Home
last modified time | relevance | path

Searched full:allow (Results 1 – 25 of 5401) sorted by relevance

12345678910>>...217

/openbmc/linux/include/uapi/linux/
H A Dcapability.h171 * Allow taking bits out of capability bounding set
172 * Allow modification of the securebits for a process
177 /* Allow modification of S_IMMUTABLE and S_APPEND file attributes */
186 /* Allow broadcasting, listen to multicast */
190 /* Allow interface configuration */
191 /* Allow administration of IP firewall, masquerading and accounting */
192 /* Allow setting debug option on sockets */
193 /* Allow modification of routing tables */
194 /* Allow setting arbitrary process / process group ownership on
196 /* Allow binding to any address for transparent proxying (also via NET_RAW) */
[all …]
/openbmc/linux/security/apparmor/include/
H A Dperms.h67 u32 allow; member
68 u32 deny; /* explicit deny, or conflict if allow also set */
70 u32 subtree; /* allow perm on full subtree only when allow is set */
71 u32 cond; /* set only when ~allow and ~deny */
73 u32 kill; /* set only when ~allow | deny */
74 u32 complain; /* accumulates only used when ~allow & ~deny */
75 u32 prompt; /* accumulates only used when ~allow & ~deny */
77 u32 audit; /* set only when allow is set */
78 u32 quiet; /* set only when ~allow | deny */
79 u32 hide; /* set only when ~allow | deny */
[all …]
/openbmc/linux/drivers/nfc/st-nci/
H A Dst-nci.h65 * @FACTORY_MODE: Allow to set the driver into a mode where no secure element
67 * @HCI_CLEAR_ALL_PIPES: Allow to execute a HCI clear all pipes command.
69 * @HCI_DM_PUT_DATA: Allow to configure specific CLF registry as for example
71 * @HCI_DM_UPDATE_AID: Allow to configure an AID routing into the CLF routing
73 * @HCI_DM_GET_INFO: Allow to retrieve CLF information.
74 * @HCI_DM_GET_DATA: Allow to retrieve CLF configurable data such as low
76 * @HCI_DM_DIRECT_LOAD: Allow to load a firmware into the CLF. A complete
78 * @HCI_DM_RESET: Allow to run a CLF reset in order to "commit" CLF
80 * @HCI_GET_PARAM: Allow to retrieve an HCI CLF parameter (for example the
82 * @HCI_DM_FIELD_GENERATOR: Allow to generate different kind of RF
[all …]
/openbmc/qemu/tests/
H A Ddbus-vmstate-daemon.sh39 <allow send_type="signal"/>
40 <allow send_requested_reply="true" send_type="method_return"/>
41 <allow send_requested_reply="true" send_type="error"/>
44 <allow receive_type="method_call"/>
45 <allow receive_type="method_return"/>
46 <allow receive_type="error"/>
47 <allow receive_type="signal"/>
49 <!-- Allow anyone to talk to the message bus -->
50 <allow send_destination="org.freedesktop.DBus"
52 <allow send_destination="org.freedesktop.DBus"
[all …]
/openbmc/linux/tools/testing/selftests/tc-testing/tc-tests/actions/
H A Dife.json17 "cmdUnderTest": "$TC actions add action ife encode allow mark pass index 2",
20 …"matchPattern": "action order [0-9]*: ife encode action pass.*type 0[xX]ED3E.*allow mark.*index 2",
65 "cmdUnderTest": "$TC actions add action ife encode allow mark continue index 2",
68 …"matchPattern": "action order [0-9]*: ife encode action continue.*type 0[xX]ED3E.*allow mark.*inde…
207 "cmdUnderTest": "$TC actions add action ife encode allow prio pass index 9",
210 …"matchPattern": "action order [0-9]*: ife encode action pass.*type 0[xX]ED3E.*allow prio.*index 9",
279 "cmdUnderTest": "$TC actions add action ife encode allow prio drop index 9",
282 …"matchPattern": "action order [0-9]*: ife encode action drop.*type 0[xX]ED3E.*allow prio.*index 9",
397 "cmdUnderTest": "$TC actions add action ife encode allow tcindex pass index 1",
400 …"matchPattern": "action order [0-9]*: ife encode action pass.*type 0[xX]ED3E.*allow tcindex.*index…
[all …]
/openbmc/openbmc/meta-openembedded/meta-initramfs/recipes-devtools/klibc/files/
H A Dklcc-cross-accept-clang-options.patch13 + # Allow clang options
16 + # Allow clang options
19 + # Allow clang options
22 + # Allow clang options
25 + # Allow clang options
28 + # Allow clang options
31 + # Allow clang options
34 + # Allow clang options
/openbmc/linux/drivers/nfc/st21nfca/
H A Dst21nfca.h74 * @FACTORY_MODE: Allow to set the driver into a mode where no secure element
76 * @HCI_CLEAR_ALL_PIPES: Allow to execute a HCI clear all pipes command.
