/llvm-project/lldb/include/lldb/Breakpoint/ |
H A D | BreakpointName.h | 32 class Permissions 39 Permissions(bool in_list, bool in_disable, bool in_delete) in Permissions() function 47 Permissions(const Permissions &rhs) in Permissions() function 55 Permissions() in Permissions() function 63 const Permissions &operator= (const Permissions &rhs) 75 *this = Permissions(); in Clear() 78 // Merge the permissions from incoming into this set of permissions. Only 79 // merge set permissions, and most restrictive permission wins. 80 void MergeInto(const Permissions &incoming) in MergeInto() 128 void MergePermission(const Permissions &incoming, in MergePermission() [all …]
|
/llvm-project/libcxx/test/std/input.output/filesystems/fs.op.funcs/fs.op.permissions/ |
H A D | permissions.pass.cpp | 21 // void permissions(const path& p, perms prms, 23 // void permissions(const path& p, perms prms, std::error_code& ec) noexcept; 24 // void permissions(const path& p, perms prms, perm_options opts, std::error_code); 41 ASSERT_NOT_NOEXCEPT(fs::permissions(p, pr)); in test_signatures() 42 ASSERT_NOT_NOEXCEPT(fs::permissions(p, pr, opts)); in test_signatures() 43 ASSERT_NOEXCEPT(fs::permissions(p, pr, ec)); in test_signatures() 44 LIBCPP_ASSERT_NOT_NOEXCEPT(fs::permissions(p, pr, opts, ec)); in test_signatures() 54 fs::permissions(f, opts); in test_error_reporting() 72 fs::permissions(dne, fs::perms{}, ec); in test_error_reporting() 79 fs::permissions(dne_sym, fs::perms{}, ec); in test_error_reporting() [all …]
|
/llvm-project/libcxx/test/std/input.output/filesystems/class.directory_entry/directory_entry.mods/ |
H A D | refresh.pass.cpp | 76 const perms old_perms = status(dir).permissions(); in refresh_on_file_dne() 86 permissions(dir, perms::none); in refresh_on_file_dne() 89 permissions(dir, old_perms); in refresh_on_file_dne() 100 permissions(dir, perms::none); in refresh_on_file_dne() 118 const perms old_perms = status(dir).permissions(); in refresh_on_bad_symlink() 131 LIBCPP_ONLY(permissions(dir, perms::none)); in refresh_on_bad_symlink() 138 permissions(dir, old_perms); in refresh_on_bad_symlink() 153 LIBCPP_ONLY(permissions(dir, perms::none)); in refresh_on_bad_symlink() 171 perms old_perms = status(dir).permissions(); in refresh_cannot_resolve() 175 permissions(dir, perms::none); in refresh_cannot_resolve() [all …]
|
H A D | replace_filename.pass.cpp | 140 const perms old_perms = status(dir).permissions(); in test_replace_filename_propagates_error() 144 permissions(dir, perms::none); in test_replace_filename_propagates_error() 149 permissions(dir, old_perms); in test_replace_filename_propagates_error() 152 permissions(dir, perms::none); in test_replace_filename_propagates_error() 157 permissions(dir, old_perms); in test_replace_filename_propagates_error() 160 permissions(dir, perms::none); in test_replace_filename_propagates_error()
|
/llvm-project/lldb/include/lldb/Target/ |
H A D | MemoryRegionInfo.h | 84 // Get permissions as a uint32_t that is a mask of one or more bits from the in GetLLDBPermissions() 85 // lldb::Permissions in GetLLDBPermissions() 87 uint32_t permissions = 0; in GetLLDBPermissions() 89 permissions |= lldb::ePermissionsReadable; in GetLLDBPermissions() 91 permissions |= lldb::ePermissionsWritable; in GetLLDBPermissions() 93 permissions |= lldb::ePermissionsExecutable; 94 return permissions; 97 // Set permissions from a uint32_t that contains one or more bits from the in SetLLDBPermissions() 98 // lldb::Permissions in SetLLDBPermissions() 99 void SetLLDBPermissions(uint32_t permissions) { in SetLLDBPermissions() 83 uint32_t permissions = 0; GetLLDBPermissions() local 95 SetLLDBPermissions(uint32_t permissions) SetLLDBPermissions() argument [all...] |
/llvm-project/libcxx/test/std/input.output/filesystems/class.directory_entry/directory_entry.obs/ |
