/third_party/selinux/libselinux/man/man3/ |
D | avc_add_callback.3 | 35 …dditional action when a policy change, usually a policy reload, causes permissions to be granted o… 49 specify the source and target SID's, target class, and specific permissions that the callback wishe… 81 Previously denied permissions are now granted for 87 indicates the permissions to grant. 90 Previously granted permissions are now conditionally revoked for 96 indicates the permissions to revoke. The callback should set 100 which are retained as migrated permissions. Note that 105 Previously granted permissions are now unconditionally revoked for 111 indicates the permissions to revoke. 117 The permissions given by [all …]
|
D | avc_has_perm.3 | 46 classes or permissions as inputs, use 62 fixed constants for the classes and permissions to 77 permissions are granted 82 interpreting the permissions 87 … a cache entry with the resulting decision. The granting or denial of permissions is audited in a… 141 If requested permissions are granted, zero is returned. If requested permissions are denied or an … 147 unchanged even if permissions were denied.
|
/third_party/curl/tests/data/ |
D | test575 | 104 This file should have permissions 444 105 This file should have permissions 666 106 This file should have permissions 777 109 This file should have permissions 444 110 This file should have permissions 666 111 This file should have permissions 777 114 This file should have permissions 444 115 This file should have permissions 666 116 This file should have permissions 777
|
D | test576 | 41 Permissions: rwxrwxrwx (parsed => 777) 50 Permissions: rwxrwxrwx (parsed => 777) 59 Permissions: r--r--r-- (parsed => 444) 67 This file should have permissions 444 72 Permissions: rw-rw-rw- (parsed => 666) 80 This file should have permissions 666 85 Permissions: rwxrwxrwx (parsed => 777) 93 This file should have permissions 777 98 Permissions: --S--S--t (parsed => 7001) 107 Permissions: --s--s--T (parsed => 7110) [all …]
|
D | test574 | 86 This file should have permissions 444 87 This file should have permissions 666 88 This file should have permissions 777 91 This file should have permissions 444 92 This file should have permissions 666 93 This file should have permissions 777
|
D | test1113 | 87 This file should have permissions 444 88 This file should have permissions 666 89 This file should have permissions 777 92 This file should have permissions 444 93 This file should have permissions 666 94 This file should have permissions 777
|
/third_party/skia/third_party/externals/swiftshader/src/Reactor/ |
D | ExecutableMemory.cpp | 12 // See the License for the specific language governing permissions and 105 DWORD permissionsToProtectMode(int permissions) in permissionsToProtectMode() argument 107 switch(permissions) in permissionsToProtectMode() 125 int permissionsToMmapProt(int permissions) in permissionsToMmapProt() argument 128 if(permissions & PERMISSION_READ) in permissionsToMmapProt() 132 if(permissions & PERMISSION_WRITE) in permissionsToMmapProt() 136 if(permissions & PERMISSION_EXECUTE) in permissionsToMmapProt() 200 zx_vm_option_t permissionsToZxVmOptions(int permissions) in permissionsToZxVmOptions() argument 203 if(permissions & PERMISSION_READ) in permissionsToZxVmOptions() 207 if(permissions & PERMISSION_WRITE) in permissionsToZxVmOptions() [all …]
|
D | ExecutableMemory.hpp | 12 // See the License for the specific language governing permissions and 33 // Allocates memory with the specified permissions. If |need_exec| is true then 35 void *allocateMemoryPages(size_t bytes, int permissions, bool need_exec); 37 // Sets permissions for memory allocated with allocateMemoryPages(). 38 void protectMemoryPages(void *memory, size_t bytes, int permissions);
|
/third_party/ltp/testcases/kernel/fs/acl/ |
D | tacl_xattr.sh | 164 # The permissions bit limit user's act 198 # ACL_USER_OBJ are a superset of the permissions specified 213 printf "\t permissions, but operation failed [ Physical Directory ]\n" 215 printf "\nSUCCESS: ACL_USER_OBJ entry contains the owner execute permissions,\n" 223 printf "\t permissions, but operation failed [ Symlink Directory ]\n" 225 printf "\nSUCCESS: ACL_USER_OBJ entry contains the owner execute permissions,\n" 239 printf "\t permissions, but operation failed [ Physical Directory ]\n" 241 printf "\nSUCCESS: ACL_USER_OBJ entry contains the owner write permissions,\n" 249 printf "\t permissions, but operation failed [ Symlink Directory ]\n" 251 printf "\nSUCCESS: ACL_USER_OBJ entry contains the owner write permissions,\n" [all …]
|
/third_party/ntfs-3g/src/ |
D | ntfs-3g.8.in | 31 provides standard management of file ownership and permissions, including 60 full read, write, execution and directory browsing permissions. 61 You can also assign permissions to a single user by using the 76 But, by setting the \fBpermissions\fR option, you can benefit from the full 77 ownership and permissions features as defined by POSIX. Moreover, by defining 78 a Windows-to-Linux user mapping, the ownerships and permissions are even 118 .B permissions 176 Set the bitmask of the directory permissions that are not 188 Set the bitmask of the file permissions that are not present. 221 compatibility. The \fBpermissions\fR (or **acl**) option or a valid user [all …]
|
/third_party/node/deps/v8/src/wasm/ |
D | memory-protection-key.h | 35 // Permissions for memory protection keys on top of the page's permissions. 45 // our definitions of the permissions is consistent with the ones in glibc. 75 // Returns true if changing permissions and key was successful. (Returns a bool 77 // The {page_permissions} are the permissions of the page, not the key. For 78 // changing the permissions of the key, use 84 // Set the key's permissions. {key} must be valid, i.e. not 87 int key, MemoryProtectionKeyPermission permissions); 89 // Get the permissions of the protection key {key} for the current thread.
