Home
last modified time | relevance | path

Searched full:permissions (Results 1 – 25 of 10267) sorted by relevance

12345678910>>...411

/third_party/selinux/libselinux/man/man3/
Davc_add_callback.335 …dditional action when a policy change, usually a policy reload, causes permissions to be granted o…
49 specify the source and target SID's, target class, and specific permissions that the callback wishe…
81 Previously denied permissions are now granted for
87 indicates the permissions to grant.
90 Previously granted permissions are now conditionally revoked for
96 indicates the permissions to revoke. The callback should set
100 which are retained as migrated permissions. Note that
105 Previously granted permissions are now unconditionally revoked for
111 indicates the permissions to revoke.
117 The permissions given by
[all …]
Davc_has_perm.346 classes or permissions as inputs, use
62 fixed constants for the classes and permissions to
77 permissions are granted
82 interpreting the permissions
87 … a cache entry with the resulting decision. The granting or denial of permissions is audited in a…
141 If requested permissions are granted, zero is returned. If requested permissions are denied or an …
147 unchanged even if permissions were denied.
/third_party/curl/tests/data/
Dtest575104 This file should have permissions 444
105 This file should have permissions 666
106 This file should have permissions 777
109 This file should have permissions 444
110 This file should have permissions 666
111 This file should have permissions 777
114 This file should have permissions 444
115 This file should have permissions 666
116 This file should have permissions 777
Dtest57641 Permissions: rwxrwxrwx (parsed => 777)
50 Permissions: rwxrwxrwx (parsed => 777)
59 Permissions: r--r--r-- (parsed => 444)
67 This file should have permissions 444
72 Permissions: rw-rw-rw- (parsed => 666)
80 This file should have permissions 666
85 Permissions: rwxrwxrwx (parsed => 777)
93 This file should have permissions 777
98 Permissions: --S--S--t (parsed => 7001)
107 Permissions: --s--s--T (parsed => 7110)
[all …]
Dtest57486 This file should have permissions 444
87 This file should have permissions 666
88 This file should have permissions 777
91 This file should have permissions 444
92 This file should have permissions 666
93 This file should have permissions 777
Dtest111387 This file should have permissions 444
88 This file should have permissions 666
89 This file should have permissions 777
92 This file should have permissions 444
93 This file should have permissions 666
94 This file should have permissions 777
/third_party/skia/third_party/externals/swiftshader/src/Reactor/
DExecutableMemory.cpp12 // See the License for the specific language governing permissions and
105 DWORD permissionsToProtectMode(int permissions) in permissionsToProtectMode() argument
107 switch(permissions) in permissionsToProtectMode()
125 int permissionsToMmapProt(int permissions) in permissionsToMmapProt() argument
128 if(permissions & PERMISSION_READ) in permissionsToMmapProt()
132 if(permissions & PERMISSION_WRITE) in permissionsToMmapProt()
136 if(permissions & PERMISSION_EXECUTE) in permissionsToMmapProt()
200 zx_vm_option_t permissionsToZxVmOptions(int permissions) in permissionsToZxVmOptions() argument
203 if(permissions & PERMISSION_READ) in permissionsToZxVmOptions()
207 if(permissions & PERMISSION_WRITE) in permissionsToZxVmOptions()
[all …]
DExecutableMemory.hpp12 // See the License for the specific language governing permissions and
33 // Allocates memory with the specified permissions. If |need_exec| is true then
35 void *allocateMemoryPages(size_t bytes, int permissions, bool need_exec);
37 // Sets permissions for memory allocated with allocateMemoryPages().
38 void protectMemoryPages(void *memory, size_t bytes, int permissions);
/third_party/ltp/testcases/kernel/fs/acl/
Dtacl_xattr.sh164 # The permissions bit limit user's act
198 # ACL_USER_OBJ are a superset of the permissions specified
213 printf "\t permissions, but operation failed [ Physical Directory ]\n"
215 printf "\nSUCCESS: ACL_USER_OBJ entry contains the owner execute permissions,\n"
223 printf "\t permissions, but operation failed [ Symlink Directory ]\n"
225 printf "\nSUCCESS: ACL_USER_OBJ entry contains the owner execute permissions,\n"
239 printf "\t permissions, but operation failed [ Physical Directory ]\n"
241 printf "\nSUCCESS: ACL_USER_OBJ entry contains the owner write permissions,\n"
249 printf "\t permissions, but operation failed [ Symlink Directory ]\n"
251 printf "\nSUCCESS: ACL_USER_OBJ entry contains the owner write permissions,\n"
[all …]
/third_party/ntfs-3g/src/
Dntfs-3g.8.in31 provides standard management of file ownership and permissions, including
60 full read, write, execution and directory browsing permissions.