H A D | hard_link_count.pass.cpp | 95 const perms old_perms = status(dir).permissions(); in not_regular_file() 104 LIBCPP_ONLY(permissions(dir, perms::none)); in not_regular_file() 110 permissions(dir, old_perms); in not_regular_file() 134 const perms old_perms = status(dir).permissions(); in error_reporting() 182 // test a file w/o appropriate permissions. in error_reporting() 186 permissions(dir, perms::none); in error_reporting() 201 permissions(dir, old_perms); in error_reporting() 207 permissions(dir, old_perms); in error_reporting() 208 // test a symlink w/o appropriate permissions. in error_reporting() 212 permissions(dir, perms::none); in error_reporting() [all …]
|
H A D | last_write_time.pass.cpp | 99 const perms old_perms = status(dir).permissions(); in error_reporting() 146 // test a file w/o appropriate permissions. in error_reporting() 150 permissions(dir, perms::none); in error_reporting() 165 permissions(dir, old_perms); in error_reporting() 171 permissions(dir, old_perms); in error_reporting() 172 // test a symlink w/o appropriate permissions. in error_reporting() 176 permissions(dir, perms::none); in error_reporting() 191 permissions(dir, old_perms); in error_reporting() 197 permissions(dir, old_perms); in error_reporting() 198 // test a symlink to a file w/o appropriate permissions in error_reporting() [all …]
|
H A D | file_size.pass.cpp | 131 const perms old_perms = status(dir).permissions(); in error_reporting() 178 // test a file w/o appropriate permissions. in error_reporting() 182 permissions(dir, perms::none); in error_reporting() 196 permissions(dir, old_perms); in error_reporting() 202 permissions(dir, old_perms); in error_reporting() 203 // test a symlink w/o appropriate permissions. in error_reporting() 207 permissions(dir, perms::none); in error_reporting() 222 permissions(dir, old_perms); in error_reporting() 228 permissions(dir, old_perms); in error_reporting() 229 // test a symlink to a file w/o appropriate permissions in error_reporting() [all …]
|
/llvm-project/llvm/test/MC/ARM/ |
H A D | mappingsymbols.s | 5 # Check section containing code and data with no permissions for the section. 9 # Check section containing code and data with read/write permissions for the section. 13 # Check section containing data with no permissions for the section. 17 # Check section containing only data with read/write permissions for the section. 21 # Check section containing the ident string with no permissions for the section. 25 # Check section containing the attributes with no permissions for the section. 29 # Check section containing code and data with no permissions for the section. 34 # Check section containing code and data with no permissions for the section.
|
/llvm-project/libcxx/test/std/input.output/filesystems/class.file_status/ |
H A D | file_status.mods.pass.cpp | 16 // void permissions(perms) noexcept; 40 // permissions test in main() 42 static_assert(noexcept(st.permissions(perms::owner_read)), in main() 44 static_assert(std::is_same<decltype(st.permissions(perms::owner_read)), void>::value, in main() 46 assert(st.permissions() != perms::owner_read); in main() 47 st.permissions(perms::owner_read); in main() 48 assert(st.permissions() == perms::owner_read); in main()
|
H A D | file_status.obs.pass.cpp | 16 // perms permissions(p) const noexcept; 38 // permissions test in main() 40 static_assert(noexcept(st.permissions()), in main() 42 static_assert(std::is_same<decltype(st.permissions()), perms>::value, in main() 44 assert(st.permissions() == perms::owner_read); in main()
|
/llvm-project/libcxx/test/std/input.output/filesystems/fs.op.funcs/fs.op.symlink_status/ |
H A D | symlink_status.pass.cpp | 52 assert(st.permissions() == perms::unknown); in test_symlink_status_not_found() 57 assert(st.permissions() == perms::unknown); in test_symlink_status_not_found() 74 permissions(dir, perms::none); in test_symlink_status_cannot_resolve() 89 assert(st.permissions() == perms::unknown); in test_symlink_status_cannot_resolve() 110 assert(st.permissions() != perms::unknown); in test_symlink_status_cannot_resolve() 114 assert(st.permissions() != perms::unknown); in test_symlink_status_cannot_resolve() 150 assert(st.permissions() != perms::unknown); in symlink_status_file_types_test() 154 assert(st.permissions() != perms::unknown); in symlink_status_file_types_test() 185 assert(st.permissions() != perms::unknown); in test_block_file() 189 assert(st.permissions() != perms::unknown); in test_block_file() [all …]
