/system/core/init/ |
D | devices_test.cpp | 224 Permissions permissions("/dev/null", 0666, 0, 0); in TEST() local 225 EXPECT_TRUE(permissions.Match("/dev/null")); in TEST() 226 EXPECT_FALSE(permissions.Match("/dev/nullsuffix")); in TEST() 227 EXPECT_FALSE(permissions.Match("/dev/nul")); in TEST() 228 EXPECT_EQ(0666U, permissions.perm()); in TEST() 229 EXPECT_EQ(0U, permissions.uid()); in TEST() 230 EXPECT_EQ(0U, permissions.gid()); in TEST() 236 Permissions permissions("/dev/dri/*", 0666, 0, 1000); in TEST() local 237 EXPECT_TRUE(permissions.Match("/dev/dri/some_dri_device")); in TEST() 238 EXPECT_TRUE(permissions.Match("/dev/dri/some_other_dri_device")); in TEST() [all …]
|
D | ueventd_parser_test.cpp | 110 auto permissions = std::vector<Permissions>{ in TEST() 122 TestUeventdFile(ueventd_file, {{}, sysfs_permissions, permissions, {}}); in TEST() 192 auto permissions = std::vector<Permissions>{ in TEST() 213 TestUeventdFile(ueventd_file, {subsystems, sysfs_permissions, permissions, firmware_directories, in TEST()
|
/system/bt/service/common/bluetooth/ |
D | descriptor.h | 27 Descriptor(uint16_t handle, const Uuid& uuid, uint16_t permissions) in Descriptor() argument 28 : handle_(handle), uuid_(uuid), permissions_(permissions){}; in Descriptor() 37 uint16_t permissions() const { return permissions_; } in permissions() function
|
D | characteristic.h | 30 uint16_t permissions, in Characteristic() argument 35 permissions_(permissions), in Characteristic() 48 uint16_t permissions() const { return permissions_; } in permissions() function
|
/system/core/libbacktrace/ |
D | BacktraceMap.cpp | 67 char permissions[5]; in ParseLine() local 76 permissions, &name_pos) != 3) { in ParseLine() 83 if (permissions[0] == 'r') { in ParseLine() 86 if (permissions[1] == 'w') { in ParseLine() 89 if (permissions[2] == 'x') { in ParseLine()
|
/system/sepolicy/prebuilts/api/27.0/private/ |
D | attributes | 1 # Temporary attribute used for migrating permissions out of domain. 2 # Motivation: Domain is overly permissive. Start removing permissions 7 # reassigning the appropriate permissions to the inheriting domain
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | attributes | 1 # Temporary attribute used for migrating permissions out of domain. 2 # Motivation: Domain is overly permissive. Start removing permissions 7 # reassigning the appropriate permissions to the inheriting domain
|
/system/netd/bpf_progs/ |
D | netd.c | 73 uint8_t* permissions = bpf_uid_permission_map_lookup_elem(&appId); in DEFINE_BPF_MAP() local 74 if (!permissions) { in DEFINE_BPF_MAP() 80 return (*permissions & BPF_PERMISSION_INTERNET) == BPF_PERMISSION_INTERNET; in DEFINE_BPF_MAP()
|
/system/sepolicy/prebuilts/api/26.0/public/ |
D | virtual_touchpad.te | 8 # Needed to check app permissions. 15 # appropriate VR permissions.
|
D | mediaextractor.te | 23 # allow mediaextractor read permissions for file sources 42 # permissions. Example: Audioserver is only responsible for controlling audio 47 # permissions and be isolated from the rest of the system and network.
|
D | vr_hwc.te | 11 # Needed to check for app permissions. 30 # appropriate VR permissions.
|
/system/sepolicy/public/ |
D | virtual_touchpad.te | 8 # Needed to check app permissions. 15 # appropriate VR permissions.
|
D | vr_hwc.te | 11 # Needed to check for app permissions. 30 # appropriate VR permissions.
|
D | hal_omx.te | 1 # applies all permissions to hal_omx NOT hal_omx_server 38 # permissions. Example: Audioserver is only responsible for controlling audio 43 # permissions and be isolated from the rest of the system and network.
|
/system/sepolicy/prebuilts/api/27.0/public/ |
D | virtual_touchpad.te | 8 # Needed to check app permissions. 15 # appropriate VR permissions.
|
D | mediaextractor.te | 25 # allow mediaextractor read permissions for file sources 44 # permissions. Example: Audioserver is only responsible for controlling audio 49 # permissions and be isolated from the rest of the system and network.
|
D | vr_hwc.te | 11 # Needed to check for app permissions. 30 # appropriate VR permissions.
|
/system/sepolicy/prebuilts/api/28.0/public/ |
D | virtual_touchpad.te | 8 # Needed to check app permissions. 15 # appropriate VR permissions.
|
D | vr_hwc.te | 11 # Needed to check for app permissions. 30 # appropriate VR permissions.
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | virtual_touchpad.te | 8 # Needed to check app permissions. 15 # appropriate VR permissions.
|
D | vr_hwc.te | 11 # Needed to check for app permissions. 30 # appropriate VR permissions.
|
D | hal_omx.te | 1 # applies all permissions to hal_omx NOT hal_omx_server 38 # permissions. Example: Audioserver is only responsible for controlling audio 43 # permissions and be isolated from the rest of the system and network.
|
/system/bt/service/ |
D | gatt_server_old.h | 89 bool AddCharacteristic(const Uuid& id, int properties, int permissions); 94 int permissions);
|
/system/core/libkeyutils/ |
D | keyutils.cpp | 65 long keyctl_setperm(key_serial_t id, int permissions) { in keyctl_setperm() argument 66 return keyctl(KEYCTL_SETPERM, id, permissions); in keyctl_setperm()
|
/system/bt/test/suite/gatt/ |
D | gatt_unittest.cc | 76 .permissions = 0x01 /* read only */}, in TEST_F() 77 {.type = BTGATT_DB_DESCRIPTOR, .uuid = desc_uuid, .permissions = 0x01}}; in TEST_F()
|