/openbmc/qemu/tests/ |
H A D | dbus-vmstate-daemon.sh | 39 <allow send_type="signal"/> 40 <allow send_requested_reply="true" send_type="method_return"/> 41 <allow send_requested_reply="true" send_type="error"/> 44 <allow receive_type="method_call"/> 45 <allow receive_type="method_return"/> 46 <allow receive_type="error"/> 47 <allow receive_type="signal"/> 50 <allow send_destination="org.freedesktop.DBus" 52 <allow send_destination="org.freedesktop.DBus" 54 <allow send_destination="org.freedesktop.DBus" [all …]
|
/openbmc/linux/security/apparmor/include/ |
H A D | perms.h | 67 u32 allow; member 108 accum->allow &= addend->allow & ~addend->deny; in aa_perms_accum_raw() 109 accum->audit |= addend->audit & addend->allow; in aa_perms_accum_raw() 110 accum->quiet &= addend->quiet & ~addend->allow; in aa_perms_accum_raw() 111 accum->kill |= addend->kill & ~addend->allow; in aa_perms_accum_raw() 112 accum->complain |= addend->complain & ~addend->allow & ~addend->deny; in aa_perms_accum_raw() 113 accum->cond |= addend->cond & ~addend->allow & ~addend->deny; in aa_perms_accum_raw() 114 accum->hide &= addend->hide & ~addend->allow; in aa_perms_accum_raw() 115 accum->prompt |= addend->prompt & ~addend->allow & ~addend->deny; in aa_perms_accum_raw() 135 accum->allow &= addend->allow & ~accum->deny; in aa_perms_accum() [all …]
|
/openbmc/linux/tools/scripts/ |
H A D | Makefile.include | 48 define allow-override 61 $(call allow-override,CC,$(LLVM_PREFIX)clang$(LLVM_SUFFIX)) 62 $(call allow-override,AR,$(LLVM_PREFIX)llvm-ar$(LLVM_SUFFIX)) 63 $(call allow-override,LD,$(LLVM_PREFIX)ld.lld$(LLVM_SUFFIX)) 64 $(call allow-override,CXX,$(LLVM_PREFIX)clang++$(LLVM_SUFFIX)) 65 $(call allow-override,STRIP,$(LLVM_PREFIX)llvm-strip$(LLVM_SUFFIX)) 68 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 69 $(call allow-override,AR,$(CROSS_COMPILE)ar) 70 $(call allow-override,LD,$(CROSS_COMPILE)ld) 71 $(call allow-override,CXX,$(CROSS_COMPILE)g++) [all …]
|
/openbmc/btbridge/ |
H A D | org.openbmc.HostIpmi.conf | 14 <allow own="org.openbmc.HostIpmi"/> 15 <allow send_destination="org.openbmc.HostIpmi"/> 16 <allow receive_sender="org.openbmc.HostIpmi"/> 20 <allow send_destination="org.openbmc.HostIpmi"/> 21 <allow receive_sender="org.openbmc.HostIpmi"/>
|
/openbmc/linux/rust/bindings/ |
H A D | lib.rs | 13 #![cfg_attr(test, allow(deref_nullptr))] 14 #![cfg_attr(test, allow(unaligned_references))] 15 #![cfg_attr(test, allow(unsafe_op_in_unsafe_fn))] 16 #![allow( 40 #[allow(dead_code)]
|
/openbmc/linux/tools/tracing/rtla/ |
H A D | Makefile | 11 define allow-override 18 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 19 $(call allow-override,AR,$(CROSS_COMPILE)ar) 20 $(call allow-override,STRIP,$(CROSS_COMPILE)strip) 21 $(call allow-override,PKG_CONFIG,pkg-config) 22 $(call allow-override,LD_SO_CONF_PATH,/etc/ld.so.conf.d/) 23 $(call allow-override,LDCONFIG,ldconfig)
|
/openbmc/linux/tools/verification/rv/ |
H A D | Makefile | 11 define allow-override 18 $(call allow-override,CC,$(CROSS_COMPILE)gcc) 19 $(call allow-override,AR,$(CROSS_COMPILE)ar) 20 $(call allow-override,STRIP,$(CROSS_COMPILE)strip) 21 $(call allow-override,PKG_CONFIG,pkg-config) 22 $(call allow-override,LD_SO_CONF_PATH,/etc/ld.so.conf.d/) 23 $(call allow-override,LDCONFIG,ldconfig)
|
/openbmc/openbmc/poky/meta/recipes-support/user-creation/files/ |
