Home
last modified time | relevance | path

Searched full:permissions (Results 1 – 25 of 11559) sorted by relevance

12345678910>>...463

/third_party/selinux/libselinux/man/man3/
Davc_add_callback.335 …dditional action when a policy change, usually a policy reload, causes permissions to be granted o…
49 specify the source and target SID's, target class, and specific permissions that the callback wishe…
81 Previously denied permissions are now granted for
87 indicates the permissions to grant.
90 Previously granted permissions are now conditionally revoked for
96 indicates the permissions to revoke. The callback should set
100 which are retained as migrated permissions. Note that
105 Previously granted permissions are now unconditionally revoked for
111 indicates the permissions to revoke.
117 The permissions given by
[all …]
Davc_has_perm.346 classes or permissions as inputs, use
62 fixed constants for the classes and permissions to
77 permissions are granted
82 interpreting the permissions
87 … a cache entry with the resulting decision. The granting or denial of permissions is audited in a…
141 If requested permissions are granted, zero is returned. If requested permissions are denied or an …
147 unchanged even if permissions were denied.
/third_party/skia/third_party/externals/swiftshader/src/Reactor/
DExecutableMemory.cpp12 // See the License for the specific language governing permissions and
105 DWORD permissionsToProtectMode(int permissions) in permissionsToProtectMode() argument
107 switch(permissions) in permissionsToProtectMode()
125 int permissionsToMmapProt(int permissions) in permissionsToMmapProt() argument
128 if(permissions & PERMISSION_READ) in permissionsToMmapProt()
132 if(permissions & PERMISSION_WRITE) in permissionsToMmapProt()
136 if(permissions & PERMISSION_EXECUTE) in permissionsToMmapProt()
200 zx_vm_option_t permissionsToZxVmOptions(int permissions) in permissionsToZxVmOptions() argument
203 if(permissions & PERMISSION_READ) in permissionsToZxVmOptions()
207 if(permissions & PERMISSION_WRITE) in permissionsToZxVmOptions()
[all …]
DExecutableMemory.hpp12 // See the License for the specific language governing permissions and
33 // Allocates memory with the specified permissions. If |need_exec| is true then
35 void *allocateMemoryPages(size_t bytes, int permissions, bool need_exec);
37 // Sets permissions for memory allocated with allocateMemoryPages().
38 void protectMemoryPages(void *memory, size_t bytes, int permissions);
/third_party/ltp/testcases/kernel/fs/acl/
Dtacl_xattr.sh164 # The permissions bit limit user's act
198 # ACL_USER_OBJ are a superset of the permissions specified
213 printf "\t permissions, but operation failed [ Physical Directory ]\n"
215 printf "\nSUCCESS: ACL_USER_OBJ entry contains the owner execute permissions,\n"
223 printf "\t permissions, but operation failed [ Symlink Directory ]\n"
225 printf "\nSUCCESS: ACL_USER_OBJ entry contains the owner execute permissions,\n"
239 printf "\t permissions, but operation failed [ Physical Directory ]\n"
241 printf "\nSUCCESS: ACL_USER_OBJ entry contains the owner write permissions,\n"
249 printf "\t permissions, but operation failed [ Symlink Directory ]\n"
251 printf "\nSUCCESS: ACL_USER_OBJ entry contains the owner write permissions,\n"
[all …]
/third_party/ntfs-3g/src/
Dntfs-3g.8.in31 provides standard management of file ownership and permissions, including
60 full read, write, execution and directory browsing permissions.
61 You can also assign permissions to a single user by using the
76 But, by setting the \fBpermissions\fR option, you can benefit from the full
77 ownership and permissions features as defined by POSIX. Moreover, by defining
78 a Windows-to-Linux user mapping, the ownerships and permissions are even
118 .B permissions
176 Set the bitmask of the directory permissions that are not
188 Set the bitmask of the file permissions that are not present.
221 compatibility. The \fBpermissions\fR (or **acl**) option or a valid user
[all …]
/third_party/selinux/libselinux/include/selinux/
Davc.h252 * avc_has_perm_noaudit - Check permissions but perform no auditing.
256 * @requested: requested permissions, interpreted based on @tclass
260 * Check the AVC to determine whether the @requested permissions are granted
261 * for the SID pair (@ssid, @tsid), interpreting the permissions
265 * in @avd. Return %0 if all @requested permissions are granted, -%1 with
266 * @errno set to %EACCES if any permissions are denied, or to another value
279 * avc_has_perm - Check permissions and perform any appropriate auditing.
283 * @requested: requested permissions, interpreted based on @tclass
287 * Check the AVC to determine whether the @requested permissions are granted
288 * for the SID pair (@ssid, @tsid), interpreting the permissions
[all …]
/third_party/gstreamer/gstreamer/libs/gst/helpers/
Dmeson.build27 message('PTP not supported on Android because of permissions.')