78 * @HCI_DM_PUT_DATA: Allow to configure specific CLF registry as for example
80 * @HCI_DM_UPDATE_AID: Allow to configure an AID routing into the CLF routing
82 * @HCI_DM_GET_INFO: Allow to retrieve CLF information.
83 * @HCI_DM_GET_DATA: Allow to retrieve CLF configurable data such as low
85 * @HCI_DM_LOAD: Allow to load a firmware into the CLF. A complete
87 * @HCI_DM_RESET: Allow to run a CLF reset in order to "commit" CLF
89 * @HCI_GET_PARAM: Allow to retrieve an HCI CLF parameter (for example the
91 * @HCI_DM_FIELD_GENERATOR: Allow to generate different kind of RF
[all …]
/openbmc/openbmc/meta-openembedded/meta-python/recipes-devtools/python/python3-requests-toolbelt/
H A D720240501dca0b4eacc3295665d7ced8719e11d2.patch53 - "Access-Control-Allow-Credentials": "true",
54 - "Access-Control-Allow-Origin": "*",
61 + "Access-Control-Allow-Credentials": [
64 + "Access-Control-Allow-Origin": [
123 - "Access-Control-Allow-Credentials": "true",
124 - "Access-Control-Allow-Origin": "*",
131 + "Access-Control-Allow-Credentials": [
134 + "Access-Control-Allow-Origin": [
193 - "Access-Control-Allow-Credentials": "true",
194 - "Access-Control-Allow-Origin": "*",
[all …]
/openbmc/linux/drivers/gpu/drm/amd/display/dc/dcn10/
H A Ddcn10_hubbub.c91 void hubbub1_allow_self_refresh_control(struct hubbub *hubbub, bool allow) in hubbub1_allow_self_refresh_control() argument
95 * DCHUBBUB_ARB_ALLOW_SELF_REFRESH_FORCE_ENABLE = 1 means do not allow stutter in hubbub1_allow_self_refresh_control()
96 * DCHUBBUB_ARB_ALLOW_SELF_REFRESH_FORCE_ENABLE = 0 means allow stutter in hubbub1_allow_self_refresh_control()
101 DCHUBBUB_ARB_ALLOW_SELF_REFRESH_FORCE_ENABLE, !allow); in hubbub1_allow_self_refresh_control()
121 /* pstate latency is ~20us so if we wait over 40us and pstate allow in hubbub1_verify_allow_pstate_change_high()
137 /* we hacked to force pstate allow to prevent hang last time in hubbub1_verify_allow_pstate_change_high()
151 * 0: Pipe0 Plane0 Allow Pstate Change in hubbub1_verify_allow_pstate_change_high()
152 * 1: Pipe0 Plane1 Allow Pstate Change in hubbub1_verify_allow_pstate_change_high()
153 * 2: Pipe0 Cursor0 Allow Pstate Change in hubbub1_verify_allow_pstate_change_high()
154 * 3: Pipe0 Cursor1 Allow Pstate Change in hubbub1_verify_allow_pstate_change_high()
[all …]
/openbmc/linux/tools/scripts/
H A DMakefile.include48 define allow-override
61 $(call allow-override,CC,$(LLVM_PREFIX)clang$(LLVM_SUFFIX))
62 $(call allow-override,AR,$(LLVM_PREFIX)llvm-ar$(LLVM_SUFFIX))
63 $(call allow-override,LD,$(LLVM_PREFIX)ld.lld$(LLVM_SUFFIX))
64 $(call allow-override,CXX,$(LLVM_PREFIX)clang++$(LLVM_SUFFIX))
65 $(call allow-override,STRIP,$(LLVM_PREFIX)llvm-strip$(LLVM_SUFFIX))
67 # Allow setting various cross-compile vars or setting CROSS_COMPILE as a prefix.
