/openbmc/linux/include/uapi/linux/ |
H A D | capability.h | 171 * Allow taking bits out of capability bounding set 172 * Allow modification of the securebits for a process 177 /* Allow modification of S_IMMUTABLE and S_APPEND file attributes */ 186 /* Allow broadcasting, listen to multicast */ 190 /* Allow interface configuration */ 191 /* Allow administration of IP firewall, masquerading and accounting */ 192 /* Allow setting debug option on sockets */ 193 /* Allow modification of routing tables */ 194 /* Allow setting arbitrary process / process group ownership on 196 /* Allow binding to any address for transparent proxying (also via NET_RAW) */ [all …]
|
/openbmc/linux/security/apparmor/include/ |
H A D | perms.h | 67 u32 allow; member 68 u32 deny; /* explicit deny, or conflict if allow also set */ 70 u32 subtree; /* allow perm on full subtree only when allow is set */ 71 u32 cond; /* set only when ~allow and ~deny */ 73 u32 kill; /* set only when ~allow | deny */ 74 u32 complain; /* accumulates only used when ~allow & ~deny */ 75 u32 prompt; /* accumulates only used when ~allow & ~deny */ 77 u32 audit; /* set only when allow is set */ 78 u32 quiet; /* set only when ~allow | deny */ 79 u32 hide; /* set only when ~allow | deny */ [all …]
|
/openbmc/linux/drivers/nfc/st-nci/ |
H A D | st-nci.h | 65 * @FACTORY_MODE: Allow to set the driver into a mode where no secure element 67 * @HCI_CLEAR_ALL_PIPES: Allow to execute a HCI clear all pipes command. 69 * @HCI_DM_PUT_DATA: Allow to configure specific CLF registry as for example 71 * @HCI_DM_UPDATE_AID: Allow to configure an AID routing into the CLF routing 73 * @HCI_DM_GET_INFO: Allow to retrieve CLF information. 74 * @HCI_DM_GET_DATA: Allow to retrieve CLF configurable data such as low 76 * @HCI_DM_DIRECT_LOAD: Allow to load a firmware into the CLF. A complete 78 * @HCI_DM_RESET: Allow to run a CLF reset in order to "commit" CLF 80 * @HCI_GET_PARAM: Allow to retrieve an HCI CLF parameter (for example the 82 * @HCI_DM_FIELD_GENERATOR: Allow to generate different kind of RF [all …]
|
/openbmc/qemu/tests/ |
H A D | dbus-vmstate-daemon.sh | 39 <allow send_type="signal"/> 40 <allow send_requested_reply="true" send_type="method_return"/> 41 <allow send_requested_reply="true" send_type="error"/> 44 <allow receive_type="method_call"/> 45 <allow receive_type="method_return"/> 46 <allow receive_type="error"/> 47 <allow receive_type="signal"/> 49 <!-- Allow anyone to talk to the message bus --> 50 <allow send_destination="org.freedesktop.DBus" 52 <allow send_destination="org.freedesktop.DBus" [all …]
|
/openbmc/linux/tools/testing/selftests/tc-testing/tc-tests/actions/ |
H A D | ife.json | 17 "cmdUnderTest": "$TC actions add action ife encode allow mark pass index 2", 20 …"matchPattern": "action order [0-9]*: ife encode action pass.*type 0[xX]ED3E.*allow mark.*index 2", 65 "cmdUnderTest": "$TC actions add action ife encode allow mark continue index 2", 68 …"matchPattern": "action order [0-9]*: ife encode action continue.*type 0[xX]ED3E.*allow mark.*inde… 207 "cmdUnderTest": "$TC actions add action ife encode allow prio pass index 9", 210 …"matchPattern": "action order [0-9]*: ife encode action pass.*type 0[xX]ED3E.*allow prio.*index 9", 279 "cmdUnderTest": "$TC actions add action ife encode allow prio drop index 9", 282 …"matchPattern": "action order [0-9]*: ife encode action drop.*type 0[xX]ED3E.*allow prio.*index 9", 397 "cmdUnderTest": "$TC actions add action ife encode allow tcindex pass index 1", 400 …"matchPattern": "action order [0-9]*: ife encode action pass.*type 0[xX]ED3E.*allow tcindex.*index… [all …]