61 You can also assign permissions to a single user by using the
76 But, by setting the \fBpermissions\fR option, you can benefit from the full
77 ownership and permissions features as defined by POSIX. Moreover, by defining
78 a Windows-to-Linux user mapping, the ownerships and permissions are even
118 .B permissions
176 Set the bitmask of the directory permissions that are not
188 Set the bitmask of the file permissions that are not present.
221 compatibility. The \fBpermissions\fR (or **acl**) option or a valid user
[all …]
/third_party/node/deps/v8/src/wasm/
Dmemory-protection-key.h35 // Permissions for memory protection keys on top of the page's permissions.
45 // our definitions of the permissions is consistent with the ones in glibc.
75 // Returns true if changing permissions and key was successful. (Returns a bool
77 // The {page_permissions} are the permissions of the page, not the key. For
78 // changing the permissions of the key, use
84 // Set the key's permissions. {key} must be valid, i.e. not
87 int key, MemoryProtectionKeyPermission permissions);
89 // Get the permissions of the protection key {key} for the current thread.
/third_party/selinux/libsepol/tests/policies/test-neverallow/
Dpolicy.conf167 ## Test 15 (extended permissions - standard allow)
174 ## Test 16 (extended permissions - allowxperm)
182 ## Test 17 (extended permissions - allowxperm mismatch)
190 ## Test 18 (extended permissions - allowxperm range I)
198 ## Test 19 (extended permissions - allowxperm range II)
206 ## Test 20 (extended permissions - misc targets I)
216 ## Test 21 (extended permissions - misc targets II)
227 ## Test 22 (extended permissions - misc targets III)
237 ## Test 23 (extended permissions - misc targets IV)
247 ## Test 24 (extended permissions - misc targets V)
[all …]
/third_party/curl/lib/
Dftplistparser.c247 unsigned int permissions = 0; in ftp_pl_get_permission() local
250 permissions |= 1 << 8; in ftp_pl_get_permission()
252 permissions |= FTP_LP_MALFORMATED_PERM; in ftp_pl_get_permission()
254 permissions |= 1 << 7; in ftp_pl_get_permission()
256 permissions |= FTP_LP_MALFORMATED_PERM; in ftp_pl_get_permission()
259 permissions |= 1 << 6; in ftp_pl_get_permission()
261 permissions |= 1 << 6; in ftp_pl_get_permission()
262 permissions |= 1 << 11; in ftp_pl_get_permission()
265 permissions |= 1 << 11; in ftp_pl_get_permission()
267 permissions |= FTP_LP_MALFORMATED_PERM; in ftp_pl_get_permission()
[all …]
/third_party/node/deps/v8/src/base/
Dvirtual-address-space.cc30 uint8_t PagePermissionsToBitset(PagePermissions permissions) { in PagePermissionsToBitset() argument
31 switch (permissions) { in PagePermissionsToBitset()
78 PagePermissions permissions) { in AllocatePages() argument
85 static_cast<OS::MemoryPermission>(permissions))); in AllocatePages()
96 PagePermissions permissions) { in SetPagePermissions() argument
101 static_cast<OS::MemoryPermission>(permissions)); in SetPagePermissions()
129 Address hint, size_t size, PagePermissions permissions, in AllocateSharedPages() argument
137 static_cast<OS::MemoryPermission>(permissions), handle, offset)); in AllocateSharedPages()
227 PagePermissions permissions) { in AllocatePages() argument
231 DCHECK(IsSubset(permissions, max_page_permissions())); in AllocatePages()
[all …]
Demulated-virtual-address-subspace.cc48 Address hint, size_t size, size_t alignment, PagePermissions permissions) { in AllocatePages() argument
55 // Success. Only need to adjust the page permissions. in AllocatePages()
56 if (parent_space_->SetPagePermissions(address, size, permissions)) { in AllocatePages()
83 parent_space_->AllocatePages(hint, size, alignment, permissions); in AllocatePages()
109 Address hint, size_t size, PagePermissions permissions, in AllocateSharedPages() argument
122 Address region = parent_space_->AllocateSharedPages(hint, size, permissions, in AllocateSharedPages()
143 Address address, size_t size, PagePermissions permissions) { in SetPagePermissions() argument
145 return parent_space_->SetPagePermissions(address, size, permissions); in SetPagePermissions()
/third_party/selinux/libselinux/include/selinux/
Davc.h252 * avc_has_perm_noaudit - Check permissions but perform no auditing.
256 * @requested: requested permissions, interpreted based on @tclass
260 * Check the AVC to determine whether the @requested permissions are granted
261 * for the SID pair (@ssid, @tsid), interpreting the permissions
265 * in @avd. Return %0 if all @requested permissions are granted, -%1 with
266 * @errno set to %EACCES if any permissions are denied, or to another value
279 * avc_has_perm - Check permissions and perform any appropriate auditing.