31 message('PTP not supported on iOS because of permissions.')
85 with_ptp_helper_permissions = get_option('ptp-helper-permissions')
99 description : 'Use setuid-root for permissions in PTP helper')
102 error('capabilities-based ptp-helper-permissions requested, but could not find setcap tool.')
104 error('capabilities-based ptp-helper-permissions requested, but could not find libcap.')
107 description : 'Use capabilities for permissions in PTP helper')
109 error('Unexpected ptp helper permissions value: ' + with_ptp_helper_permissions)
Dptp_helper_post_install.sh3 # Fails silently at the moment if setting permissions/capabilities doesn't work
12 echo "$0: permissions before: "
16 echo "$0: permissions after: "
27 echo "$0 ERROR: unexpected permissions value '$with_ptp_helper_permissions'";
/third_party/node/deps/npm/node_modules/libnpmaccess/
DREADME.md6 listing packages and permissions, looking at package collaborators, and defining
7 package permissions for users, orgs, and teams.
99 #### <a name="grant"></a> `> access.grant(spec, team, permissions, [opts]) -> Promise`
104 that scope. `permissions` must be one of `'read-only'` or `'read-write'`.
106 Grants `read-only` or `read-write` permissions for a certain package to a team.
122 that scope. `permissions` must be one of `'read-only'` or `'read-write'`. argument
172 permissions. Packages that the access token does not have access to won't be
188 // corresponding permissions.
197 permissions, with each stream entry being formatted like `[packageName,
198 permissions]`. Packages that the access token does not have access to won't be
[all …]
Dindex.js41 cmd.grant = (spec, entity, permissions, opts) => { argument
46 validate('OSSSO', [spec, scope, team, permissions, opts])
47 if (permissions !== 'read-write' && permissions !== 'read-only') {
48 …throw new Error('`permissions` must be `read-write` or `read-only`. Got `' + permissions + '` inst…
53 body: {package: spec.name, permissions}, field
/third_party/selinux/secilc/docs/
Dcil_class_and_permission_statements.md7 Declares a common identifier in the current namespace with a set of common permissions that can be …
33 <td align="left"><p>One or more permissions.</p></td>
40 …`](cil_class_and_permission_statements.md#common) identifier '`file`' with the list of permissions:
49 …_class_and_permission_statements.md#class) identifier to a one or more permissions declared by a […
75 …iously declared <code>common</code> identifier that defines the common permissions for that class.…
82 This associates the `dir` class with the list of permissions declared by the `file common` identifi…
93 Declares a class and zero or more permissions in the current namespace.
119 <td align="left"><p>Zero or more permissions declared for the class. Note that if zero permissions,…
126 This example defines a set of permissions for the `binder` class identifier:
132 …e defines a common set of permissions to be used by the `sem` class, the `(class sem ())` does not…
[all …]
/third_party/skia/third_party/externals/angle2/util/posix/
Dcrash_handler_posix.cpp169 // Bitmask of read/write/execute/private/shared permissions.
170 uint8_t permissions;
248 char permissions[5] = {'\0'}; // Ensure NUL-terminated string.
263 &region.end, permissions, &region.offset, &dev_major, &dev_minor, &inode,
270 region.permissions = 0;
272 if (permissions[0] == 'r')
273 region.permissions |= MappedMemoryRegion::READ;
274 else if (permissions[0] != '-')
277 if (permissions[1] == 'w')
278 region.permissions |= MappedMemoryRegion::WRITE;
[all …]
/third_party/rust/crates/regex/.github/workflows/
Dci.yml10 # The section is needed to drop write-all permissions that are granted on
16 # on pull-requests, etc. may need additional permissions:
19 # https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#permissions
21 # Reference for how to assign permissions on a job-by-job basis:
22 # https://docs.github.com/en/actions/using-jobs/assigning-permissions-to-jobs
24 # Reference for available permissions that we can enable if needed:
25 # https://docs.github.com/en/actions/security-guides/automatic-token-authentication#permissions-for…
26 permissions:
/third_party/rust/crates/libc/.github/workflows/
Dbors.yml9 permissions: {}
12 permissions:
36 permissions:
59 permissions:
99 permissions:
116 permissions:
178 permissions:
205 permissions:
223 permissions:
257 permissions:
[all …]
/third_party/ltp/testcases/open_posix_testsuite/conformance/interfaces/shm_open/
D18-1.c20 * 5. Check that the permissions flags are right.
