Home
last modified time | relevance | path

Searched full:allow (Results 1 – 25 of 3592) sorted by relevance

12345678910>>...144

/openbmc/linux/include/uapi/linux/
Dcapability.h
/openbmc/qemu/tests/
H A Ddbus-vmstate-daemon.sh39 <allow send_type="signal"/>
40 <allow send_requested_reply="true" send_type="method_return"/>
41 <allow send_requested_reply="true" send_type="error"/>
44 <allow receive_type="method_call"/>
45 <allow receive_type="method_return"/>
46 <allow receive_type="error"/>
47 <allow receive_type="signal"/>
49 <!-- Allow anyone to talk to the message bus -->
50 <allow send_destination="org.freedesktop.DBus"
52 <allow send_destination="org.freedesktop.DBus"
[all …]
/openbmc/linux/drivers/nfc/st-nci/
Dst-nci.h
/openbmc/linux/tools/testing/selftests/tc-testing/tc-tests/actions/
Dife.json
/openbmc/openbmc/meta-openembedded/meta-initramfs/recipes-devtools/klibc/files/
H A Dklcc-cross-accept-clang-options.patch13 + # Allow clang options
16 + # Allow clang options
19 + # Allow clang options
22 + # Allow clang options
25 + # Allow clang options
28 + # Allow clang options
31 + # Allow clang options
34 + # Allow clang options
/openbmc/linux/drivers/nfc/st21nfca/
Dst21nfca.h
/openbmc/qemu/rust/
H A DCargo.toml26 # and ensures that we do not have misspelled allow() attributes.
27 unknown_lints = "allow"
33 private_intra_doc_links = "allow"
44 result_unit_err = "allow"
47 unused_self = "allow"
49 upper_case_acronyms = "allow"
51 # default-allow lints
/openbmc/openbmc/meta-openembedded/meta-python/recipes-devtools/python/python3-requests-toolbelt/
H A D720240501dca0b4eacc3295665d7ced8719e11d2.patch53 - "Access-Control-Allow-Credentials": "true",
54 - "Access-Control-Allow-Origin": "*",
61 + "Access-Control-Allow-Credentials": [
64 + "Access-Control-Allow-Origin": [
123 - "Access-Control-Allow-Credentials": "true",
124 - "Access-Control-Allow-Origin": "*",
131 + "Access-Control-Allow-Credentials": [
134 + "Access-Control-Allow-Origin": [
193 - "Access-Control-Allow-Credentials": "true",
194 - "Access-Control-Allow-Origin": "*",
[all …]
/openbmc/btbridge/
H A Dorg.openbmc.HostIpmi.conf14 <allow own="org.openbmc.HostIpmi"/>
15 <allow send_destination="org.openbmc.HostIpmi"/>
16 <allow receive_sender="org.openbmc.HostIpmi"/>
20 <allow send_destination="org.openbmc.HostIpmi"/>
21 <allow receive_sender="org.openbmc.HostIpmi"/>
/openbmc/linux/tools/scripts/
DMakefile.include
/openbmc/qemu/tests/unit/
H A Dtest-authz-listfile.c67 "default-allow.cfg", in test_authz_default_allow()
68 "{ \"policy\": \"allow\" }"); in test_authz_default_allow()
90 " \"policy\": \"allow\" }"); in test_authz_explicit_deny()
108 "explicit-allow.cfg", in test_authz_explicit_allow()
111 " \"policy\": \"allow\"," in test_authz_explicit_allow()
135 " \"policy\": \"allow\"," in test_authz_complex()
138 " \"policy\": \"allow\"," in test_authz_complex()
144 " \"policy\": \"allow\"," in test_authz_complex()
185 g_test_add_func("/auth/list/default/allow", test_authz_default_allow); in main()
187 g_test_add_func("/auth/list/explicit/allow", test_authz_explicit_allow); in main()
/openbmc/linux/Documentation/admin-guide/cgroup-v1/
Ddevices.rst
/openbmc/qemu/tests/qapi-schema/
H A Dallow-preconfig-test.err1 allow-preconfig-test.json: In command 'allow-preconfig-test':
2 allow-preconfig-test.json:2: flag 'allow-preconfig' may only use true value
