/freebsd-current/sys/sys/ |
H A D | sysctl.h | 155 * This describes the access space for a sysctl request. This is needed 160 struct thread *td; /* used for access checking */ 332 #define SYSCTL_ROOT_NODE(nbr, name, access, handler, descr) \ 334 nbr, #name, CTLTYPE_NODE|(access), NULL, 0, \ 336 CTASSERT(((access) & CTLTYPE) == 0 || \ 337 ((access) & SYSCTL_CT_ASSERT_MASK) == CTLTYPE_NODE) 340 #define SYSCTL_NODE(parent, nbr, name, access, handler, descr) \ 341 SYSCTL_NODE_WITH_LABEL(parent, nbr, name, access, handler, descr, NULL) 343 #define SYSCTL_NODE_WITH_LABEL(parent, nbr, name, access, handler, descr, label) \ 344 SYSCTL_OID_GLOBAL(parent, nbr, name, CTLTYPE_NODE|(access), \ [all...] |
/freebsd-current/tests/sys/cddl/zfs/tests/acl/nontrivial/ |
H A D | zfs_acl_chmod_rwx_004_pos.ksh | 37 # override existed access rule. 41 # 2. Loop the specified access one by one. 56 function check_access #log user node access rflag 61 typeset access=$4 64 if [[ $rflag == "allow" && $access == execute ]]; then 65 rwx_node $user $node $access 72 log_note "SUCCESS: rwx_node $user $node $access" 74 log_fail "FAIL: rwx_node $user $node $access" 77 $log rwx_node $user $node $access 81 function verify_explicit_ACL_rule #node access fla [all...] |
H A D | zfs_acl_chmod_rwx_003_pos.ksh | 41 # 2. Separated verify type@:access:allow|deny to file and directory 115 typeset flag access acl_spec 118 for access in ${a_access[@]}; do 120 acl_spec="$flag:$access:$tp"
|
/freebsd-current/lib/libpam/modules/pam_login_access/ |
H A D | Makefile | 30 MAN= login.access.5 pam_login_access.8
|
/freebsd-current/sys/dev/io/ |
H A D | iodev.h | 36 u_int access; member in struct:iodev_pio_req
|
/freebsd-current/contrib/kyua/utils/fs/ |
H A D | auto_cleaners_test.cpp | 54 ATF_REQUIRE(::access("root", X_OK) == 0); 60 ATF_REQUIRE(::access("root", X_OK) == 0); 62 ATF_REQUIRE(::access("root", X_OK) == -1); 75 ATF_REQUIRE(::access("root", X_OK) == 0); 78 ATF_REQUIRE(::access("root", X_OK) == -1); 92 ATF_REQUIRE(::access((fs::path("tmp") / path_template).c_str(), 96 ATF_REQUIRE(::access(auto_directory.directory().c_str(), X_OK) == 0); 111 ATF_REQUIRE(::access(file.c_str(), R_OK) == 0); 117 ATF_REQUIRE(::access(file.c_str(), R_OK) == 0); 119 ATF_REQUIRE(::access(fil [all...] |
/freebsd-current/lib/libsys/i386/ |
H A D | i386_set_watch.c | 36 int access, struct dbreg * d) 51 switch (access) { 71 mask |= access; 35 i386_set_watch(int watchnum, unsigned int watchaddr, int size, int access, struct dbreg * d) argument
|
/freebsd-current/lib/libsys/x86/ |
H A D | pkru.c | 47 x86_pkru_get_perm_unsup(u_int keyidx, int *access, int *modify) argument 55 x86_pkru_get_perm_hw(u_int keyidx, int *access, int *modify) argument 65 *access = (pkru & (1 << keyidx)) == 0; 78 x86_pkru_set_perm_unsup(u_int keyidx, int access, int modify) argument 86 x86_pkru_set_perm_hw(u_int keyidx, int access, int modify) argument 97 if (!access)
|
/freebsd-current/sys/x86/x86/ |
H A D | dbreg.c | 55 int access, struct dbreg *d) 62 if (access == DBREG_DR7_EXEC) 94 d->dr[7] |= DBREG_DR7_SET(watchnum, len, access, 133 dbreg_set_watchpoint(vm_offset_t addr, vm_size_t size, int access) argument 146 /* Validate the access type */ 147 if (access != DBREG_DR7_EXEC && access != DBREG_DR7_WRONLY && 148 access != DBREG_DR7_RDWR) 175 dbreg_set_watchreg(i, addr, wsize, access, d); 278 kdb_cpu_set_watchpoint(vm_offset_t addr, vm_size_t size, int access) argument 54 dbreg_set_watchreg(int watchnum, vm_offset_t watchaddr, vm_size_t size, int access, struct dbreg *d) argument [all...] |
/freebsd-current/sys/amd64/include/ |
H A D | kdb.h | 35 int kdb_cpu_set_watchpoint(vm_offset_t addr, vm_size_t size, int access);
|
/freebsd-current/sys/dev/ocs_fc/ |
H A D | ocs_mgmt.h | 96 extern void ocs_mgmt_emit_property_name(ocs_textbuf_t *textbuf, int access, const char *name); 97 extern void ocs_mgmt_emit_string(ocs_textbuf_t *textbuf, int access, const char *name, const char *value); 99 extern void ocs_mgmt_emit_int(ocs_textbuf_t *textbuf, int access, const char *name, const char *fmt, ...); 100 extern void ocs_mgmt_emit_boolean(ocs_textbuf_t *textbuf, int access, const char *name, const int value);