|
/third_party/selinux/libsepol/tests/policies/test-neverallow/ |
D | policy.conf | 167 ## Test 15 (extended permissions - standard allow) 174 ## Test 16 (extended permissions - allowxperm) 182 ## Test 17 (extended permissions - allowxperm mismatch) 190 ## Test 18 (extended permissions - allowxperm range I) 198 ## Test 19 (extended permissions - allowxperm range II) 206 ## Test 20 (extended permissions - misc targets I) 216 ## Test 21 (extended permissions - misc targets II) 227 ## Test 22 (extended permissions - misc targets III) 237 ## Test 23 (extended permissions - misc targets IV) 247 ## Test 24 (extended permissions - misc targets V) [all …]
|
/third_party/curl/lib/ |
D | ftplistparser.c | 247 unsigned int permissions = 0; in ftp_pl_get_permission() local 250 permissions |= 1 << 8; in ftp_pl_get_permission() 252 permissions |= FTP_LP_MALFORMATED_PERM; in ftp_pl_get_permission() 254 permissions |= 1 << 7; in ftp_pl_get_permission() 256 permissions |= FTP_LP_MALFORMATED_PERM; in ftp_pl_get_permission() 259 permissions |= 1 << 6; in ftp_pl_get_permission() 261 permissions |= 1 << 6; in ftp_pl_get_permission() 262 permissions |= 1 << 11; in ftp_pl_get_permission() 265 permissions |= 1 << 11; in ftp_pl_get_permission() 267 permissions |= FTP_LP_MALFORMATED_PERM; in ftp_pl_get_permission() [all …]
|
/third_party/node/deps/v8/src/base/ |
D | virtual-address-space.cc | 30 uint8_t PagePermissionsToBitset(PagePermissions permissions) { in PagePermissionsToBitset() argument 31 switch (permissions) { in PagePermissionsToBitset() 78 PagePermissions permissions) { in AllocatePages() argument 85 static_cast<OS::MemoryPermission>(permissions))); in AllocatePages() 96 PagePermissions permissions) { in SetPagePermissions() argument 101 static_cast<OS::MemoryPermission>(permissions)); in SetPagePermissions() 129 Address hint, size_t size, PagePermissions permissions, in AllocateSharedPages() argument 137 static_cast<OS::MemoryPermission>(permissions), handle, offset)); in AllocateSharedPages() 227 PagePermissions permissions) { in AllocatePages() argument 231 DCHECK(IsSubset(permissions, max_page_permissions())); in AllocatePages() [all …]
|
D | emulated-virtual-address-subspace.cc | 48 Address hint, size_t size, size_t alignment, PagePermissions permissions) { in AllocatePages() argument 55 // Success. Only need to adjust the page permissions. in AllocatePages() 56 if (parent_space_->SetPagePermissions(address, size, permissions)) { in AllocatePages() 83 parent_space_->AllocatePages(hint, size, alignment, permissions); in AllocatePages() 109 Address hint, size_t size, PagePermissions permissions, in AllocateSharedPages() argument 122 Address region = parent_space_->AllocateSharedPages(hint, size, permissions, in AllocateSharedPages() 143 Address address, size_t size, PagePermissions permissions) { in SetPagePermissions() argument 145 return parent_space_->SetPagePermissions(address, size, permissions); in SetPagePermissions()
|
/third_party/selinux/libselinux/include/selinux/ |
D | avc.h | 252 * avc_has_perm_noaudit - Check permissions but perform no auditing. 256 * @requested: requested permissions, interpreted based on @tclass 260 * Check the AVC to determine whether the @requested permissions are granted 261 * for the SID pair (@ssid, @tsid), interpreting the permissions 265 * in @avd. Return %0 if all @requested permissions are granted, -%1 with 266 * @errno set to %EACCES if any permissions are denied, or to another value 279 * avc_has_perm - Check permissions and perform any appropriate auditing. 283 * @requested: requested permissions, interpreted based on @tclass 287 * Check the AVC to determine whether the @requested permissions are granted 288 * for the SID pair (@ssid, @tsid), interpreting the permissions [all …]
|
/third_party/node/deps/npm/tap-snapshots/test/lib/utils/ |
D | error-message.js.test.cjs | 367 It is likely you do not have the permissions to access this file as the current user 369 If you believe this might be a permissions issue, please double-check the 370 permissions of the file and its containing directories, or try running 400 It is likely you do not have the permissions to access this file as the current user 402 If you believe this might be a permissions issue, please double-check the 403 permissions of the file and its containing directories, or try running 433 It is likely you do not have the permissions to access this file as the current user 435 If you believe this might be a permissions issue, please double-check the 436 permissions of the file and its containing directories, or try running 466 It is likely you do not have the permissions to access this file as the current user [all …]