H A Dallow-preconfig-test.json1 # Check against allow-preconfig illegal value
2 { 'command': 'allow-preconfig-test', 'allow-preconfig': 'some-string' }
/openbmc/openbmc/poky/meta/recipes-support/user-creation/files/
H A Dsystem-xuser.conf5 <allow send_destination="net.connman"/>
6 <allow send_destination="net.connman.vpn"/>
7 <allow send_destination="org.ofono"/>
8 <allow send_destination="org.bluez"/>
/openbmc/qemu/tests/qemu-iotests/tests/
H A Dfuse-allow-other.out1 QA output created by fuse-allow-other
6 --- allow-other=off ---
15 'allow-other': 'off'
35 --- allow-other=on ---
44 'allow-other': 'on'
62 --- allow-other=auto ---
71 'allow-other': 'auto'
H A Dfuse-allow-other4 # Test FUSE exports' allow-other option
91 # $1: allow-other value ('on'/'off'/'auto')
104 'allow-other': '$1'"
116 # Should only work with allow-other: Otherwise, no permissions can be
126 # This is already prevented by the permissions (without allow-other, FUSE
131 # to stat the export as nobody; it should not work without allow-other,
160 echo "--- allow-other=$ao ---"
/openbmc/linux/samples/seccomp/
Dbpf-fancy.c
/openbmc/qemu/rust/bits/src/
H A Dlib.rs106 $( #[allow(dead_code)] $(#[$const_meta])*
112 #[allow(dead_code)]
118 #[allow(dead_code)]
124 #[allow(dead_code)]
130 #[allow(dead_code)]
136 #[allow(dead_code)]
142 #[allow(dead_code)]
148 #[allow(dead_code)]
154 #[allow(dead_code)]
160 #[allow(dead_code)]
[all …]
/openbmc/openbmc/poky/meta/recipes-devtools/distcc/files/
H A Ddistcc42 ALLOW=""
45 ALLOW="$ALLOW --allow $net"
64 --exec $DAEMON -- $DAEMON_ARGS $ALLOW ||
96 --exec $DAEMON -- $DAEMON_ARGS $ALLOW ||
/openbmc/openbmc/meta-openembedded/meta-python/recipes-devtools/python/python3-flask-cors/
H A DCVE-2024-6221.patch23 …headers in this list will be included in the :http:header:`Access-Control-Allow-Headers` response …
26 + If True, the response header :http:header:`Access-Control-Allow-Private-Network`
30 + If False, the reponse header :http:header:`Access-Control-Allow-Private-Network`
36 + :http:header:`Access-Control-Allow-Private-Network` will not be set.
92 + If True, the response header `Access-Control-Allow-Private-Network`
96 + If False, the reponse header `Access-Control-Allow-Private-Network`
102 + `Access-Control-Allow-Private-Network` will not be set.
/openbmc/openbmc-build-scripts/config/gitlint/
H A Dblock_comment.py25 # allow a quoted string to be over the line limit
41 # allow footnote url links to be as long as needed example
47 # allow signed-off-by
51 # allow Fixes
/openbmc/phosphor-logging/dist/busconfig/
H A Dphosphor-logging.conf5 <allow own_prefix="xyz.openbmc_project.Logging"/>
6 <allow send_destination="xyz.openbmc_project.Logging"/>
10 <allow send_destination="xyz.openbmc_project.Logging"/>
/openbmc/openbmc/poky/meta/recipes-core/systemd/systemd/
H A Dorg.freedesktop.hostname1_no_polkit.conf7 <allow own="org.freedesktop.hostname1"/>
8 <allow send_destination="org.freedesktop.hostname1"/>
9 <allow receive_sender="org.freedesktop.hostname1"/>
/openbmc/openbmc/meta-google/recipes-phosphor/flash/google-key/
H A Dverify-bmc-image.sh17 echo "$ARG0 [--allow-dev] <image file> <sig file>" >&2
21 opts="$(getopt -o 'd' -l 'allow-dev' -- "$@")" || exit
26 --allow-dev|-d)
54 command gpg --batch --allow-non-selfsigned-uid --no-tty "$@"

12345678910>>...144