H A D | system-xuser.conf | 5 <allow send_destination="net.connman"/> 6 <allow send_destination="net.connman.vpn"/> 7 <allow send_destination="org.ofono"/> 8 <allow send_destination="org.bluez"/>
|
/openbmc/qemu/tests/qapi-schema/ |
H A D | allow-preconfig-test.err | 1 allow-preconfig-test.json: In command 'allow-preconfig-test': 2 allow-preconfig-test.json:2: flag 'allow-preconfig' may only use true value
|
H A D | allow-preconfig-test.json | 1 # Check against allow-preconfig illegal value 2 { 'command': 'allow-preconfig-test', 'allow-preconfig': 'some-string' }
|
/openbmc/linux/rust/uapi/ |
H A D | lib.rs | 12 #![cfg_attr(test, allow(deref_nullptr))] 13 #![cfg_attr(test, allow(unaligned_references))] 14 #![cfg_attr(test, allow(unsafe_op_in_unsafe_fn))] 15 #![allow(
|
/openbmc/qemu/tests/qemu-iotests/tests/ |
H A D | fuse-allow-other.out | 1 QA output created by fuse-allow-other 6 --- allow-other=off --- 15 'allow-other': 'off' 35 --- allow-other=on --- 44 'allow-other': 'on' 62 --- allow-other=auto --- 71 'allow-other': 'auto'
|
/openbmc/linux/security/apparmor/ |
H A D | policy_compat.c | 103 perms->allow |= AA_MAY_GETATTR; in compute_fperms_allow() 107 perms->allow |= AA_MAY_CHANGE_PROFILE; in compute_fperms_allow() 109 perms->allow |= AA_MAY_ONEXEC; in compute_fperms_allow() 117 perms.allow = map_old_perms(dfa_user_allow(dfa, state)); in compute_fperms_user() 132 perms.allow = map_old_perms(dfa_other_allow(dfa, state)); in compute_fperms_other() 191 perms[state].allow = dfa_user_allow(xmatch, state); in compute_xmatch_perms() 215 perms.allow = dfa_user_allow(dfa, state); in compute_perms_entry() 230 perms.allow |= map_other(dfa_other_allow(dfa, state)); in compute_perms_entry() 232 perms.allow |= AA_MAY_LOCK; in compute_perms_entry() 234 perms.allow |= map_xbits(dfa_user_xbits(dfa, state)); in compute_perms_entry()
|
H A D | file.c | 127 ad.request = ad.request & ~perms->allow; in aa_audit_file() 143 ad.denied = ad.request & ~perms->allow; in aa_audit_file() 241 if (request & ~perms->allow) in __aa_path_perm() 360 if (!(lperms.allow & AA_MAY_LINK)) in profile_path_link() 374 if (!(perms.allow & AA_MAY_LINK)) { in profile_path_link() 381 if (!(perms.allow & AA_LINK_SUBSET)) in profile_path_link() 391 request = lperms.allow & ~AA_MAY_LINK; in profile_path_link() 392 lperms.allow &= perms.allow | AA_MAY_LINK; in profile_path_link() 394 request |= AA_AUDIT_FILE_MASK & (lperms.allow & ~perms.allow); in profile_path_link() 395 if (request & ~lperms.allow) { in profile_path_link() [all …]
|
/openbmc/linux/drivers/dma-buf/ |
H A D | selftest.c | 54 bool allow = true; in apply_subtest_filter() local 58 allow = false; in apply_subtest_filter() 69 if (allow) in apply_subtest_filter() 77 if (allow) in apply_subtest_filter() 82 result = allow; in apply_subtest_filter()
|
/openbmc/linux/drivers/misc/cb710/ |
H A D | debug.c | 13 static const u16 allow[CB710_REG_COUNT/16] = { variable 17 static const char *const prefix[ARRAY_SIZE(allow)] = { 26 return ((allow[block] >> offset) & mask) == mask; in allow_reg_read() 35 for (i = 0; i < ARRAY_SIZE(allow); ++i, reg += 16/(t/8)) { \ 63 for (i = 0; i < ARRAY_SIZE(allow); ++i, reg += 16/(t/8)) { \
|
/openbmc/phosphor-logging/dist/busconfig/ |
