Searched refs:permissions (Results 376 - 400 of 435) sorted by relevance

<<1112131415161718

/external/selinux/libsepol/cil/src/
H A Dcil_binary.c303 rc = symtab_init(&sepol_common->permissions, PERM_SYMTAB_SIZE);
314 rc = hashtab_insert(sepol_common->permissions.table, key, sepol_perm);
319 sepol_perm->s.value = sepol_common->permissions.nprim + 1;
320 sepol_common->permissions.nprim++;
357 rc = symtab_init(&sepol_class->permissions, PERM_SYMTAB_SIZE);
375 sepol_class->permissions.nprim += sepol_common->permissions.nprim;
384 rc = hashtab_insert(sepol_class->permissions.table, key, sepol_perm);
390 sepol_perm->s.value = sepol_class->permissions.nprim + 1;
391 sepol_class->permissions
[all...]
/external/google-tv-pairing-protocol/cpp/
H A Dmain.scons12 # See the License for the specific language governing permissions and
/external/icu/icu4c/source/common/
H A DAndroid.mk12 # See the License for the specific language governing permissions and
/external/icu/icu4c/source/i18n/
H A DAndroid.mk12 # See the License for the specific language governing permissions and
/external/junit/
H A DAndroid.mk12 # See the License for the specific language governing permissions and
/external/linux-tools-perf/src/tools/perf/
H A DAndroid.mk12 # See the License for the specific language governing permissions and
/external/lldb/tools/debugserver/source/MacOSX/
H A DMachVMMemory.cpp86 region_info->permissions = vmRegion.GetDNBPermissions();
108 region_info->permissions = 0;
/external/llvm/include/llvm/Support/
H A DFileSystem.h197 perms permissions() const { return Perms; } function in class:llvm::sys::fs::file_status
219 void permissions(perms p) { Perms = p; } function in class:llvm::sys::fs::file_status
/external/llvm/lib/Support/Unix/
H A DMemory.inc62 // the processor as loads. If the page has no read permissions,
175 /// permissions. This is typically used for JIT applications where we want
/external/neven/
H A DAndroid.mk12 # See the License for the specific language governing permissions and
/external/noto-fonts/
H A DAndroid.mk12 # See the License for the specific language governing permissions and
/external/selinux/libsepol/include/sepol/policydb/
H A Dpolicydb.h76 * in the configuration data: individual permissions,
105 symtab_t permissions; /* common permissions */ member in struct:common_datum
113 symtab_t permissions; /* class-specific permission symbol table */ member in struct:class_datum
114 constraint_node_t *constraints; /* constraints on class permissions */
240 uint32_t data; /* permissions or new type */
246 /* 256 bits of ioctl number permissions */
416 /* this array maps from class->value to the permissions within
/external/selinux/libsepol/src/
H A Dwrite.c874 buf[items++] = cpu_to_le32(comdatum->permissions.nprim);
875 buf[items++] = cpu_to_le32(comdatum->permissions.table->nel);
884 if (hashtab_map(comdatum->permissions.table, perm_write, pd))
904 buf[0] = cpu_to_le32(c->permissions);
969 buf[items++] = cpu_to_le32(cladatum->permissions.nprim);
970 if (cladatum->permissions.table)
971 buf[items++] = cpu_to_le32(cladatum->permissions.table->nel);
988 if (hashtab_map(cladatum->permissions.table, perm_write, pd))
H A Dexpand.c245 if (symtab_init(&new_common->permissions, PERM_SYMTAB_SIZE)) {
255 symtab_destroy(&new_common->permissions);
274 (common->permissions.table, perm_copy_callback,
275 &new_common->permissions)) {
298 new_con->permissions = src->permissions;
436 if (symtab_init(&new_class->permissions, PERM_SYMTAB_SIZE)) {
