| /third_party/selinux/libselinux/man/man3/ |
| D | avc_add_callback.3 | 35 …dditional action when a policy change, usually a policy reload, causes permissions to be granted o… 49 specify the source and target SID's, target class, and specific permissions that the callback wishe… 81 Previously denied permissions are now granted for 87 indicates the permissions to grant. 90 Previously granted permissions are now conditionally revoked for 96 indicates the permissions to revoke. The callback should set 100 which are retained as migrated permissions. Note that 105 Previously granted permissions are now unconditionally revoked for 111 indicates the permissions to revoke. 117 The permissions given by [all …]
|
| D | avc_has_perm.3 | 46 classes or permissions as inputs, use 62 fixed constants for the classes and permissions to 77 permissions are granted 82 interpreting the permissions 87 … a cache entry with the resulting decision. The granting or denial of permissions is audited in a… 141 If requested permissions are granted, zero is returned. If requested permissions are denied or an … 147 unchanged even if permissions were denied.
|
| /third_party/skia/third_party/externals/swiftshader/src/Reactor/ |
| D | ExecutableMemory.cpp | 12 // See the License for the specific language governing permissions and 105 DWORD permissionsToProtectMode(int permissions) in permissionsToProtectMode() argument 107 switch(permissions) in permissionsToProtectMode() 125 int permissionsToMmapProt(int permissions) in permissionsToMmapProt() argument 128 if(permissions & PERMISSION_READ) in permissionsToMmapProt() 132 if(permissions & PERMISSION_WRITE) in permissionsToMmapProt() 136 if(permissions & PERMISSION_EXECUTE) in permissionsToMmapProt() 200 zx_vm_option_t permissionsToZxVmOptions(int permissions) in permissionsToZxVmOptions() argument 203 if(permissions & PERMISSION_READ) in permissionsToZxVmOptions() 207 if(permissions & PERMISSION_WRITE) in permissionsToZxVmOptions() [all …]
|
| D | ExecutableMemory.hpp | 12 // See the License for the specific language governing permissions and 33 // Allocates memory with the specified permissions. If |need_exec| is true then 35 void *allocateMemoryPages(size_t bytes, int permissions, bool need_exec); 37 // Sets permissions for memory allocated with allocateMemoryPages(). 38 void protectMemoryPages(void *memory, size_t bytes, int permissions);
|
| /third_party/ltp/testcases/kernel/fs/acl/ |
| D | tacl_xattr.sh | 164 # The permissions bit limit user's act 198 # ACL_USER_OBJ are a superset of the permissions specified 213 printf "\t permissions, but operation failed [ Physical Directory ]\n" 215 printf "\nSUCCESS: ACL_USER_OBJ entry contains the owner execute permissions,\n" 223 printf "\t permissions, but operation failed [ Symlink Directory ]\n" 225 printf "\nSUCCESS: ACL_USER_OBJ entry contains the owner execute permissions,\n" 239 printf "\t permissions, but operation failed [ Physical Directory ]\n" 241 printf "\nSUCCESS: ACL_USER_OBJ entry contains the owner write permissions,\n" 249 printf "\t permissions, but operation failed [ Symlink Directory ]\n" 251 printf "\nSUCCESS: ACL_USER_OBJ entry contains the owner write permissions,\n" [all …]
|
| /third_party/ntfs-3g/src/ |
| D | ntfs-3g.8.in | 31 provides standard management of file ownership and permissions, including 60 full read, write, execution and directory browsing permissions. 61 You can also assign permissions to a single user by using the 76 But, by setting the \fBpermissions\fR option, you can benefit from the full 77 ownership and permissions features as defined by POSIX. Moreover, by defining 78 a Windows-to-Linux user mapping, the ownerships and permissions are even 118 .B permissions 176 Set the bitmask of the directory permissions that are not 188 Set the bitmask of the file permissions that are not present. 221 compatibility. The \fBpermissions\fR (or **acl**) option or a valid user [all …]
|
| /third_party/selinux/libselinux/include/selinux/ |
| D | avc.h | 252 * avc_has_perm_noaudit - Check permissions but perform no auditing. 256 * @requested: requested permissions, interpreted based on @tclass 260 * Check the AVC to determine whether the @requested permissions are granted 261 * for the SID pair (@ssid, @tsid), interpreting the permissions 265 * in @avd. Return %0 if all @requested permissions are granted, -%1 with 266 * @errno set to %EACCES if any permissions are denied, or to another value 279 * avc_has_perm - Check permissions and perform any appropriate auditing. 283 * @requested: requested permissions, interpreted based on @tclass 287 * Check the AVC to determine whether the @requested permissions are granted 288 * for the SID pair (@ssid, @tsid), interpreting the permissions [all …]
|
| /third_party/gstreamer/gstreamer/libs/gst/helpers/ |
