Home
last modified time | relevance | path

Searched refs:permissions (Results 1 – 25 of 749) sorted by relevance

12345678910>>...30

/system/core/init/
Ddevices_test.cpp224 Permissions permissions("/dev/null", 0666, 0, 0); in TEST() local
225 EXPECT_TRUE(permissions.Match("/dev/null")); in TEST()
226 EXPECT_FALSE(permissions.Match("/dev/nullsuffix")); in TEST()
227 EXPECT_FALSE(permissions.Match("/dev/nul")); in TEST()
228 EXPECT_EQ(0666U, permissions.perm()); in TEST()
229 EXPECT_EQ(0U, permissions.uid()); in TEST()
230 EXPECT_EQ(0U, permissions.gid()); in TEST()
236 Permissions permissions("/dev/dri/*", 0666, 0, 1000); in TEST() local
237 EXPECT_TRUE(permissions.Match("/dev/dri/some_dri_device")); in TEST()
238 EXPECT_TRUE(permissions.Match("/dev/dri/some_other_dri_device")); in TEST()
[all …]
Dueventd_parser_test.cpp110 auto permissions = std::vector<Permissions>{ in TEST()
122 TestUeventdFile(ueventd_file, {{}, sysfs_permissions, permissions, {}}); in TEST()
192 auto permissions = std::vector<Permissions>{ in TEST()
213 TestUeventdFile(ueventd_file, {subsystems, sysfs_permissions, permissions, firmware_directories, in TEST()
/system/bt/service/common/bluetooth/
Ddescriptor.h27 Descriptor(uint16_t handle, const Uuid& uuid, uint16_t permissions) in Descriptor() argument
28 : handle_(handle), uuid_(uuid), permissions_(permissions){}; in Descriptor()
37 uint16_t permissions() const { return permissions_; } in permissions() function
Dcharacteristic.h30 uint16_t permissions, in Characteristic() argument
35 permissions_(permissions), in Characteristic()
48 uint16_t permissions() const { return permissions_; } in permissions() function
/system/core/libbacktrace/
DBacktraceMap.cpp67 char permissions[5]; in ParseLine() local
76 permissions, &name_pos) != 3) { in ParseLine()
83 if (permissions[0] == 'r') { in ParseLine()
86 if (permissions[1] == 'w') { in ParseLine()
89 if (permissions[2] == 'x') { in ParseLine()
/system/sepolicy/prebuilts/api/27.0/private/
Dattributes1 # Temporary attribute used for migrating permissions out of domain.
2 # Motivation: Domain is overly permissive. Start removing permissions
7 # reassigning the appropriate permissions to the inheriting domain
/system/sepolicy/prebuilts/api/26.0/private/
Dattributes1 # Temporary attribute used for migrating permissions out of domain.
2 # Motivation: Domain is overly permissive. Start removing permissions
7 # reassigning the appropriate permissions to the inheriting domain
/system/netd/bpf_progs/
Dnetd.c73 uint8_t* permissions = bpf_uid_permission_map_lookup_elem(&appId); in DEFINE_BPF_MAP() local
74 if (!permissions) { in DEFINE_BPF_MAP()
80 return (*permissions & BPF_PERMISSION_INTERNET) == BPF_PERMISSION_INTERNET; in DEFINE_BPF_MAP()
/system/sepolicy/prebuilts/api/26.0/public/
Dvirtual_touchpad.te8 # Needed to check app permissions.
15 # appropriate VR permissions.
Dmediaextractor.te23 # allow mediaextractor read permissions for file sources
42 # permissions. Example: Audioserver is only responsible for controlling audio
47 # permissions and be isolated from the rest of the system and network.
Dvr_hwc.te11 # Needed to check for app permissions.
30 # appropriate VR permissions.
/system/sepolicy/public/
Dvirtual_touchpad.te8 # Needed to check app permissions.
15 # appropriate VR permissions.
Dvr_hwc.te11 # Needed to check for app permissions.
30 # appropriate VR permissions.
Dhal_omx.te1 # applies all permissions to hal_omx NOT hal_omx_server
38 # permissions. Example: Audioserver is only responsible for controlling audio
43 # permissions and be isolated from the rest of the system and network.
/system/sepolicy/prebuilts/api/27.0/public/
Dvirtual_touchpad.te8 # Needed to check app permissions.
15 # appropriate VR permissions.
Dmediaextractor.te25 # allow mediaextractor read permissions for file sources
44 # permissions. Example: Audioserver is only responsible for controlling audio
49 # permissions and be isolated from the rest of the system and network.
Dvr_hwc.te11 # Needed to check for app permissions.
30 # appropriate VR permissions.
/system/sepolicy/prebuilts/api/28.0/public/
Dvirtual_touchpad.te8 # Needed to check app permissions.
15 # appropriate VR permissions.
Dvr_hwc.te11 # Needed to check for app permissions.
30 # appropriate VR permissions.
/system/sepolicy/prebuilts/api/29.0/public/
Dvirtual_touchpad.te8 # Needed to check app permissions.
15 # appropriate VR permissions.
Dvr_hwc.te11 # Needed to check for app permissions.
30 # appropriate VR permissions.
Dhal_omx.te1 # applies all permissions to hal_omx NOT hal_omx_server
38 # permissions. Example: Audioserver is only responsible for controlling audio
43 # permissions and be isolated from the rest of the system and network.
/system/bt/service/
Dgatt_server_old.h89 bool AddCharacteristic(const Uuid& id, int properties, int permissions);
94 int permissions);
/system/core/libkeyutils/
Dkeyutils.cpp65 long keyctl_setperm(key_serial_t id, int permissions) { in keyctl_setperm() argument
66 return keyctl(KEYCTL_SETPERM, id, permissions); in keyctl_setperm()
/system/bt/test/suite/gatt/
Dgatt_unittest.cc76 .permissions = 0x01 /* read only */}, in TEST_F()
77 {.type = BTGATT_DB_DESCRIPTOR, .uuid = desc_uuid, .permissions = 0x01}}; in TEST_F()

12345678910>>...30