/freebsd-current/contrib/unbound/testdata/stat_values.tdir/ |
H A D | stat_values_downstream_cookies.conf | 22 access-control: 127.0.0.1 allow_cookie
|
/freebsd-current/sys/amd64/vmm/amd/ |
H A D | vmcb.c | 147 SVM_CTR1(vcpu, "Invalid size %d for VMCB access: %d", bytes); 397 * Map seg_desc access to VMCB attribute format. 402 attrib = ((desc->access & 0xF000) >> 4) | (desc->access & 0xFF); 403 if (SEG_DESC_UNUSABLE(desc->access)) { 443 desc->access = 0; 446 /* Map seg_desc access to VMCB attribute format */ 447 desc->access = ((seg->attrib & 0xF00) << 4) | 452 * with a NULL selector (aka unusable). The 'desc->access' 461 if ((desc->access [all...] |
/freebsd-current/sys/amd64/vmm/intel/ |
H A D | vmcs.c | 256 uint32_t base, limit, access; local 258 error = vmcs_seg_desc_encoding(seg, &base, &limit, &access); 270 if (access != VMCS_INVALID_ENCODING) { 271 if ((error = vmwrite(access, desc->access)) != 0) 284 uint32_t base, limit, access; local 287 error = vmcs_seg_desc_encoding(seg, &base, &limit, &access); 301 if (access != VMCS_INVALID_ENCODING) { 302 if ((error = vmread(access, &u64)) != 0) 304 desc->access [all...] |
/freebsd-current/contrib/llvm-project/compiler-rt/lib/tsan/rtl/ |
H A D | tsan_rtl_access.cpp | 11 // Definitions of memory access and function entry/exit entry points. 206 if (LIKELY(!(cur.access() & old.access()))) 210 LIKELY(cur.access() == old.access() && old.IsRWWeakerOrEqual(typ))) { 224 // the current access info, so we are done. 234 # define LOAD_CURRENT_SHADOW(cur, shadow_mem) UNUSED int access = 0, shadow = 0 240 m128 access, AccessType typ) { 241 // Note: we could check if there is a larger access of the same type, 244 // access" 239 ContainsSameAccess(RawShadow* unused0, Shadow unused1, m128 shadow, m128 access, AccessType typ) argument 305 CheckRaces(ThreadState* thr, RawShadow* shadow_mem, Shadow cur, m128 shadow, m128 access, AccessType typ) argument 611 const m128 access = _mm_set1_epi32(static_cast<u32>(cur.raw())); local [all...] |
/freebsd-current/contrib/kyua/utils/ |
H A D | auto_array_test.cpp | 283 ATF_TEST_CASE(access); variable 284 ATF_TEST_CASE_HEAD(access) 286 set_md_var("descr", "Tests the auto_array smart pointer class' access " 289 ATF_TEST_CASE_BODY(access) 311 ATF_ADD_TEST_CASE(tcs, access);
|
/freebsd-current/sys/ofed/include/rdma/ |
H A D | ib_fmr_pool.h | 47 * @access:Access flags for FMRs in pool. 60 enum ib_access_flags access; member in struct:ib_fmr_pool_param
|
/freebsd-current/usr.bin/login/ |
H A D | Makefile | 7 CONFS= fbtab login.conf motd.template login.access
|
/freebsd-current/tools/test/stress2/misc/ |
H A D | pkru.sh | 53 int x86_pkru_get_perm(unsigned int keyidx, int *access, int *modify); 54 int x86_pkru_set_perm(unsigned int keyidx, int access, int modify); 112 int x86_pkru_get_perm(unsigned int keyidx, int *access, int *modify); 113 int x86_pkru_set_perm(unsigned int keyidx, int access, int modify); 176 int x86_pkru_get_perm(unsigned int keyidx, int *access, int *modify); 177 int x86_pkru_set_perm(unsigned int keyidx, int access, int modify); 265 int x86_pkru_get_perm(unsigned int keyidx, int *access, int *modify); 266 int x86_pkru_set_perm(unsigned int keyidx, int access, int modify); 316 printf("Fault from background access thread\n"); 404 int access, erro [all...] |
H A D | linger.sh | 99 if (access("rendezvous", R_OK) == 0) 157 if (access("continue", R_OK) == -1)
|
/freebsd-current/crypto/heimdal/appl/login/ |
H A D | Makefile.am | 5 man_MANS = login.1 login.access.5
|
/freebsd-current/contrib/netbsd-tests/lib/libc/c063/ |
H A D | t_mkfifoat.c | 63 ATF_REQUIRE(access(FIFO, F_OK) == 0); 79 ATF_REQUIRE(access(FIFO, F_OK) == 0);
|
H A D | t_mkdirat.c | 64 ATF_REQUIRE(access(SDIR, F_OK) == 0); 79 ATF_REQUIRE(access(SDIR, F_OK) == 0);
|
H A D | t_mknodat.c | 82 ATF_REQUIRE(access(FILE, F_OK) == 0); 103 ATF_REQUIRE(access(FILE, F_OK) == 0);
|
/freebsd-current/sys/x86/include/ |
H A D | sysarch.h | 143 int x86_pkru_get_perm(unsigned int keyidx, int *access, int *modify); 144 int x86_pkru_set_perm(unsigned int keyidx, int access, int modify);
|
/freebsd-current/tools/regression/security/access/ |
H A D | testaccess.c | 42 * Regression test to check some basic cases and see if access() and 48 * Note that this may also break if filesystem access control is 217 error = access("test1", R_OK); 246 error = access("test2", R_OK); 248 fprintf(stderr, "Effective uid was used instead of real uid in access().\n"); 262 error = access("test3", R_OK); 264 fprintf(stderr, "Effective uid was used instead of real uid in access().\n"); 300 error = access("test4", R_OK); 314 error = access("test5", R_OK); 316 fprintf(stderr, "Effective gid was used instead of real gid in access() [all...] |