| D | meson.build | 27 message('PTP not supported on Android because of permissions.') 31 message('PTP not supported on iOS because of permissions.') 85 with_ptp_helper_permissions = get_option('ptp-helper-permissions') 99 description : 'Use setuid-root for permissions in PTP helper') 102 error('capabilities-based ptp-helper-permissions requested, but could not find setcap tool.') 104 error('capabilities-based ptp-helper-permissions requested, but could not find libcap.') 107 description : 'Use capabilities for permissions in PTP helper') 109 error('Unexpected ptp helper permissions value: ' + with_ptp_helper_permissions)
|
| D | ptp_helper_post_install.sh | 3 # Fails silently at the moment if setting permissions/capabilities doesn't work 12 echo "$0: permissions before: " 16 echo "$0: permissions after: " 27 echo "$0 ERROR: unexpected permissions value '$with_ptp_helper_permissions'";
|
| /third_party/node/deps/npm/node_modules/libnpmaccess/ |
| D | README.md | 6 listing packages and permissions, looking at package collaborators, and defining 7 package permissions for users, orgs, and teams. 99 #### <a name="grant"></a> `> access.grant(spec, team, permissions, [opts]) -> Promise` 104 that scope. `permissions` must be one of `'read-only'` or `'read-write'`. 106 Grants `read-only` or `read-write` permissions for a certain package to a team. 122 that scope. `permissions` must be one of `'read-only'` or `'read-write'`. argument 172 permissions. Packages that the access token does not have access to won't be 188 // corresponding permissions. 197 permissions, with each stream entry being formatted like `[packageName, 198 permissions]`. Packages that the access token does not have access to won't be [all …]
|
| D | index.js | 41 cmd.grant = (spec, entity, permissions, opts) => { argument 46 validate('OSSSO', [spec, scope, team, permissions, opts]) 47 if (permissions !== 'read-write' && permissions !== 'read-only') { 48 …throw new Error('`permissions` must be `read-write` or `read-only`. Got `' + permissions + '` inst… 53 body: {package: spec.name, permissions}, field
|
| /third_party/selinux/secilc/docs/ |
| D | cil_class_and_permission_statements.md | 7 Declares a common identifier in the current namespace with a set of common permissions that can be … 33 <td align="left"><p>One or more permissions.</p></td> 40 …`](cil_class_and_permission_statements.md#common) identifier '`file`' with the list of permissions: 49 …_class_and_permission_statements.md#class) identifier to a one or more permissions declared by a [… 75 …iously declared <code>common</code> identifier that defines the common permissions for that class.… 82 This associates the `dir` class with the list of permissions declared by the `file common` identifi… 93 Declares a class and zero or more permissions in the current namespace. 119 <td align="left"><p>Zero or more permissions declared for the class. Note that if zero permissions,… 126 This example defines a set of permissions for the `binder` class identifier: 132 …e defines a common set of permissions to be used by the `sem` class, the `(class sem ())` does not… [all …]
|
| /third_party/skia/third_party/externals/angle2/util/posix/ |
| D | crash_handler_posix.cpp | 169 // Bitmask of read/write/execute/private/shared permissions. 170 uint8_t permissions; 248 char permissions[5] = {'\0'}; // Ensure NUL-terminated string. 263 ®ion.end, permissions, ®ion.offset, &dev_major, &dev_minor, &inode, 270 region.permissions = 0; 272 if (permissions[0] == 'r') 273 region.permissions |= MappedMemoryRegion::READ; 274 else if (permissions[0] != '-') 277 if (permissions[1] == 'w') 278 region.permissions |= MappedMemoryRegion::WRITE; [all …]
|
| /third_party/rust/crates/regex/.github/workflows/ |
| D | ci.yml | 10 # The section is needed to drop write-all permissions that are granted on 16 # on pull-requests, etc. may need additional permissions: 19 # https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#permissions 21 # Reference for how to assign permissions on a job-by-job basis: 22 # https://docs.github.com/en/actions/using-jobs/assigning-permissions-to-jobs 24 # Reference for available permissions that we can enable if needed: 25 # https://docs.github.com/en/actions/security-guides/automatic-token-authentication#permissions-for… 26 permissions:
|
| /third_party/rust/crates/libc/.github/workflows/ |
| D | bors.yml | 9 permissions: {} 12 permissions: 36 permissions: 59 permissions: 99 permissions: 116 permissions: 178 permissions: 205 permissions: 223 permissions: 257 permissions: [all …]
|
| /third_party/ltp/testcases/open_posix_testsuite/conformance/interfaces/shm_open/ |
| D | 18-1.c | 20 * 5. Check that the permissions flags are right. 69 /* Check the permissions flags. in main() 70 * Permissions flags are right when the permissions bits of in main() 80 printf("shm_open() does not set the rights permissions.\n"); in main()
|