|
/third_party/gstreamer/gstreamer/libs/gst/helpers/ |
D | meson.build | 27 message('PTP not supported on Android because of permissions.') 31 message('PTP not supported on iOS because of permissions.') 85 with_ptp_helper_permissions = get_option('ptp-helper-permissions') 99 description : 'Use setuid-root for permissions in PTP helper') 102 error('capabilities-based ptp-helper-permissions requested, but could not find setcap tool.') 104 error('capabilities-based ptp-helper-permissions requested, but could not find libcap.') 107 description : 'Use capabilities for permissions in PTP helper') 109 error('Unexpected ptp helper permissions value: ' + with_ptp_helper_permissions)
|
D | ptp_helper_post_install.sh | 3 # Fails silently at the moment if setting permissions/capabilities doesn't work 12 echo "$0: permissions before: " 16 echo "$0: permissions after: " 27 echo "$0 ERROR: unexpected permissions value '$with_ptp_helper_permissions'";
|
/third_party/selinux/secilc/docs/ |
D | cil_class_and_permission_statements.md | 7 Declares a common identifier in the current namespace with a set of common permissions that can be … 33 <td align="left"><p>One or more permissions.</p></td> 40 …`](cil_class_and_permission_statements.md#common) identifier '`file`' with the list of permissions: 49 …_class_and_permission_statements.md#class) identifier to a one or more permissions declared by a [… 75 …iously declared <code>common</code> identifier that defines the common permissions for that class.… 82 This associates the `dir` class with the list of permissions declared by the `file common` identifi… 93 Declares a class and zero or more permissions in the current namespace. 119 <td align="left"><p>Zero or more permissions declared for the class. Note that if zero permissions,… 126 This example defines a set of permissions for the `binder` class identifier: 132 …e defines a common set of permissions to be used by the `sem` class, the `(class sem ())` does not… [all …]
|
/third_party/skia/third_party/externals/angle2/util/posix/ |
D | crash_handler_posix.cpp | 169 // Bitmask of read/write/execute/private/shared permissions. 170 uint8_t permissions; 248 char permissions[5] = {'\0'}; // Ensure NUL-terminated string. 263 ®ion.end, permissions, ®ion.offset, &dev_major, &dev_minor, &inode, 270 region.permissions = 0; 272 if (permissions[0] == 'r') 273 region.permissions |= MappedMemoryRegion::READ; 274 else if (permissions[0] != '-') 277 if (permissions[1] == 'w') 278 region.permissions |= MappedMemoryRegion::WRITE; [all …]
|
/third_party/rust/crates/regex/.github/workflows/ |
D | ci.yml | 10 # The section is needed to drop write-all permissions that are granted on 16 # on pull-requests, etc. may need additional permissions: 19 # https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#permissions 21 # Reference for how to assign permissions on a job-by-job basis: 22 # https://docs.github.com/en/actions/using-jobs/assigning-permissions-to-jobs 24 # Reference for available permissions that we can enable if needed: 25 # https://docs.github.com/en/actions/security-guides/automatic-token-authentication#permissions-for… 26 permissions:
|
/third_party/node/deps/npm/node_modules/libnpmaccess/ |
D | README.md | 10 packages and permissions, looking at package collaborators, and defining 11 package permissions for users, orgs, and teams. 86 Sets permissions levels for a given team to a package. 90 The npm registry accepts the following `permissions`: 92 `read-only`: Read only permissions 93 `read-write`: Read and write (aka publish) permissions
|
/third_party/rust/crates/libc/.github/workflows/ |
D | bors.yml | 9 permissions: {} 12 permissions: 36 permissions: 59 permissions: 99 permissions: 116 permissions: 178 permissions: 205 permissions: 223 permissions: 257 permissions: [all …]
|
/third_party/ltp/include/lapi/ |
D | sembuf.h | 29 struct ipc64_perm sem_perm; /* permissions .. see ipc.h */ 39 struct ipc64_perm sem_perm; /* permissions .. see ipc.h */ 60 struct ipc64_perm sem_perm; /* permissions .. see ipc.h */ 89 struct ipc64_perm sem_perm; /* permissions .. see ipc.h */ 118 struct ipc64_perm sem_perm; /* permissions .. see ipc.h */ 149 struct ipc64_perm sem_perm; /* permissions .. see ipc.h */ 173 struct ipc64_perm sem_perm; /* permissions .. see ipc.h */ 215 struct ipc64_perm sem_perm; /* permissions .. see ipc.h */
|