/external/selinux/libsepol/cil/src/ |
H A D | cil_binary.c | 303 rc = symtab_init(&sepol_common->permissions, PERM_SYMTAB_SIZE); 314 rc = hashtab_insert(sepol_common->permissions.table, key, sepol_perm); 319 sepol_perm->s.value = sepol_common->permissions.nprim + 1; 320 sepol_common->permissions.nprim++; 357 rc = symtab_init(&sepol_class->permissions, PERM_SYMTAB_SIZE); 375 sepol_class->permissions.nprim += sepol_common->permissions.nprim; 384 rc = hashtab_insert(sepol_class->permissions.table, key, sepol_perm); 390 sepol_perm->s.value = sepol_class->permissions.nprim + 1; 391 sepol_class->permissions [all...] |
/external/google-tv-pairing-protocol/cpp/ |
H A D | main.scons | 12 # See the License for the specific language governing permissions and
|
/external/icu/icu4c/source/common/ |
H A D | Android.mk | 12 # See the License for the specific language governing permissions and
|
/external/icu/icu4c/source/i18n/ |
H A D | Android.mk | 12 # See the License for the specific language governing permissions and
|
/external/junit/ |
H A D | Android.mk | 12 # See the License for the specific language governing permissions and
|
/external/linux-tools-perf/src/tools/perf/ |
H A D | Android.mk | 12 # See the License for the specific language governing permissions and
|
/external/lldb/tools/debugserver/source/MacOSX/ |
H A D | MachVMMemory.cpp | 86 region_info->permissions = vmRegion.GetDNBPermissions(); 108 region_info->permissions = 0;
|
/external/llvm/include/llvm/Support/ |
H A D | FileSystem.h | 197 perms permissions() const { return Perms; } function in class:llvm::sys::fs::file_status 219 void permissions(perms p) { Perms = p; } function in class:llvm::sys::fs::file_status
|
/external/llvm/lib/Support/Unix/ |
H A D | Memory.inc | 62 // the processor as loads. If the page has no read permissions, 175 /// permissions. This is typically used for JIT applications where we want
|
/external/neven/ |
H A D | Android.mk | 12 # See the License for the specific language governing permissions and
|
/external/noto-fonts/ |
H A D | Android.mk | 12 # See the License for the specific language governing permissions and
|
/external/selinux/libsepol/include/sepol/policydb/ |
H A D | policydb.h | 76 * in the configuration data: individual permissions, 105 symtab_t permissions; /* common permissions */ member in struct:common_datum 113 symtab_t permissions; /* class-specific permission symbol table */ member in struct:class_datum 114 constraint_node_t *constraints; /* constraints on class permissions */ 240 uint32_t data; /* permissions or new type */ 246 /* 256 bits of ioctl number permissions */ 416 /* this array maps from class->value to the permissions within
|
/external/selinux/libsepol/src/ |
H A D | write.c | 874 buf[items++] = cpu_to_le32(comdatum->permissions.nprim); 875 buf[items++] = cpu_to_le32(comdatum->permissions.table->nel); 884 if (hashtab_map(comdatum->permissions.table, perm_write, pd)) 904 buf[0] = cpu_to_le32(c->permissions); 969 buf[items++] = cpu_to_le32(cladatum->permissions.nprim); 970 if (cladatum->permissions.table) 971 buf[items++] = cpu_to_le32(cladatum->permissions.table->nel); 988 if (hashtab_map(cladatum->permissions.table, perm_write, pd))
|
H A D | expand.c | 245 if (symtab_init(&new_common->permissions, PERM_SYMTAB_SIZE)) { 255 symtab_destroy(&new_common->permissions); 274 (common->permissions.table, perm_copy_callback, 275 &new_common->permissions)) { 298 new_con->permissions = src->permissions; 436 if (symtab_init(&new_class->permissions, PERM_SYMTAB_SIZE)) { 469 (class->permissions.table, perm_copy_callback, 470 &new_class->permissions)) { 490 new_class->permissions [all...] |