283 * @requested: requested permissions, interpreted based on @tclass
287 * Check the AVC to determine whether the @requested permissions are granted
288 * for the SID pair (@ssid, @tsid), interpreting the permissions
[all …]
/third_party/node/deps/npm/tap-snapshots/test/lib/utils/
Derror-message.js.test.cjs367 It is likely you do not have the permissions to access this file as the current user
369 If you believe this might be a permissions issue, please double-check the
370 permissions of the file and its containing directories, or try running
400 It is likely you do not have the permissions to access this file as the current user
402 If you believe this might be a permissions issue, please double-check the
403 permissions of the file and its containing directories, or try running
433 It is likely you do not have the permissions to access this file as the current user
435 If you believe this might be a permissions issue, please double-check the
436 permissions of the file and its containing directories, or try running
466 It is likely you do not have the permissions to access this file as the current user
[all …]
/third_party/gstreamer/gstreamer/libs/gst/helpers/
Dmeson.build27 message('PTP not supported on Android because of permissions.')
31 message('PTP not supported on iOS because of permissions.')
85 with_ptp_helper_permissions = get_option('ptp-helper-permissions')
99 description : 'Use setuid-root for permissions in PTP helper')
102 error('capabilities-based ptp-helper-permissions requested, but could not find setcap tool.')
104 error('capabilities-based ptp-helper-permissions requested, but could not find libcap.')
107 description : 'Use capabilities for permissions in PTP helper')
109 error('Unexpected ptp helper permissions value: ' + with_ptp_helper_permissions)
Dptp_helper_post_install.sh3 # Fails silently at the moment if setting permissions/capabilities doesn't work
12 echo "$0: permissions before: "
16 echo "$0: permissions after: "
27 echo "$0 ERROR: unexpected permissions value '$with_ptp_helper_permissions'";
/third_party/selinux/secilc/docs/
Dcil_class_and_permission_statements.md7 Declares a common identifier in the current namespace with a set of common permissions that can be …
33 <td align="left"><p>One or more permissions.</p></td>
40 …`](cil_class_and_permission_statements.md#common) identifier '`file`' with the list of permissions:
49 …_class_and_permission_statements.md#class) identifier to a one or more permissions declared by a […
75 …iously declared <code>common</code> identifier that defines the common permissions for that class.…
82 This associates the `dir` class with the list of permissions declared by the `file common` identifi…
93 Declares a class and zero or more permissions in the current namespace.
119 <td align="left"><p>Zero or more permissions declared for the class. Note that if zero permissions,…
126 This example defines a set of permissions for the `binder` class identifier:
132 …e defines a common set of permissions to be used by the `sem` class, the `(class sem ())` does not…
[all …]
/third_party/skia/third_party/externals/angle2/util/posix/
Dcrash_handler_posix.cpp169 // Bitmask of read/write/execute/private/shared permissions.
170 uint8_t permissions;
248 char permissions[5] = {'\0'}; // Ensure NUL-terminated string.
263 &region.end, permissions, &region.offset, &dev_major, &dev_minor, &inode,
270 region.permissions = 0;
272 if (permissions[0] == 'r')
273 region.permissions |= MappedMemoryRegion::READ;
274 else if (permissions[0] != '-')
277 if (permissions[1] == 'w')
278 region.permissions |= MappedMemoryRegion::WRITE;
[all …]
/third_party/rust/crates/regex/.github/workflows/
Dci.yml10 # The section is needed to drop write-all permissions that are granted on
16 # on pull-requests, etc. may need additional permissions:
19 # https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#permissions
21 # Reference for how to assign permissions on a job-by-job basis:
22 # https://docs.github.com/en/actions/using-jobs/assigning-permissions-to-jobs
24 # Reference for available permissions that we can enable if needed:
25 # https://docs.github.com/en/actions/security-guides/automatic-token-authentication#permissions-for…
26 permissions:
/third_party/node/deps/npm/node_modules/libnpmaccess/
DREADME.md10 packages and permissions, looking at package collaborators, and defining
11 package permissions for users, orgs, and teams.
86 Sets permissions levels for a given team to a package.
90 The npm registry accepts the following `permissions`:
92 `read-only`: Read only permissions
93 `read-write`: Read and write (aka publish) permissions
/third_party/rust/crates/libc/.github/workflows/
Dbors.yml9 permissions: {}
12 permissions:
36 permissions:
59 permissions:
99 permissions:
116 permissions:
178 permissions:
205 permissions:
223 permissions:
257 permissions:
[all …]
/third_party/ltp/include/lapi/
Dsembuf.h29 struct ipc64_perm sem_perm; /* permissions .. see ipc.h */
39 struct ipc64_perm sem_perm; /* permissions .. see ipc.h */
60 struct ipc64_perm sem_perm; /* permissions .. see ipc.h */
89 struct ipc64_perm sem_perm; /* permissions .. see ipc.h */
118 struct ipc64_perm sem_perm; /* permissions .. see ipc.h */
149 struct ipc64_perm sem_perm; /* permissions .. see ipc.h */
173 struct ipc64_perm sem_perm; /* permissions .. see ipc.h */
215 struct ipc64_perm sem_perm; /* permissions .. see ipc.h */

12345678910>>...411