68 $(call allow-override,CC,$(CROSS_COMPILE)gcc)
69 $(call allow-override,AR,$(CROSS_COMPILE)ar)
70 $(call allow-override,LD,$(CROSS_COMPILE)ld)
[all …]
/openbmc/qemu/tests/unit/
H A Dtest-authz-listfile.c67 "default-allow.cfg", in test_authz_default_allow()
68 "{ \"policy\": \"allow\" }"); in test_authz_default_allow()
90 " \"policy\": \"allow\" }"); in test_authz_explicit_deny()
108 "explicit-allow.cfg", in test_authz_explicit_allow()
111 " \"policy\": \"allow\"," in test_authz_explicit_allow()
135 " \"policy\": \"allow\"," in test_authz_complex()
138 " \"policy\": \"allow\"," in test_authz_complex()
144 " \"policy\": \"allow\"," in test_authz_complex()
185 g_test_add_func("/auth/list/default/allow", test_authz_default_allow); in main()
187 g_test_add_func("/auth/list/explicit/allow", test_authz_explicit_allow); in main()
/openbmc/linux/Documentation/admin-guide/cgroup-v1/
H A Ddevices.rst24 An entry is added using devices.allow, and removed using
27 echo 'c 1:3 mr' > /sys/fs/cgroup/1/devices.allow
36 echo a > /sys/fs/cgroup/1/devices.allow
74 A allow "b 8:* rwm", "c 116:1 rw"
103 # echo "c *:3 rwm" >A/devices.allow
113 # echo "c 2:3 rwm" >B/devices.allow
114 # echo "c 50:3 r" >B/devices.allow
118 # echo "c *:3 rwm" >B/devices.allow
120 Allowing or denying all by writing 'a' to devices.allow or devices.deny will
126 device cgroups is implemented internally using a behavior (ALLOW, DENY) and a
/openbmc/linux/lib/
H A DKconfig.kgdb83 bool "KGDB: Allow debugging with traps in notifiers"
88 exception handler which will allow kgdb to step through a
108 0x0002 - allow arbitrary reads from memory and symbol lookup
109 0x0004 - allow arbitrary writes to memory
110 0x0008 - allow current register state to be inspected
111 0x0010 - allow current register state to be modified
112 0x0020 - allow passive inspection (backtrace, process list, lsmod)
113 0x0040 - allow flow control management (breakpoint, single step)
115 0x0100 - allow machine to be rebooted
/openbmc/btbridge/
H A Dorg.openbmc.HostIpmi.conf14 <allow own="org.openbmc.HostIpmi"/>
15 <allow send_destination="org.openbmc.HostIpmi"/>
16 <allow receive_sender="org.openbmc.HostIpmi"/>
20 <allow send_destination="org.openbmc.HostIpmi"/>
21 <allow receive_sender="org.openbmc.HostIpmi"/>
/openbmc/qemu/tests/qemu-iotests/tests/
H A Dfuse-allow-other.out1 QA output created by fuse-allow-other
6 --- allow-other=off ---
15 'allow-other': 'off'
35 --- allow-other=on ---
44 'allow-other': 'on'
62 --- allow-other=auto ---
71 'allow-other': 'auto'
H A Dfuse-allow-other4 # Test FUSE exports' allow-other option
91 # $1: allow-other value ('on'/'off'/'auto')
104 'allow-other': '$1'"
116 # Should only work with allow-other: Otherwise, no permissions can be
126 # This is already prevented by the permissions (without allow-other, FUSE
131 # to stat the export as nobody; it should not work without allow-other,
160 echo "--- allow-other=$ao ---"
/openbmc/qemu/tests/qapi-schema/
