/freebsd-12-stable/sys/arm/include/ |
H A D | debug_monitor.h | 60 enum dbg_access_t access __unused)
|
/freebsd-12-stable/usr.bin/svn/lib/libsvn_fs/ |
H A D | Makefile | 10 SRCS= access.c \
|
/freebsd-12-stable/sys/contrib/ngatm/netnatm/msg/ |
H A D | parseie.awk | 97 access = 0 100 if($i == "access") { 101 access = 1
|
H A D | geniec.awk | 101 if(access) print "\tUNIFL_ACCESS,"
|
/freebsd-12-stable/sys/ofed/include/rdma/ |
H A D | ib_umem.h | 89 size_t size, int access, int dmasync); 101 int access, int dmasync) { 99 ib_umem_get(struct ib_ucontext *context, unsigned long addr, size_t size, int access, int dmasync) argument
|
H A D | ib_fmr_pool.h | 49 * @access:Access flags for FMRs in pool. 62 enum ib_access_flags access; member in struct:ib_fmr_pool_param
|
/freebsd-12-stable/sys/amd64/vmm/intel/ |
H A D | vmcs.c | 256 uint32_t base, limit, access; local 258 error = vmcs_seg_desc_encoding(seg, &base, &limit, &access); 270 if (access != VMCS_INVALID_ENCODING) { 271 if ((error = vmwrite(access, desc->access)) != 0) 284 uint32_t base, limit, access; local 287 error = vmcs_seg_desc_encoding(seg, &base, &limit, &access); 301 if (access != VMCS_INVALID_ENCODING) { 302 if ((error = vmread(access, &u64)) != 0) 304 desc->access [all...] |
/freebsd-12-stable/sys/amd64/vmm/amd/ |
H A D | vmcb.c | 146 "Invalid size %d for VMCB access: %d", bytes); 382 * Map seg_desc access to VMCB attribute format. 387 attrib = ((desc->access & 0xF000) >> 4) | (desc->access & 0xFF); 388 if (SEG_DESC_UNUSABLE(desc->access)) { 430 desc->access = 0; 433 /* Map seg_desc access to VMCB attribute format */ 434 desc->access = ((seg->attrib & 0xF00) << 4) | 439 * with a NULL selector (aka unusable). The 'desc->access' 448 if ((desc->access [all...] |
/freebsd-12-stable/contrib/gcc/config/i386/ |
H A D | xm-djgpp.h | 63 else if (access (djgpp, R_OK) == 0) \
|
/freebsd-12-stable/contrib/llvm-project/lldb/source/Plugins/SymbolFile/NativePDB/ |
H A D | UdtRecordCompleter.cpp | 53 llvm::codeview::TypeIndex ti, llvm::codeview::MemberAccess access, 62 qt.getAsOpaquePtr(), TranslateMemberAccess(access), 73 MemberAccess access, MethodOptions options, 79 lldb::AccessType access_type = TranslateMemberAccess(access); 129 lldb::AccessType access = local 132 m_derived_ct, static_data_member.Name, member_ct, access); 165 lldb::AccessType access = TranslateMemberAccess(data_member.getAccess()); local 169 access, bitfield_width); 52 AddBaseClassForTypeIndex( llvm::codeview::TypeIndex ti, llvm::codeview::MemberAccess access, llvm::Optional<uint64_t> vtable_idx) argument 72 AddMethod(llvm::StringRef name, TypeIndex type_idx, MemberAccess access, MethodOptions options, MemberAttributes attrs) argument
|
H A D | UdtRecordCompleter.h | 71 llvm::codeview::TypeIndex ti, llvm::codeview::MemberAccess access, 74 llvm::codeview::MemberAccess access,
|
/freebsd-12-stable/crypto/heimdal/appl/login/ |
H A D | Makefile.am | 5 man_MANS = login.1 login.access.5
|
/freebsd-12-stable/contrib/netbsd-tests/lib/libc/c063/ |
H A D | t_mkdirat.c | 64 ATF_REQUIRE(access(SDIR, F_OK) == 0); 79 ATF_REQUIRE(access(SDIR, F_OK) == 0);
|
H A D | t_mkfifoat.c | 63 ATF_REQUIRE(access(FIFO, F_OK) == 0); 79 ATF_REQUIRE(access(FIFO, F_OK) == 0);
|
H A D | t_mknodat.c | 82 ATF_REQUIRE(access(FILE, F_OK) == 0); 103 ATF_REQUIRE(access(FILE, F_OK) == 0);
|
/freebsd-12-stable/contrib/subversion/subversion/libsvn_repos/ |
H A D | authz.h | 62 * Individual access flags 65 /* TODO: Future extension for lookup/traverse access. 68 /* Read access allows listing directory entries, reading file 72 /* Write access allows adding, removing and renaming directory 78 * Combined access flags 81 /* No access. */ 85 /* TODO: Lookup access is a synonym for the lookup flag. 88 /* Read access (TODO: implies lookup access). */ 91 /* Write access implie 300 authz_access_t access; member in struct:authz_ace_t [all...] |
