return ((allow[block] >> offset) & mask) == mask; in allow_reg_read() 35 for (i = 0; i < ARRAY_SIZE(allow); ++i, reg += 16/(t/8)) { \ 63 for (i = 0; i < ARRAY_SIZE(allow); ++i, reg += 16/(t/8)) { \
|
| /OK3568_Linux_fs/kernel/drivers/dma-buf/ |
| H A D | selftest.c | 54 bool allow = true; in apply_subtest_filter() local 58 allow = false; in apply_subtest_filter() 69 if (allow) in apply_subtest_filter() 77 if (allow) in apply_subtest_filter() 82 result = allow; in apply_subtest_filter()
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-core/systemd/systemd/ |
| H A D | org.freedesktop.hostname1_no_polkit.conf | 7 <allow own="org.freedesktop.hostname1"/> 8 <allow send_destination="org.freedesktop.hostname1"/> 9 <allow receive_sender="org.freedesktop.hostname1"/>
|
| /OK3568_Linux_fs/kernel/Documentation/admin-guide/cgroup-v1/ |
| H A D | devices.rst | 24 An entry is added using devices.allow, and removed using 27 echo 'c 1:3 mr' > /sys/fs/cgroup/1/devices.allow 36 echo a > /sys/fs/cgroup/1/devices.allow 74 A allow "b 8:* rwm", "c 116:1 rw" 103 # echo "c *:3 rwm" >A/devices.allow 113 # echo "c 2:3 rwm" >B/devices.allow 114 # echo "c 50:3 r" >B/devices.allow 118 # echo "c *:3 rwm" >B/devices.allow 120 Allowing or denying all by writing 'a' to devices.allow or devices.deny will
|
| /OK3568_Linux_fs/kernel/fs/nfsd/ |
| H A D | nfs4acl.c | 422 u32 allow; member 487 state->mask.allow |= astate->allow; in add_to_mask() 521 low_mode_from_nfs4(state->owner.allow, &pace->e_perm, flags); in posix_state_to_acl() 526 low_mode_from_nfs4(state->users->aces[i].perms.allow, in posix_state_to_acl() 534 low_mode_from_nfs4(state->group.allow, &pace->e_perm, flags); in posix_state_to_acl() 540 low_mode_from_nfs4(state->groups->aces[i].perms.allow, in posix_state_to_acl() 549 low_mode_from_nfs4(state->mask.allow, &pace->e_perm, flags); in posix_state_to_acl() 554 low_mode_from_nfs4(state->other.allow, &pace->e_perm, flags); in posix_state_to_acl() 562 astate->allow |= mask & ~astate->deny; in allow_bits() 568 astate->deny |= mask & ~astate->allow; in deny_bits() [all …]
|
| /OK3568_Linux_fs/kernel/tools/lib/traceevent/plugins/ |
| H A D | Makefile | 11 define allow-override 18 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 19 $(call allow-override,AR,$(CROSS_COMPILE)ar) 20 $(call allow-override,NM,$(CROSS_COMPILE)nm) 21 $(call allow-override,PKG_CONFIG,pkg-config)
|
| /OK3568_Linux_fs/kernel/arch/arm64/boot/dts/qcom/ |
| H A D | msm8998-clamshell.dtsi | 140 regulator-allow-set-load; 153 regulator-allow-set-load; 158 regulator-allow-set-load; 175 regulator-allow-set-load; 216 regulator-allow-set-load; 229 regulator-allow-set-load; 234 regulator-allow-set-load; 252 regulator-allow-set-load;
|
| /OK3568_Linux_fs/kernel/tools/lib/lockdep/ |
| H A D | Makefile | 12 define allow-override 19 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 20 $(call allow-override,AR,$(CROSS_COMPILE)ar) 21 $(call allow-override,LD,$(CROSS_COMPILE)ld)
|
| /OK3568_Linux_fs/kernel/lib/ |
| H A D | Kconfig.kgdb | 88 exception handler which will allow kgdb to step through a 108 0x0002 - allow arbitrary reads from memory and symbol lookup 109 0x0004 - allow arbitrary writes to memory 110 0x0008 - allow current register state to be inspected 111 0x0010 - allow current register state to be modified 112 0x0020 - allow passive inspection (backtrace, process list, lsmod) 113 0x0040 - allow flow control management (breakpoint, single step) 115 0x0100 - allow machine to be rebooted