|
/openbmc/openbmc/meta-openembedded/meta-initramfs/recipes-devtools/klibc/files/ |
H A D | klcc-cross-accept-clang-options.patch | 13 + # Allow clang options 16 + # Allow clang options 19 + # Allow clang options 22 + # Allow clang options 25 + # Allow clang options 28 + # Allow clang options 31 + # Allow clang options 34 + # Allow clang options
|
/openbmc/linux/drivers/nfc/st21nfca/ |
H A D | st21nfca.h | 74 * @FACTORY_MODE: Allow to set the driver into a mode where no secure element 76 * @HCI_CLEAR_ALL_PIPES: Allow to execute a HCI clear all pipes command. 78 * @HCI_DM_PUT_DATA: Allow to configure specific CLF registry as for example 80 * @HCI_DM_UPDATE_AID: Allow to configure an AID routing into the CLF routing 82 * @HCI_DM_GET_INFO: Allow to retrieve CLF information. 83 * @HCI_DM_GET_DATA: Allow to retrieve CLF configurable data such as low 85 * @HCI_DM_LOAD: Allow to load a firmware into the CLF. A complete 87 * @HCI_DM_RESET: Allow to run a CLF reset in order to "commit" CLF 89 * @HCI_GET_PARAM: Allow to retrieve an HCI CLF parameter (for example the 91 * @HCI_DM_FIELD_GENERATOR: Allow to generate different kind of RF [all …]
|
/openbmc/openbmc/meta-openembedded/meta-python/recipes-devtools/python/python3-requests-toolbelt/ |
H A D | 720240501dca0b4eacc3295665d7ced8719e11d2.patch | 53 - "Access-Control-Allow-Credentials": "true", 54 - "Access-Control-Allow-Origin": "*", 61 + "Access-Control-Allow-Credentials": [ 64 + "Access-Control-Allow-Origin": [ 123 - "Access-Control-Allow-Credentials": "true", 124 - "Access-Control-Allow-Origin": "*", 131 + "Access-Control-Allow-Credentials": [ 134 + "Access-Control-Allow-Origin": [ 193 - "Access-Control-Allow-Credentials": "true", 194 - "Access-Control-Allow-Origin": "*", [all …]
|
/openbmc/linux/drivers/gpu/drm/amd/display/dc/dcn10/ |
H A D | dcn10_hubbub.c | 91 void hubbub1_allow_self_refresh_control(struct hubbub *hubbub, bool allow) in hubbub1_allow_self_refresh_control() argument 95 * DCHUBBUB_ARB_ALLOW_SELF_REFRESH_FORCE_ENABLE = 1 means do not allow stutter in hubbub1_allow_self_refresh_control() 96 * DCHUBBUB_ARB_ALLOW_SELF_REFRESH_FORCE_ENABLE = 0 means allow stutter in hubbub1_allow_self_refresh_control() 101 DCHUBBUB_ARB_ALLOW_SELF_REFRESH_FORCE_ENABLE, !allow); in hubbub1_allow_self_refresh_control() 121 /* pstate latency is ~20us so if we wait over 40us and pstate allow in hubbub1_verify_allow_pstate_change_high() 137 /* we hacked to force pstate allow to prevent hang last time in hubbub1_verify_allow_pstate_change_high() 151 * 0: Pipe0 Plane0 Allow Pstate Change in hubbub1_verify_allow_pstate_change_high() 152 * 1: Pipe0 Plane1 Allow Pstate Change in hubbub1_verify_allow_pstate_change_high() 153 * 2: Pipe0 Cursor0 Allow Pstate Change in hubbub1_verify_allow_pstate_change_high() 154 * 3: Pipe0 Cursor1 Allow Pstate Change in hubbub1_verify_allow_pstate_change_high() [all …]
|
/openbmc/linux/tools/scripts/ |