69 /* Check the permissions flags. in main()
70 * Permissions flags are right when the permissions bits of in main()
80 printf("shm_open() does not set the rights permissions.\n"); in main()
/third_party/ltp/include/lapi/
Dsembuf.h29 struct ipc64_perm sem_perm; /* permissions .. see ipc.h */
39 struct ipc64_perm sem_perm; /* permissions .. see ipc.h */
60 struct ipc64_perm sem_perm; /* permissions .. see ipc.h */
89 struct ipc64_perm sem_perm; /* permissions .. see ipc.h */
118 struct ipc64_perm sem_perm; /* permissions .. see ipc.h */
149 struct ipc64_perm sem_perm; /* permissions .. see ipc.h */
173 struct ipc64_perm sem_perm; /* permissions .. see ipc.h */
215 struct ipc64_perm sem_perm; /* permissions .. see ipc.h */
/third_party/selinux/libselinux/src/
Davc.c415 * @requested: requested permissions, interpreted based on @tclass
419 * @requested permissions between the SID pair
420 * (@ssid, @tsid), interpreting the permissions
1020 * try_revoke only removes permissions from the cache in avc_control()
1046 /* revoke any unretained permissions */ in avc_control()
1062 * avc_ss_grant - Grant previously denied permissions.
1066 * @perms: permissions to grant
1078 * avc_ss_try_revoke - Try to revoke previously granted permissions.
1082 * @perms: permissions to grant
1086 * Try to revoke previously granted permissions, but
[all …]
/third_party/elfutils/config/
D10-default-yama-scope.conf8 # Usage of ptrace attach is restricted by normal user permissions. Normal
13 # yama ptrace scope can be used to reduce these permissions even more.
29 # 0 - Default attach security permissions.
30 # 1 - Restricted attach. Only child processes plus normal permissions.
/third_party/ltp/testcases/kernel/syscalls/setreuid/
Dsetreuid07.c23 * Check if setreuid behaves correctly with file permissions.
24 * The test creates a file as ROOT with permissions 0644, does a setreuid
25 * and then tries to open the file with RDWR permissions.
92 * with RDWR permissions. in do_master_child()
110 * with RDWR permissions. in do_master_child()
146 * the file with RDWR permissions. in do_master_child()
/third_party/cef/tests/ceftests/extensions/
Dextension_test_handler.cc153 CefRefPtr<CefListValue> permissions = CefListValue::Create(); in CreateDefaultManifest() local
154 permissions->SetSize(api_permissions.size() + 2); in CreateDefaultManifest()
157 permissions->SetString(idx, api_permissions[idx]); in CreateDefaultManifest()
160 permissions->SetString(idx++, "http://*/*"); in CreateDefaultManifest()
161 permissions->SetString(idx++, "https://*/*"); in CreateDefaultManifest()
163 manifest->SetList("permissions", permissions); in CreateDefaultManifest()
/third_party/skia/third_party/externals/egl-registry/extensions/EXT/
DEGL_EXT_stream_consumer_egloutput.txt125 access to such permissions or privileged native objects when creating
129 the output modification permissions provided to the EGLDisplay, or
130 revokes permissions from the privileged native objects provided to
202 permissions or native object handles when creating its EGLDisplay.
205 not have the necessary permissions to modify output attributes?
208 block consumption of frames indefinitely until permissions are
211 lack of permissions. However, both of these options may rely on
/third_party/EGL/extensions/EXT/
DEGL_EXT_stream_consumer_egloutput.txt125 access to such permissions or privileged native objects when creating
129 the output modification permissions provided to the EGLDisplay, or
130 revokes permissions from the privileged native objects provided to
202 permissions or native object handles when creating its EGLDisplay.
205 not have the necessary permissions to modify output attributes?
208 block consumption of frames indefinitely until permissions are
211 lack of permissions. However, both of these options may rely on
/third_party/skia/third_party/externals/swiftshader/third_party/llvm-10.0/llvm/include/llvm/ExecutionEngine/
DSectionMemoryManager.h36 /// page permissions have been applied before attempting to execute functions
37 /// in the JITed object. Permissions can be applied either by calling
131 /// Update section-specific memory permissions and other attributes.
134 /// permissions can be applied. It is up to the memory manager implementation
137 /// permissions when this method is called. Code sections cannot be executed
166 // which have not yet had their permissions applied, but have been given
168 // neither had their permissions applied, nor been given out to the user.
182 unsigned Permissions);
/third_party/ltp/testcases/kernel/syscalls/setfsuid/
Dsetfsuid04.c22 * Check if setfsuid behaves correctly with file permissions.
23 * The test creates a file as ROOT with permissions 0644, does a setfsuid
24 * and then tries to open the file with RDWR permissions.
89 * with RDWR permissions. in do_master_child()
107 * with RDWR permissions. in do_master_child()
144 * the file with RDWR permissions. in do_master_child()

12345678910>>...463