|
| /OK3568_Linux_fs/kernel/arch/arm/mach-s3c/ |
| H A D | pm.c | 63 #define any_allowed(mask, allow) (((mask) & (allow)) != (allow)) argument
|
| /OK3568_Linux_fs/kernel/tools/build/ |
| H A D | Makefile | 9 define allow-override 15 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 16 $(call allow-override,LD,$(CROSS_COMPILE)ld)
|
| /OK3568_Linux_fs/kernel/tools/lib/traceevent/ |
| H A D | Makefile | 18 define allow-override 25 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 26 $(call allow-override,AR,$(CROSS_COMPILE)ar) 27 $(call allow-override,NM,$(CROSS_COMPILE)nm) 28 $(call allow-override,PKG_CONFIG,pkg-config)
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-support/monit/monit/ |
| H A D | monitrc | 36 allow 0.0.0.0/0 # allow localhost to connect to the server and 37 allow admin:monit # require user 'admin' with password 'monit'
|
| /OK3568_Linux_fs/kernel/drivers/gpu/drm/i915/selftests/ |
| H A D | i915_selftest.c | 250 bool allow = true; in apply_subtest_filter() local 254 allow = false; in apply_subtest_filter() 265 if (allow) in apply_subtest_filter() 273 if (allow) in apply_subtest_filter() 278 result = allow; in apply_subtest_filter()
|
| /OK3568_Linux_fs/buildroot/package/at/ |
| H A D | 0002-Makefile.in-fix-make-install-for-non-root-don-t-stri.patch | 44 - test -f $(DESTDIR)$(etcdir)/at.allow || test -f $(DESTDIR)$(etcdir)/at.deny || $(INSTALL) -o root… 46 + test -f $(DESTDIR)$(etcdir)/at.allow || test -f $(DESTDIR)$(etcdir)/at.deny || $(INSTALL) -m 640 … 73 - $(INSTALL) -g root -o root -m 644 at.allow.5 $(DESTDIR)$(man5dir)/ 74 + $(INSTALL) -m 644 at.allow.5 $(DESTDIR)$(man5dir)/ 75 cd $(DESTDIR)$(man5dir) && $(LN_S) -f at.allow.5 at.deny.5
|
| H A D | 0001-Makefile.in-replace-IROOT-by-DESTDIR.patch | 48 - test -f $(IROOT)$(etcdir)/at.allow || test -f $(IROOT)$(etcdir)/at.deny || $(INSTALL) -o root -g … 73 + test -f $(DESTDIR)$(etcdir)/at.allow || test -f $(DESTDIR)$(etcdir)/at.deny || $(INSTALL) -o root… 91 - $(INSTALL) -g root -o root -m 644 at.allow.5 $(IROOT)$(man5dir)/ 92 - cd $(IROOT)$(man5dir) && $(LN_S) -f at.allow.5 at.deny.5 97 + $(INSTALL) -g root -o root -m 644 at.allow.5 $(DESTDIR)$(man5dir)/ 98 + cd $(DESTDIR)$(man5dir) && $(LN_S) -f at.allow.5 at.deny.5
|
| /OK3568_Linux_fs/kernel/tools/testing/selftests/net/ |
| H A D | xfrm_policy.sh | 39 …rc $lnet dst $rnet dir out tmpl src $me dst $remote proto esp mode tunnel priority 100 action allow 41 …rc $rnet dst $lnet dir fwd tmpl src $remote dst $me proto esp mode tunnel priority 100 action allow 146 ip -net $ns xfrm policy add dst $plain dir out priority 10 action allow 149 …y add dst $encryptip dir out tmpl src $me dst $remote proto esp mode tunnel priority 1 action allow 273 …::0014:0000:0001 dir in tmpl src :: dst :: proto esp mode tunnel priority 100 action allow || break 276 …000 dst ff01::01 dir in tmpl src :: dst :: proto esp mode tunnel priority 100 action allow || break 300 ip -net $ns xfrm policy add dst $j.0.0.0/24 dir out priority 10 action allow 314 ip -net $ns xfrm policy add dst $addr dir out priority 10 action allow
|