/freebsd-current/tests/sys/fs/fusefs/ |
H A D | access.cc | 67 in.body.access.mask & access_mask); 157 ASSERT_NE(0, access(FULLPATH, access_mode)); 176 ASSERT_EQ(0, access(FULLPATH, access_mode)) << strerror(errno); 177 ASSERT_EQ(0, access(FULLPATH, access_mode)) << strerror(errno); 190 ASSERT_NE(0, access(FULLPATH, access_mode)); 233 ASSERT_EQ(0, access(FULLPATH, access_mode)) << strerror(errno);
|
H A D | lookup.cc | 147 /* access(2) will issue a VOP_LOOKUP and fill the attr cache */ 148 ASSERT_EQ(0, access(FULLPATH, F_OK)) << strerror(errno); 149 /* Next access(2) will use the cached attributes */ 171 * access(2) is one of the few syscalls that will not (always) follow 174 ASSERT_EQ(0, access(FULLPATH, F_OK)) << strerror(errno); 192 * access(2) is one of the few syscalls that will not (always) follow 195 ASSERT_EQ(0, access(FULLPATH, F_OK)) << strerror(errno); 296 EXPECT_NE(0, access(FULLPATH, F_OK)); 308 EXPECT_NE(0, access(FULLPATH, F_OK)); 325 ASSERT_EQ(-1, access(FULLPAT [all...] |
H A D | dev_fuse_poll.cc | 82 TEST_P(DevFusePoll, access) 88 ASSERT_EQ(0, access(FULLPATH, access_mode)) << strerror(errno); 202 access("mountpoint/foo", F_OK); 203 access("mountpoint/bar", F_OK); 204 access("mountpoint/baz", F_OK);
|
/freebsd-current/sys/kern/ |
H A D | subr_pctrie.c | 93 enum pctrie_access access); 144 pctrie_node_load(smr_pctnode_t *p, smr_t smr, enum pctrie_access access) argument 146 switch (access) { 158 pctrie_node_store(smr_pctnode_t *p, void *v, enum pctrie_access access) argument 160 switch (access) { 180 pctrie_root_load(struct pctrie *ptree, smr_t smr, enum pctrie_access access) argument 182 return (pctrie_node_load((smr_pctnode_t *)&ptree->pt_root, smr, access)); 190 enum pctrie_access access) 192 pctrie_node_store((smr_pctnode_t *)&ptree->pt_root, node, access); 229 struct pctrie_node *child, enum pctrie_access access) 189 pctrie_root_store(struct pctrie *ptree, struct pctrie_node *node, enum pctrie_access access) argument 228 pctrie_addnode(struct pctrie_node *node, uint64_t index, struct pctrie_node *child, enum pctrie_access access) argument 477 _pctrie_lookup(struct pctrie *ptree, uint64_t index, smr_t smr, enum pctrie_access access) argument [all...] |
/freebsd-current/usr.sbin/bhyve/amd64/ |
H A D | task_switch.c | 129 seg_desc.access = usd->sd_type | usd->sd_dpl << 5 | usd->sd_p << 7; 130 seg_desc.access |= usd->sd_xx << 12; 131 seg_desc.access |= usd->sd_def32 << 14; 132 seg_desc.access |= usd->sd_gran << 15; 176 uint32_t limit, access; local 180 error = vm_get_desc(vcpu, reg, &base, &limit, &access); 184 if (SEG_DESC_UNUSABLE(access) || !SEG_DESC_PRESENT(access)) 209 uint32_t limit, access; local 213 error = vm_get_desc(vcpu, reg, &base, &limit, &access); 715 uint32_t eip, ot_lim, access; local [all...] |
/freebsd-current/sys/amd64/include/ |
H A D | vmm.h | 512 * The 'access' field has the format specified in Table 21-2 of the Intel 515 * XXX The contents of the 'access' field are architecturally defined except 521 uint32_t access; member in struct:seg_desc 523 #define SEG_DESC_TYPE(access) ((access) & 0x001f) 524 #define SEG_DESC_DPL(access) (((access) >> 5) & 0x3) 525 #define SEG_DESC_PRESENT(access) (((access) & 0x0080) ? 1 : 0) 526 #define SEG_DESC_DEF32(access) (((acces [all...] |
/freebsd-current/sys/contrib/openzfs/lib/libshare/os/linux/ |
H A D | nfs.c | 56 const char *host, const char *security, const char *access, void *cookie); 139 const char *access; local 155 access = opt; 209 access, udata->cookie); 564 if (access("/usr/sbin/exportfs", F_OK) != 0) 579 if (access(ZFS_EXPORTS_DIR, F_OK) != 0)
|
/freebsd-current/contrib/ncurses/ncurses/tinfo/ |
H A D | access.c | 40 MODULE_ID("$Id: access.c,v 1.27 2020/08/29 16:22:03 juergen Exp $") 45 # define ACCESS(FN, MODE) access((FN), (MODE)&(R_OK|W_OK)) 47 # define ACCESS access
|
/freebsd-current/sys/ofed/drivers/infiniband/core/ |
H A D | rdma_core.h | 56 * the object is from the given type. Lock it to the required access when 58 * This function could create (access == NEW), destroy (access == DESTROY) 59 * or unlock (access == READ || access == WRITE) objects if required. 64 uverbs_get_uobject_from_file(u16 object_id, enum uverbs_obj_access access, 68 enum uverbs_obj_access access, bool commit,
|
/freebsd-current/sys/contrib/openzfs/lib/libzutil/ |
H A D | zutil_device_path.c | 68 if (access(path, F_OK) == 0) 83 if (access(path, F_OK) == 0)
|