H A D | policydb.c | 1135 (void)hashtab_map(comdatum->permissions.table, perm_destroy, 0); 1136 hashtab_destroy(comdatum->permissions.table); 1154 (void)hashtab_map(cladatum->permissions.table, perm_destroy, 0); 1155 hashtab_destroy(cladatum->permissions.table); 1954 if (symtab_init(&comdatum->permissions, PERM_SYMTAB_SIZE)) 1956 comdatum->permissions.nprim = le32_to_cpu(buf[2]); 1968 if (perm_read(p, comdatum->permissions.table, fp)) 2007 c->permissions = le32_to_cpu(buf[0]); 2098 if (symtab_init(&cladatum->permissions, PERM_SYMTAB_SIZE)) 2100 cladatum->permissions [all...] |
/external/vboot_reference/tests/ |
H A D | rollback_index2_tests.c | 229 uint32_t TlclGetPermissions(uint32_t index, uint32_t* permissions) argument 232 *permissions = mock_permissions; 930 "RollbackKernelRead() bad permissions");
|
/external/libxml2/doc/ |
H A D | buildDocBookCatalog | 41 echo Checking path $ROOTCATALOG for permissions
|
/external/robolectric/src/main/java/com/xtremelabs/robolectric/tester/android/content/pm/ |
H A D | StubPackageManager.java | 302 @Override public List<PackageInfo> getPackagesHoldingPermissions(String[] permissions, int flags) { argument
|
/external/toybox/lib/ |
H A D | lib.h | 166 void loopfiles_rw(char **argv, int flags, int permissions, int failok,
|
/external/selinux/checkpolicy/ |
H A D | checkpolicy.c | 725 if (!cladatum->comdatum && !cladatum->permissions.nprim) { 739 permissions. 747 permissions.table,
|
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
H A D | org.eclipse.osgi.services_3.2.100.v20100503.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
/external/lldb/source/Plugins/Process/gdb-remote/ |
H A D | ProcessGDBRemote.cpp | 2089 ProcessGDBRemote::DoAllocateMemory (size_t size, uint32_t permissions, Error &error) argument 2098 allocated_addr = m_gdb_comm.AllocateMemory (size, permissions); 2105 if (permissions & lldb::ePermissionsReadable) 2107 if (permissions & lldb::ePermissionsWritable) 2109 if (permissions & lldb::ePermissionsExecutable) 2121 error.SetErrorStringWithFormat("unable to allocate %" PRIu64 " bytes of memory with permissions %s", (uint64_t)size, GetPermissionsAsCString (permissions));
|
H A D | GDBRemoteCommunicationClient.cpp | 1351 GDBRemoteCommunicationClient::AllocateMemory (size_t size, uint32_t permissions) 1359 permissions & lldb::ePermissionsReadable ? "r" : "", 1360 permissions & lldb::ePermissionsWritable ? "w" : "", 1361 permissions & lldb::ePermissionsExecutable ? "x" : ""); 1479 else if (name.compare ("permissions") == 0 && region_info.GetRange().IsValid()) 1518 // We got a valid address range back but no permissions -- which means this is an unmapped page
|
/external/lldb/tools/debugserver/source/ |
H A D | RNBRemote.cpp | 2930 // PPP: permissions can be any combo of r w x chars 2952 uint32_t permissions = 0; local 2959 case 'r': permissions |= eMemoryPermissionsReadable; break; 2960 case 'w': permissions |= eMemoryPermissionsWritable; break; 2961 case 'x': permissions |= eMemoryPermissionsExecutable; break; 2968 nub_addr_t addr = DNBProcessMemoryAllocate (m_ctx.ProcessID(), size, permissions); 3568 start:3a50000,size:100000,permissions:rwx 3599 // start:3a50000,size:100000,permissions:rwx 3605 if (region_info.permissions) 3607 ostrm << "permissions [all...] |
/external/conscrypt/ |
H A D | Android.mk | 13 # See the License for the specific language governing permissions and
|