H A D | Makefile.include | 48 define allow-override 61 $(call allow-override,CC,$(LLVM_PREFIX)clang$(LLVM_SUFFIX)) 62 $(call allow-override,AR,$(LLVM_PREFIX)llvm-ar$(LLVM_SUFFIX)) 63 $(call allow-override,LD,$(LLVM_PREFIX)ld.lld$(LLVM_SUFFIX)) 64 $(call allow-override,CXX,$(LLVM_PREFIX)clang++$(LLVM_SUFFIX)) 65 $(call allow-override,STRIP,$(LLVM_PREFIX)llvm-strip$(LLVM_SUFFIX)) 67 # Allow setting various cross-compile vars or setting CROSS_COMPILE as a prefix. 68 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 69 $(call allow-override,AR,$(CROSS_COMPILE)ar) 70 $(call allow-override,LD,$(CROSS_COMPILE)ld) [all …]
|
/openbmc/qemu/tests/unit/ |
H A D | test-authz-listfile.c | 67 "default-allow.cfg", in test_authz_default_allow() 68 "{ \"policy\": \"allow\" }"); in test_authz_default_allow() 90 " \"policy\": \"allow\" }"); in test_authz_explicit_deny() 108 "explicit-allow.cfg", in test_authz_explicit_allow() 111 " \"policy\": \"allow\"," in test_authz_explicit_allow() 135 " \"policy\": \"allow\"," in test_authz_complex() 138 " \"policy\": \"allow\"," in test_authz_complex() 144 " \"policy\": \"allow\"," in test_authz_complex() 185 g_test_add_func("/auth/list/default/allow", test_authz_default_allow); in main() 187 g_test_add_func("/auth/list/explicit/allow", test_authz_explicit_allow); in main()
|
/openbmc/linux/Documentation/admin-guide/cgroup-v1/ |
H A D | devices.rst | 24 An entry is added using devices.allow, and removed using 27 echo 'c 1:3 mr' > /sys/fs/cgroup/1/devices.allow 36 echo a > /sys/fs/cgroup/1/devices.allow 74 A allow "b 8:* rwm", "c 116:1 rw" 103 # echo "c *:3 rwm" >A/devices.allow 113 # echo "c 2:3 rwm" >B/devices.allow 114 # echo "c 50:3 r" >B/devices.allow 118 # echo "c *:3 rwm" >B/devices.allow 120 Allowing or denying all by writing 'a' to devices.allow or devices.deny will 126 device cgroups is implemented internally using a behavior (ALLOW, DENY) and a
|
/openbmc/linux/lib/ |
H A D | Kconfig.kgdb | 83 bool "KGDB: Allow debugging with traps in notifiers" 88 exception handler which will allow kgdb to step through a 108 0x0002 - allow arbitrary reads from memory and symbol lookup 109 0x0004 - allow arbitrary writes to memory 110 0x0008 - allow current register state to be inspected 111 0x0010 - allow current register state to be modified 112 0x0020 - allow passive inspection (backtrace, process list, lsmod) 113 0x0040 - allow flow control management (breakpoint, single step) 115 0x0100 - allow machine to be rebooted
|
/openbmc/btbridge/ |
H A D | org.openbmc.HostIpmi.conf | 14 <allow own="org.openbmc.HostIpmi"/> 15 <allow send_destination="org.openbmc.HostIpmi"/> 16 <allow receive_sender="org.openbmc.HostIpmi"/> 20 <allow send_destination="org.openbmc.HostIpmi"/> 21 <allow receive_sender="org.openbmc.HostIpmi"/>
|
/openbmc/qemu/tests/qemu-iotests/tests/ |
H A D | fuse-allow-other.out | 1 QA output created by fuse-allow-other 6 --- allow-other=off --- 15 'allow-other': 'off' 35 --- allow-other=on --- 44 'allow-other': 'on' 62 --- allow-other=auto --- 71 'allow-other': 'auto'
|
H A D | fuse-allow-other | 4 # Test FUSE exports' allow-other option 91 # $1: allow-other value ('on'/'off'/'auto') 104 'allow-other': '$1'" 116 # Should only work with allow-other: Otherwise, no permissions can be 126 # This is already prevented by the permissions (without allow-other, FUSE 131 # to stat the export as nobody; it should not work without allow-other, 160 echo "--- allow-other=$ao ---"