| /third_party/ltp/include/lapi/ |
| D | sembuf.h | 29 struct ipc64_perm sem_perm; /* permissions .. see ipc.h */ 39 struct ipc64_perm sem_perm; /* permissions .. see ipc.h */ 60 struct ipc64_perm sem_perm; /* permissions .. see ipc.h */ 89 struct ipc64_perm sem_perm; /* permissions .. see ipc.h */ 118 struct ipc64_perm sem_perm; /* permissions .. see ipc.h */ 149 struct ipc64_perm sem_perm; /* permissions .. see ipc.h */ 173 struct ipc64_perm sem_perm; /* permissions .. see ipc.h */ 215 struct ipc64_perm sem_perm; /* permissions .. see ipc.h */
|
| /third_party/selinux/libselinux/src/ |
| D | avc.c | 415 * @requested: requested permissions, interpreted based on @tclass 419 * @requested permissions between the SID pair 420 * (@ssid, @tsid), interpreting the permissions 1020 * try_revoke only removes permissions from the cache in avc_control() 1046 /* revoke any unretained permissions */ in avc_control() 1062 * avc_ss_grant - Grant previously denied permissions. 1066 * @perms: permissions to grant 1078 * avc_ss_try_revoke - Try to revoke previously granted permissions. 1082 * @perms: permissions to grant 1086 * Try to revoke previously granted permissions, but [all …]
|
| /third_party/elfutils/config/ |
| D | 10-default-yama-scope.conf | 8 # Usage of ptrace attach is restricted by normal user permissions. Normal 13 # yama ptrace scope can be used to reduce these permissions even more. 29 # 0 - Default attach security permissions. 30 # 1 - Restricted attach. Only child processes plus normal permissions.
|
| /third_party/ltp/testcases/kernel/syscalls/setreuid/ |
| D | setreuid07.c | 23 * Check if setreuid behaves correctly with file permissions. 24 * The test creates a file as ROOT with permissions 0644, does a setreuid 25 * and then tries to open the file with RDWR permissions. 92 * with RDWR permissions. in do_master_child() 110 * with RDWR permissions. in do_master_child() 146 * the file with RDWR permissions. in do_master_child()
|
| /third_party/cef/tests/ceftests/extensions/ |
| D | extension_test_handler.cc | 153 CefRefPtr<CefListValue> permissions = CefListValue::Create(); in CreateDefaultManifest() local 154 permissions->SetSize(api_permissions.size() + 2); in CreateDefaultManifest() 157 permissions->SetString(idx, api_permissions[idx]); in CreateDefaultManifest() 160 permissions->SetString(idx++, "http://*/*"); in CreateDefaultManifest() 161 permissions->SetString(idx++, "https://*/*"); in CreateDefaultManifest() 163 manifest->SetList("permissions", permissions); in CreateDefaultManifest()
|
| /third_party/skia/third_party/externals/egl-registry/extensions/EXT/ |
| D | EGL_EXT_stream_consumer_egloutput.txt | 125 access to such permissions or privileged native objects when creating 129 the output modification permissions provided to the EGLDisplay, or 130 revokes permissions from the privileged native objects provided to 202 permissions or native object handles when creating its EGLDisplay. 205 not have the necessary permissions to modify output attributes? 208 block consumption of frames indefinitely until permissions are 211 lack of permissions. However, both of these options may rely on
|
| /third_party/EGL/extensions/EXT/ |
| D | EGL_EXT_stream_consumer_egloutput.txt | 125 access to such permissions or privileged native objects when creating 129 the output modification permissions provided to the EGLDisplay, or 130 revokes permissions from the privileged native objects provided to 202 permissions or native object handles when creating its EGLDisplay. 205 not have the necessary permissions to modify output attributes? 208 block consumption of frames indefinitely until permissions are 211 lack of permissions. However, both of these options may rely on
|
| /third_party/skia/third_party/externals/swiftshader/third_party/llvm-10.0/llvm/include/llvm/ExecutionEngine/ |
| D | SectionMemoryManager.h | 36 /// page permissions have been applied before attempting to execute functions 37 /// in the JITed object. Permissions can be applied either by calling 131 /// Update section-specific memory permissions and other attributes. 134 /// permissions can be applied. It is up to the memory manager implementation 137 /// permissions when this method is called. Code sections cannot be executed 166 // which have not yet had their permissions applied, but have been given 168 // neither had their permissions applied, nor been given out to the user. 182 unsigned Permissions);
|
| /third_party/ltp/testcases/kernel/syscalls/setfsuid/ |
| D | setfsuid04.c | 22 * Check if setfsuid behaves correctly with file permissions. 23 * The test creates a file as ROOT with permissions 0644, does a setfsuid 24 * and then tries to open the file with RDWR permissions. 89 * with RDWR permissions. in do_master_child() 107 * with RDWR permissions. in do_master_child() 144 * the file with RDWR permissions. in do_master_child()
|