H A D | authz_parse.c | 1 /* authz_parse.c : Parser for path-based access control 52 /* The set of access control entries. In the second pass, aliases in 57 /* The set of access control entries that use aliases. In the second 155 /* The anonymous access token. */ 158 /* The authenticated access token. */ 165 The minimum rights start with all available access and are later 166 bitwise-and'ed with actual access rights. The maximum rights begin 840 /* Parses an access entry. Groups and users in access entry names will 852 authz_access_t access local 1236 update_rights(authz_rights_t *rights, authz_access_t access) argument 1246 update_global_rights(authz_global_rights_t *gr, const char *repos, authz_access_t access) argument 1281 authz_access_t access; local [all...] |
/freebsd-12-stable/sys/x86/include/ |
H A D | sysarch.h | 145 int x86_pkru_get_perm(unsigned int keyidx, int *access, int *modify); 146 int x86_pkru_set_perm(unsigned int keyidx, int access, int modify);
|
/freebsd-12-stable/tests/sys/fs/fusefs/ |
H A D | access.cc | 69 in.body.access.mask & access_mask); 159 ASSERT_NE(0, access(FULLPATH, access_mode)); 178 ASSERT_EQ(0, access(FULLPATH, access_mode)) << strerror(errno); 179 ASSERT_EQ(0, access(FULLPATH, access_mode)) << strerror(errno); 192 ASSERT_NE(0, access(FULLPATH, access_mode)); 235 ASSERT_EQ(0, access(FULLPATH, access_mode)) << strerror(errno);
|
H A D | dev_fuse_poll.cc | 84 TEST_P(DevFusePoll, access) 90 ASSERT_EQ(0, access(FULLPATH, access_mode)) << strerror(errno); 205 access("mountpoint/foo", F_OK); 206 access("mountpoint/bar", F_OK); 207 access("mountpoint/baz", F_OK);
|
/freebsd-12-stable/tools/regression/security/access/ |
H A D | testaccess.c | 44 * Regression test to check some basic cases and see if access() and 50 * Note that this may also break if filesystem access control is 219 error = access("test1", R_OK); 248 error = access("test2", R_OK); 250 fprintf(stderr, "Effective uid was used instead of real uid in access().\n"); 264 error = access("test3", R_OK); 266 fprintf(stderr, "Effective uid was used instead of real uid in access().\n"); 302 error = access("test4", R_OK); 316 error = access("test5", R_OK); 318 fprintf(stderr, "Effective gid was used instead of real gid in access() [all...] |
/freebsd-12-stable/usr.sbin/bhyve/ |
H A D | task_switch.c | 133 seg_desc.access = usd->sd_type | usd->sd_dpl << 5 | usd->sd_p << 7; 134 seg_desc.access |= usd->sd_xx << 12; 135 seg_desc.access |= usd->sd_def32 << 14; 136 seg_desc.access |= usd->sd_gran << 15; 180 uint32_t limit, access; local 184 error = vm_get_desc(ctx, vcpu, reg, &base, &limit, &access); 188 if (SEG_DESC_UNUSABLE(access) || !SEG_DESC_PRESENT(access)) 213 uint32_t limit, access; local 217 error = vm_get_desc(ctx, vcpu, reg, &base, &limit, &access); 716 uint32_t eip, ot_lim, access; local [all...] |
/freebsd-12-stable/sys/amd64/include/ |
H A D | vmm.h | 450 * The 'access' field has the format specified in Table 21-2 of the Intel 453 * XXX The contents of the 'access' field are architecturally defined except 459 uint32_t access; member in struct:seg_desc 461 #define SEG_DESC_TYPE(access) ((access) & 0x001f) 462 #define SEG_DESC_DPL(access) (((access) >> 5) & 0x3) 463 #define SEG_DESC_PRESENT(access) (((access) & 0x0080) ? 1 : 0) 464 #define SEG_DESC_DEF32(access) (((acces [all...] |
/freebsd-12-stable/sys/sys/ |
H A D | jail.h | 343 #define SYSCTL_JAIL_PARAM_STRING(module, param, access, len, descr) \ 345 CTLTYPE_STRING | CTLFLAG_MPSAFE | (access), NULL, len, \ 347 #define SYSCTL_JAIL_PARAM_STRUCT(module, param, access, len, fmt, descr)\ 349 CTLTYPE_STRUCT | CTLFLAG_MPSAFE | (access), NULL, len, \ 355 #define SYSCTL_JAIL_PARAM_SYS_NODE(module, access, descr) \ 357 SYSCTL_JAIL_PARAM(_##module, , CTLTYPE_INT | (access), "E,jailsys", \
|
/freebsd-12-stable/contrib/ncurses/ncurses/tinfo/ |
H A D | access.c | 39 MODULE_ID("$Id: access.c,v 1.23 2012/09/01 19:21:29 tom Exp $") 122 } else if (access(path, mode) < 0) { 137 result = access(head, R_OK | W_OK | X_OK);
|