H A Dallow-preconfig-test.err1 allow-preconfig-test.json: In command 'allow-preconfig-test':
2 allow-preconfig-test.json:2: flag 'allow-preconfig' may only use true value
/openbmc/linux/arch/arm64/boot/dts/qcom/
H A Dmsm8994-msft-lumia-octagon.dtsi586 regulator-allow-set-load;
593 regulator-allow-set-load;
601 regulator-allow-set-load;
623 regulator-allow-set-load;
631 regulator-allow-set-load;
645 regulator-allow-set-load;
670 regulator-allow-set-load;
678 regulator-allow-set-load;
686 regulator-allow-set-load;
694 regulator-allow-set-load;
[all …]
/openbmc/openbmc/poky/meta/recipes-support/user-creation/files/
H A Dsystem-xuser.conf5 <allow send_destination="net.connman"/>
6 <allow send_destination="net.connman.vpn"/>
7 <allow send_destination="org.ofono"/>
8 <allow send_destination="org.bluez"/>
/openbmc/linux/rust/bindings/
H A Dlib.rs13 #![cfg_attr(test, allow(deref_nullptr))]
14 #![cfg_attr(test, allow(unaligned_references))]
15 #![cfg_attr(test, allow(unsafe_op_in_unsafe_fn))]
16 #![allow(
40 #[allow(dead_code)]
/openbmc/linux/rust/uapi/
H A Dlib.rs12 #![cfg_attr(test, allow(deref_nullptr))]
13 #![cfg_attr(test, allow(unaligned_references))]
14 #![cfg_attr(test, allow(unsafe_op_in_unsafe_fn))]
15 #![allow(
/openbmc/linux/samples/seccomp/
H A Dbpf-fancy.c38 SYSCALL(__NR_exit, ALLOW), in main()
39 SYSCALL(__NR_exit_group, ALLOW), in main()
51 ALLOW, in main()
68 JLT(sizeof(msg1), ALLOW), in main()
73 JLT(sizeof(msg2), ALLOW), in main()
78 JLT(sizeof(buf), ALLOW), in main()
/openbmc/linux/drivers/net/wireless/ath/
H A Dhw.c97 * allow = (IFRAME-01 & bssid_mask) == (bssid_mask & MAC) ? 1 : 0;
98 * --> allow = (0110 & 0010) == (0010 & 0001) ? 1 : 0;
99 * --> allow = (0010) == 0000 ? 1 : 0;
100 * --> allow = 0
104 * IFRAME-02: 0001 (we should allow)
106 * allow = (IFRAME-02 & bssid_mask) == (bssid_mask & MAC) ? 1 : 0;
107 * --> allow = (0001 & 0010) == (0010 & 0001) ? 1 :0;
108 * --> allow = (0000) == (0000)
109 * --> allow = 1
/openbmc/linux/arch/arm64/kvm/hyp/include/nvhe/
H A Dfixed_config.h17 * The ALLOW masks represent a bitmask of feature fields that are allowed
25 * The approach taken for protected VMs is to allow features that are:
33 * Allow for protected VMs:
63 * Allow for protected VMs:
73 * Allow for protected VMs:
97 * Allow for protected VMs:
115 * Allow for protected VMs:
/openbmc/openbmc/meta-openembedded/meta-python/recipes-devtools/python/python3-flask-cors/
H A DCVE-2024-6221.patch23 …headers in this list will be included in the :http:header:`Access-Control-Allow-Headers` response …
26 + If True, the response header :http:header:`Access-Control-Allow-Private-Network`
30 + If False, the reponse header :http:header:`Access-Control-Allow-Private-Network`
36 + :http:header:`Access-Control-Allow-Private-Network` will not be set.
92 + If True, the response header `Access-Control-Allow-Private-Network`
96 + If False, the reponse header `Access-Control-Allow-Private-Network`
102 + `Access-Control-Allow-Private-Network` will not be set.

12345678910>>...217