|
/openbmc/qemu/tests/qapi-schema/ |
H A D | allow-preconfig-test.err | 1 allow-preconfig-test.json: In command 'allow-preconfig-test': 2 allow-preconfig-test.json:2: flag 'allow-preconfig' may only use true value
|
/openbmc/linux/arch/arm64/boot/dts/qcom/ |
H A D | msm8994-msft-lumia-octagon.dtsi | 586 regulator-allow-set-load; 593 regulator-allow-set-load; 601 regulator-allow-set-load; 623 regulator-allow-set-load; 631 regulator-allow-set-load; 645 regulator-allow-set-load; 670 regulator-allow-set-load; 678 regulator-allow-set-load; 686 regulator-allow-set-load; 694 regulator-allow-set-load; [all …]
|
/openbmc/openbmc/poky/meta/recipes-support/user-creation/files/ |
H A D | system-xuser.conf | 5 <allow send_destination="net.connman"/> 6 <allow send_destination="net.connman.vpn"/> 7 <allow send_destination="org.ofono"/> 8 <allow send_destination="org.bluez"/>
|
/openbmc/linux/rust/bindings/ |
H A D | lib.rs | 13 #![cfg_attr(test, allow(deref_nullptr))] 14 #![cfg_attr(test, allow(unaligned_references))] 15 #![cfg_attr(test, allow(unsafe_op_in_unsafe_fn))] 16 #![allow( 40 #[allow(dead_code)]
|
/openbmc/linux/rust/uapi/ |
H A D | lib.rs | 12 #![cfg_attr(test, allow(deref_nullptr))] 13 #![cfg_attr(test, allow(unaligned_references))] 14 #![cfg_attr(test, allow(unsafe_op_in_unsafe_fn))] 15 #![allow(
|
/openbmc/linux/samples/seccomp/ |
H A D | bpf-fancy.c | 38 SYSCALL(__NR_exit, ALLOW), in main() 39 SYSCALL(__NR_exit_group, ALLOW), in main() 51 ALLOW, in main() 68 JLT(sizeof(msg1), ALLOW), in main() 73 JLT(sizeof(msg2), ALLOW), in main() 78 JLT(sizeof(buf), ALLOW), in main()
|
/openbmc/linux/drivers/net/wireless/ath/ |
H A D | hw.c | 97 * allow = (IFRAME-01 & bssid_mask) == (bssid_mask & MAC) ? 1 : 0; 98 * --> allow = (0110 & 0010) == (0010 & 0001) ? 1 : 0; 99 * --> allow = (0010) == 0000 ? 1 : 0; 100 * --> allow = 0 104 * IFRAME-02: 0001 (we should allow) 106 * allow = (IFRAME-02 & bssid_mask) == (bssid_mask & MAC) ? 1 : 0; 107 * --> allow = (0001 & 0010) == (0010 & 0001) ? 1 :0; 108 * --> allow = (0000) == (0000) 109 * --> allow = 1
|
/openbmc/linux/arch/arm64/kvm/hyp/include/nvhe/ |
H A D | fixed_config.h | 17 * The ALLOW masks represent a bitmask of feature fields that are allowed 25 * The approach taken for protected VMs is to allow features that are: 33 * Allow for protected VMs: 63 * Allow for protected VMs: 73 * Allow for protected VMs: 97 * Allow for protected VMs: 115 * Allow for protected VMs:
|
/openbmc/openbmc/meta-openembedded/meta-python/recipes-devtools/python/python3-flask-cors/ |
H A D | CVE-2024-6221.patch | 23 …headers in this list will be included in the :http:header:`Access-Control-Allow-Headers` response … 26 + If True, the response header :http:header:`Access-Control-Allow-Private-Network` 30 + If False, the reponse header :http:header:`Access-Control-Allow-Private-Network` 36 + :http:header:`Access-Control-Allow-Private-Network` will not be set. 92 + If True, the response header `Access-Control-Allow-Private-Network` 96 + If False, the reponse header `Access-Control-Allow-Private-Network` 102 + `Access-Control-Allow-Private-Network` will not be set.
|