|
/llvm-project/compiler-rt/include/ |
H A D | CMakeLists.txt | 88 PERMISSIONS OWNER_READ OWNER_WRITE GROUP_READ WORLD_READ 93 PERMISSIONS OWNER_READ OWNER_WRITE GROUP_READ WORLD_READ 99 PERMISSIONS OWNER_READ OWNER_WRITE GROUP_READ WORLD_READ 104 PERMISSIONS OWNER_READ OWNER_WRITE GROUP_READ WORLD_READ 111 PERMISSIONS OWNER_READ OWNER_WRITE GROUP_READ WORLD_READ 116 PERMISSIONS OWNER_READ OWNER_WRITE GROUP_READ WORLD_READ 121 PERMISSIONS OWNER_READ OWNER_WRITE GROUP_READ WORLD_READ
|
/llvm-project/lldb/test/API/tools/lldb-server/memory-allocation/ |
H A D | TestGdbRemoteMemoryAllocation.py | 11 def allocate(self, size, permissions): argument 14 "read packet: $_M{:x},{}#00".format(size, permissions), 32 … "regex": r"^\$start:([0-9a-fA-F]+);size:([0-9a-fA-F]+);permissions:([rwx]*);.*#[0-9a-fA-F]{2}$", 33 "capture": {1: "addr", 2: "size", 3: "permissions"}, 45 self.assertEqual(permissions, context.get("permissions")) 54 ) # Memory allocated with incorrect permissions
|
/llvm-project/lld/test/COFF/ |
H A D | pdb-publics-import.test | 104 CHECK-NEXT: execute permissions 105 CHECK-NEXT: read permissions 110 CHECK-NEXT: execute permissions 111 CHECK-NEXT: read permissions 116 CHECK-NEXT: read permissions 121 CHECK-NEXT: read permissions 122 CHECK-NEXT: write permissions 127 CHECK-NEXT: read permissions 128 CHECK-NEXT: write permissions 133 CHECK-NEXT: read permissions [all …]
|
/llvm-project/libcxx/test/std/input.output/filesystems/fs.op.funcs/fs.op.status/ |
H A D | status.pass.cpp | 53 assert(st.permissions() == perms::unknown); in test_status_not_found() 58 assert(st.permissions() == perms::unknown); in test_status_not_found() 74 permissions(dir, perms::none); in test_status_cannot_resolve() 95 assert(st.permissions() == perms::unknown); in test_status_cannot_resolve() 141 assert(st.permissions() != perms::unknown); in status_file_types_test() 145 assert(st.permissions() != perms::unknown); in status_file_types_test() 173 assert(st.permissions() != perms::unknown); in test_block_file() 177 assert(st.permissions() != perms::unknown); in test_block_file()
|
/llvm-project/libcxx/test/std/input.output/filesystems/fs.op.funcs/fs.op.create_directory/ |
H A D | create_directory_with_attributes.pass.cpp | 47 const perms orig_p = status(dir).permissions(); in create_existing_directory() 48 permissions(dir2, perms::none); in create_existing_directory() 54 // Check that the permissions were unchanged in create_existing_directory() 55 assert(orig_p == status(dir).permissions()); in create_existing_directory() 67 permissions(env.test_root, perms::set_gid, perm_options::remove); in create_directory_one_level() 71 permissions(attr_dir, perms::none); in create_directory_one_level() 78 // Check that the new directory has the same permissions as attr_dir in create_directory_one_level() 80 assert(st.permissions() == perms::none); in create_directory_one_level()
|
/llvm-project/lldb/test/Shell/ObjectFile/Breakpad/ |
H A D | sections.test | 9 CHECK-NEXT: Permissions: --- 23 CHECK-NEXT: Permissions: --- 37 CHECK-NEXT: Permissions: --- 50 CHECK-NEXT: Permissions: --- 65 CHECK-NEXT: Permissions: --- 78 CHECK-NEXT: Permissions: ---
|
/llvm-project/llvm/test/tools/llvm-objcopy/ELF/ |
H A D | mirror-permissions-unix.test | 1 ## Test that permissions for ouput files are mirrored 5 ## llvm-objcopy respects the umask in setting output permissions. 6 ## Setting the umask to 0 ensures deterministic permissions across 19 ## Set umask to be permissive of all permissions, 20 ## only test mirroring of permissions.