H A D | phosphor-logging.conf | 5 <allow own_prefix="xyz.openbmc_project.Logging"/> 6 <allow send_destination="xyz.openbmc_project.Logging"/> 10 <allow send_destination="xyz.openbmc_project.Logging"/>
|
/openbmc/openbmc/poky/meta/recipes-core/systemd/systemd/ |
H A D | org.freedesktop.hostname1_no_polkit.conf | 7 <allow own="org.freedesktop.hostname1"/> 8 <allow send_destination="org.freedesktop.hostname1"/> 9 <allow receive_sender="org.freedesktop.hostname1"/>
|
/openbmc/linux/arch/arm64/boot/dts/qcom/ |
H A D | msm8994-msft-lumia-octagon.dtsi | 586 regulator-allow-set-load; 593 regulator-allow-set-load; 601 regulator-allow-set-load; 623 regulator-allow-set-load; 631 regulator-allow-set-load; 645 regulator-allow-set-load; 670 regulator-allow-set-load; 678 regulator-allow-set-load; 686 regulator-allow-set-load; 694 regulator-allow-set-load; [all …]
|
H A D | sa8775p-ride.dtsi | 63 regulator-allow-set-load; 73 regulator-allow-set-load; 83 regulator-allow-set-load; 93 regulator-allow-set-load; 103 regulator-allow-set-load; 113 regulator-allow-set-load; 128 regulator-allow-set-load; 138 regulator-allow-set-load; 148 regulator-allow-set-load; 159 * FIXME: This should have regulator-allow-set-load but [all …]
|
H A D | sdm660-xiaomi-lavender.dts | 146 regulator-allow-set-load; 154 regulator-allow-set-load; 161 regulator-allow-set-load; 172 regulator-allow-set-load; 186 regulator-allow-set-load; 255 regulator-allow-set-load; 279 regulator-allow-set-load; 294 regulator-allow-set-load; 301 regulator-allow-set-load; 308 regulator-allow-set-load; [all …]
|
/openbmc/linux/Documentation/admin-guide/cgroup-v1/ |
H A D | devices.rst | 24 An entry is added using devices.allow, and removed using 27 echo 'c 1:3 mr' > /sys/fs/cgroup/1/devices.allow 36 echo a > /sys/fs/cgroup/1/devices.allow 74 A allow "b 8:* rwm", "c 116:1 rw" 103 # echo "c *:3 rwm" >A/devices.allow 113 # echo "c 2:3 rwm" >B/devices.allow 114 # echo "c 50:3 r" >B/devices.allow 118 # echo "c *:3 rwm" >B/devices.allow 120 Allowing or denying all by writing 'a' to devices.allow or devices.deny will
|
/openbmc/linux/rust/alloc/ |
H A D | lib.rs | 66 #![allow(unused_attributes)] 71 test(no_crate_inject, attr(allow(unused_variables), deny(warnings))) 91 #![allow(explicit_outlives_requirements)] 93 #![cfg_attr(not(bootstrap), allow(internal_features))] 94 #![cfg_attr(not(bootstrap), allow(rustdoc::redundant_explicit_links))] 273 #[allow(dead_code)] // Not used in all configurations
|
/openbmc/linux/fs/nfsd/ |
H A D | nfs4acl.c | 422 u32 allow; member 486 state->mask.allow |= astate->allow; in add_to_mask() 520 low_mode_from_nfs4(state->owner.allow, &pace->e_perm, flags); in posix_state_to_acl() 525 low_mode_from_nfs4(state->users->aces[i].perms.allow, in posix_state_to_acl() 533 low_mode_from_nfs4(state->group.allow, &pace->e_perm, flags); in posix_state_to_acl() 539 low_mode_from_nfs4(state->groups->aces[i].perms.allow, in posix_state_to_acl() 548 low_mode_from_nfs4(state->mask.allow, &pace->e_perm, flags); in posix_state_to_acl() 553 low_mode_from_nfs4(state->other.allow, &pace->e_perm, flags); in posix_state_to_acl() 561 astate->allow |= mask & ~astate->deny; in allow_bits() 567 astate->deny |= mask & ~astate->allow; in deny_bits() [all …]
|
/openbmc/linux/arch/arm/mach-s3c/ |
H A D | pm.c | 63 #define any_allowed(mask, allow) (((mask) & (allow)) != (allow)) argument
|