|
/freebsd-current/sys/i386/include/ |
H A D | kdb.h | 35 int kdb_cpu_set_watchpoint(vm_offset_t addr, vm_size_t size, int access);
|
/freebsd-current/sys/riscv/include/ |
H A D | kdb.h | 59 kdb_cpu_set_watchpoint(vm_offset_t addr, vm_size_t size, int access) argument
|
/freebsd-current/contrib/llvm-project/libcxx/include/__ranges/ |
H A D | dangling.h | 14 #include <__ranges/access.h>
|
/freebsd-current/sys/arm64/include/ |
H A D | kdb.h | 42 int kdb_cpu_set_watchpoint(vm_offset_t addr, size_t size, int access);
|
/freebsd-current/contrib/netbsd-tests/lib/libc/sys/ |
H A D | t_access.c | 49 static const char path[] = "access"; 55 atf_tc_set_md_var(tc, "descr", "Test access(2) for EACCES"); 76 ATF_REQUIRE(access(path, mode[i]) != 0); 91 atf_tc_set_md_var(tc, "descr", "Test access(2) for EFAULT"); 102 ATF_REQUIRE(access(NULL, mode[i]) != 0); 107 ATF_REQUIRE(access((char *)-1, mode[i]) != 0); 115 atf_tc_set_md_var(tc, "descr", "Test access(2) for EINVAL"); 122 atf_tc_expect_fail("arguments to access aren't validated; see " 127 ATF_REQUIRE(access("/usr", -1) != 0); 134 atf_tc_set_md_var(tc, "descr", "Test access( [all...] |
/freebsd-current/contrib/llvm-project/lldb/source/Plugins/SymbolFile/NativePDB/ |
H A D | UdtRecordCompleter.h | 88 lldb::AccessType access; member in struct:lldb_private::npdb::UdtRecordCompleter::Member 97 access(lldb::eAccessPublic), bitfield_width(0), base_offset(0) {} 99 clang::QualType qt, lldb::AccessType access, uint32_t bitfield_width) 101 qt(qt), access(access), bitfield_width(bitfield_width), 107 access, bitfield_width)); 110 access = lldb::eAccessPublic; 122 lldb::AccessType access, uint64_t bitfield_width); 130 llvm::codeview::TypeIndex ti, llvm::codeview::MemberAccess access, 133 llvm::codeview::MemberAccess access, 98 Member(llvm::StringRef name, uint64_t bit_offset, uint64_t bit_size, clang::QualType qt, lldb::AccessType access, uint32_t bitfield_width) argument [all...] |
/freebsd-current/tests/sys/fs/fusefs/ |
H A D | forget.cc | 83 * access(2) the file to force a lookup. Access it twice to double its 86 ASSERT_EQ(0, access(FULLPATH, F_OK)) << strerror(errno); 87 ASSERT_EQ(0, access(FULLPATH, F_OK)) << strerror(errno); 139 ASSERT_EQ(0, access(FULLFPATH, F_OK)) << strerror(errno); 145 ASSERT_EQ(0, access(FULLFPATH, F_OK)) << strerror(errno); 170 /* access(2) the file to force a lookup. */ 171 ASSERT_EQ(0, access(FULLPATH, F_OK)) << strerror(errno); 177 ASSERT_EQ(0, access(FULLPATH, F_OK)) << strerror(errno);
|
/freebsd-current/contrib/llvm-project/clang/include/clang/Tooling/Transformer/ |
H A D | Stencil.h | 99 /// object bound to \p BaseId. The access is constructed idiomatically: if \p 103 Stencil access(llvm::StringRef BaseId, Stencil Member); 104 inline Stencil access(llvm::StringRef BaseId, llvm::StringRef Member) { function in namespace:clang::transformer 105 return access(BaseId, detail::makeStencil(Member));
|
/freebsd-current/contrib/openbsm/bin/auditdistd/ |
H A D | faccessat.h | 58 ret = access(path, mode);
|
/freebsd-current/sys/arm/include/ |
H A D | kdb.h | 40 int kdb_cpu_set_watchpoint(vm_offset_t addr, size_t size, int access);
|
/freebsd-current/sys/powerpc/include/ |
H A D | kdb.h | 54 kdb_cpu_set_watchpoint(vm_offset_t addr, vm_size_t size, int access) argument
|
/freebsd-current/tests/sys/audit/ |
H A D | Makefile | 4 ATF_TESTS_C= file-attribute-access 19 SRCS.file-attribute-access+= file-attribute-access.c 20 SRCS.file-attribute-access+= utils.c
|
/freebsd-current/sys/ofed/include/rdma/ |
H A D | ib_umem.h | 87 size_t size, int access, int dmasync); 99 int access, int dmasync) { 97 ib_umem_get(struct ib_ucontext *context, unsigned long addr, size_t size, int access, int dmasync) argument
|
/freebsd-current/contrib/unbound/testdata/ip_ratelimit.tdir/ |
H A D | ip_ratelimit.conf | 18 access-control: 127.0.0.0/8 allow_cookie
|