|
/llvm-project/.github/workflows/ |
H A D | release-tasks.yml | 3 permissions: 30 permissions: 60 permissions: 85 permissions: 112 permissions:
|
/llvm-project/lldb/source/Target/ |
H A D | Memory.cpp | 269 uint32_t permissions, uint32_t chunk_size) in AllocatedBlock() 270 : m_range(addr, byte_size), m_permissions(permissions), in AllocatedBlock() 361 AllocatedMemoryCache::AllocatePage(uint32_t byte_size, uint32_t permissions, in AllocatePage() 368 addr_t addr = m_process.DoAllocateMemory(page_byte_size, permissions, error); in AllocatePage() 374 ", permissions = %s) => 0x%16.16" PRIx64, in AllocatePage() 375 (uint32_t)page_byte_size, GetPermissionsAsCString(permissions), in AllocatePage() 381 permissions, chunk_size); in AllocatePage() 382 m_memory_map.insert(std::make_pair(permissions, block_sp)); in AllocatePage() 388 uint32_t permissions, in AllocateMemory() 394 range = m_memory_map.equal_range(permissions); in AllocateMemory() 268 AllocatedBlock(lldb::addr_t addr,uint32_t byte_size,uint32_t permissions,uint32_t chunk_size) AllocatedBlock() argument 360 AllocatePage(uint32_t byte_size,uint32_t permissions,uint32_t chunk_size,Status & error) AllocatePage() argument 387 AllocateMemory(size_t byte_size,uint32_t permissions,Status & error) AllocateMemory() argument [all...] |
/llvm-project/lldb/source/Host/common/ |
H A D | FileSystem.cpp | 415 static mode_t GetOpenMode(uint32_t permissions) { in GetOpenMode() argument 417 if (permissions & lldb::eFilePermissionsUserRead) in GetOpenMode() 419 if (permissions & lldb::eFilePermissionsUserWrite) in GetOpenMode() 421 if (permissions & lldb::eFilePermissionsUserExecute) in GetOpenMode() 423 if (permissions & lldb::eFilePermissionsGroupRead) in GetOpenMode() 425 if (permissions & lldb::eFilePermissionsGroupWrite) in GetOpenMode() 427 if (permissions & lldb::eFilePermissionsGroupExecute) in GetOpenMode() 429 if (permissions & lldb::eFilePermissionsWorldRead) in GetOpenMode() 431 if (permissions & lldb::eFilePermissionsWorldWrite) in GetOpenMode() 433 if (permissions & lldb::eFilePermissionsWorldExecute) in GetOpenMode() [all …]
|
/llvm-project/lldb/test/Shell/ObjectFile/MachO/ |
H A D | subsections.yaml | 9 #CHECK-NEXT: Permissions: --- 20 #CHECK-NEXT: Permissions: r-x 30 #CHECK-NEXT: Permissions: r-x 40 #CHECK-NEXT: Permissions: r-x 50 #CHECK-NEXT: Permissions: r-x
|
/llvm-project/llvm/include/llvm/ExecutionEngine/ |
H A D | SectionMemoryManager.h | 35 /// page permissions have been applied before attempting to execute functions 36 /// in the JITed object. Permissions can be applied either by calling 130 /// Update section-specific memory permissions and other attributes. 133 /// permissions can be applied. It is up to the memory manager implementation 136 /// permissions when this method is called. Code sections cannot be executed 165 // which have not yet had their permissions applied, but have been given 167 // neither had their permissions applied, nor been given out to the user. 181 unsigned Permissions);
|
/llvm-project/lldb/include/lldb/API/ |
H A D | SBSection.h | 57 /// Gets the permissions (RWX) of the section of the object file 59 /// Returns a mask of bits of enum lldb::Permissions for this section. 60 /// Sections for which permissions are not defined, 0 is returned for 62 /// i.e. for a section having read and execute permissions, the value 66 /// Returns an unsigned value for Permissions for the section.
|