469 (class->permissions.table, perm_copy_callback,
470 &new_class->permissions)) {
490 new_class->permissions
[all...]
H A Dpolicydb.c1135 (void)hashtab_map(comdatum->permissions.table, perm_destroy, 0);
1136 hashtab_destroy(comdatum->permissions.table);
1154 (void)hashtab_map(cladatum->permissions.table, perm_destroy, 0);
1155 hashtab_destroy(cladatum->permissions.table);
1954 if (symtab_init(&comdatum->permissions, PERM_SYMTAB_SIZE))
1956 comdatum->permissions.nprim = le32_to_cpu(buf[2]);
1968 if (perm_read(p, comdatum->permissions.table, fp))
2007 c->permissions = le32_to_cpu(buf[0]);
2098 if (symtab_init(&cladatum->permissions, PERM_SYMTAB_SIZE))
2100 cladatum->permissions
[all...]
/external/vboot_reference/tests/
H A Drollback_index2_tests.c229 uint32_t TlclGetPermissions(uint32_t index, uint32_t* permissions) argument
232 *permissions = mock_permissions;
930 "RollbackKernelRead() bad permissions");
/external/libxml2/doc/
H A DbuildDocBookCatalog41 echo Checking path $ROOTCATALOG for permissions
/external/robolectric/src/main/java/com/xtremelabs/robolectric/tester/android/content/pm/
H A DStubPackageManager.java302 @Override public List<PackageInfo> getPackagesHoldingPermissions(String[] permissions, int flags) { argument
/external/toybox/lib/
H A Dlib.h166 void loopfiles_rw(char **argv, int flags, int permissions, int failok,
/external/selinux/checkpolicy/
H A Dcheckpolicy.c725 if (!cladatum->comdatum && !cladatum->permissions.nprim) {
739 permissions.
747 permissions.table,
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/
H A Dorg.eclipse.osgi.services_3.2.100.v20100503.jarMETA-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ...
/external/lldb/source/Plugins/Process/gdb-remote/
H A DProcessGDBRemote.cpp2089 ProcessGDBRemote::DoAllocateMemory (size_t size, uint32_t permissions, Error &error) argument
2098 allocated_addr = m_gdb_comm.AllocateMemory (size, permissions);
2105 if (permissions & lldb::ePermissionsReadable)
2107 if (permissions & lldb::ePermissionsWritable)
2109 if (permissions & lldb::ePermissionsExecutable)
2121 error.SetErrorStringWithFormat("unable to allocate %" PRIu64 " bytes of memory with permissions %s", (uint64_t)size, GetPermissionsAsCString (permissions));
H A DGDBRemoteCommunicationClient.cpp1351 GDBRemoteCommunicationClient::AllocateMemory (size_t size, uint32_t permissions)
1359 permissions & lldb::ePermissionsReadable ? "r" : "",
1360 permissions & lldb::ePermissionsWritable ? "w" : "",
1361 permissions & lldb::ePermissionsExecutable ? "x" : "");
1479 else if (name.compare ("permissions") == 0 && region_info.GetRange().IsValid())
1518 // We got a valid address range back but no permissions -- which means this is an unmapped page
/external/lldb/tools/debugserver/source/
H A DRNBRemote.cpp2930 // PPP: permissions can be any combo of r w x chars
2952 uint32_t permissions = 0; local
2959 case 'r': permissions |= eMemoryPermissionsReadable; break;
2960 case 'w': permissions |= eMemoryPermissionsWritable; break;
2961 case 'x': permissions |= eMemoryPermissionsExecutable; break;
2968 nub_addr_t addr = DNBProcessMemoryAllocate (m_ctx.ProcessID(), size, permissions);
3568 start:3a50000,size:100000,permissions:rwx
3599 // start:3a50000,size:100000,permissions:rwx
3605 if (region_info.permissions)
3607 ostrm << "permissions
[all...]
/external/conscrypt/
H A DAndroid.mk13 # See the License for the specific language governing permissions and

Completed in 734 milliseconds

<<1112131415161718