/prebuilts/go/darwin-x86/src/syscall/ |
zsyscall_dragonfly_amd64.go | 312 func Access(path string, mode uint32) (err error) {
|
zsyscall_freebsd_386.go | 278 func Access(path string, mode uint32) (err error) {
|
zsyscall_freebsd_amd64.go | 278 func Access(path string, mode uint32) (err error) {
|
zsyscall_freebsd_arm.go | 278 func Access(path string, mode uint32) (err error) {
|
zsyscall_netbsd_386.go | 295 func Access(path string, mode uint32) (err error) {
|
zsyscall_netbsd_amd64.go | 295 func Access(path string, mode uint32) (err error) {
|
zsyscall_netbsd_arm.go | 295 func Access(path string, mode uint32) (err error) {
|
zsyscall_openbsd_386.go | 293 func Access(path string, mode uint32) (err error) {
|
zsyscall_openbsd_amd64.go | 293 func Access(path string, mode uint32) (err error) {
|
zsyscall_openbsd_arm.go | 292 func Access(path string, mode uint32) (err error) {
|
/prebuilts/go/linux-x86/src/syscall/ |
syscall_linux.go | 20 func Access(path string, mode uint32) (err error) { 624 // access (PEEKUSER warns that it might), but if we don't 802 * Direct access
|
zsyscall_dragonfly_amd64.go | 312 func Access(path string, mode uint32) (err error) {
|
zsyscall_freebsd_386.go | 278 func Access(path string, mode uint32) (err error) {
|
zsyscall_freebsd_amd64.go | 278 func Access(path string, mode uint32) (err error) {
|
zsyscall_freebsd_arm.go | 278 func Access(path string, mode uint32) (err error) {
|
zsyscall_netbsd_386.go | 295 func Access(path string, mode uint32) (err error) {
|
zsyscall_netbsd_amd64.go | 295 func Access(path string, mode uint32) (err error) {
|
zsyscall_netbsd_arm.go | 295 func Access(path string, mode uint32) (err error) {
|
zsyscall_openbsd_386.go | 293 func Access(path string, mode uint32) (err error) {
|
zsyscall_openbsd_amd64.go | 293 func Access(path string, mode uint32) (err error) {
|
zsyscall_openbsd_arm.go | 292 func Access(path string, mode uint32) (err error) {
|
/device/linaro/bootloader/edk2/SecurityPkg/UserIdentification/UserIdentifyManagerDxe/ |
UserIdentifyManager.c | 405 Check whether the access policy is valid.
407 @param[in] PolicyInfo Point to the access policy.
410 @retval TRUE The policy is a valid access policy.
411 @retval FALSE The access policy is not a valid access policy.
423 EFI_USER_INFO_ACCESS_CONTROL Access;
430 // Check access policy according to type.
432 CopyMem (&Access, PolicyInfo + TotalLen, sizeof (Access));
433 ValueLen = Access.Size - sizeof (EFI_USER_INFO_ACCESS_CONTROL); [all...] |
/device/linaro/bootloader/edk2/SourceLevelDebugPkg/Include/ |
TransferProtocol.h | 178 UINT8 Access:2; // Refer to below DEBUG_DATA_BREAKPOINT_ACCESS_XX macros
|
/external/clang/lib/Sema/ |
SemaAccess.cpp | 1 //===---- SemaAccess.cpp - C++ Access Control -------------------*- C++ -*-===// 10 // This file provides Sema routines for C++ access control semantics. 36 /// SetMemberAccessSpecifier - Set the access specifier of a member. 37 /// Returns true on error (when the previous member decl access specifier 38 /// is different from the new member decl access specifier). 43 // Use the lexical access specifier. 48 // C++ [class.access.spec]p3: When a member is redeclared its access 87 // C++11 [class.access.nest]p1: 88 // A nested class is a member and as such has the same access 1758 AccessSpecifier access = target->getAccess(); local [all...] |
/external/compiler-rt/lib/asan/ |
asan_report.cc | 72 const char *Access() { return Blue(); } 386 // current memory access, indicate it in the log. 412 // FIXME: we may want to also print the size of the access here, 414 str.append("%s <== Memory access at offset %zd %s this variable%s\n", 459 // Try to fetch precise stack frame for this access. 460 AsanThread::StackFrameAccess access; local 461 if (!t->GetStackFrameAccessByAddr(addr, &access)) { 465 Printf(" at offset %zu in frame%s\n", access.offset, d.EndLocation()); 478 access.frame_pc = *reinterpret_cast<uptr *>(access.frame_pc) [all...] |