/system/extras/librank/ |
D | librank.c | 174 static int parse_perm(const char *perm) in parse_perm() argument 178 while (*perm) { in parse_perm() 179 switch(*perm) { in parse_perm() 190 fprintf(stderr, "Unknown permission '%c'\n", *perm); in parse_perm() 193 perm++; in parse_perm() 220 int perm; in main() local 233 perm = 0; in main() 281 perm = parse_perm(optarg); in main() 352 if (perm && (pm_map_flags(maps[j]) & PM_MAP_PERMISSIONS) != perm) in main()
|
/system/core/init/ |
D | ueventd.c | 126 mode_t perm; in set_device_permission() local 173 perm = strtol(args[1], &endptr, 8); in set_device_permission() 196 add_dev_perms(name, attr, perm, uid, gid, prefix, wildcard); in set_device_permission()
|
D | devices.h | 25 mode_t perm, unsigned int uid,
|
D | util.h | 28 int create_socket(const char *name, int type, mode_t perm,
|
D | devices.c | 77 mode_t perm; member 101 mode_t perm, unsigned int uid, unsigned int gid, in add_dev_perms() argument 118 node->dp.perm = perm; in add_dev_perms() 158 INFO("fixup %s %d %d 0%o\n", buf, dp->uid, dp->gid, dp->perm); in fixup_sys_perms() 160 chmod(buf, dp->perm); in fixup_sys_perms() 194 mode_t perm; in get_device_perm() local 225 return dp->perm; in get_device_perm()
|
D | util.c | 88 int create_socket(const char *name, int type, mode_t perm, uid_t uid, in create_socket() argument 135 chmod(addr.sun_path, perm); in create_socket() 138 addr.sun_path, perm, uid, gid); in create_socket()
|
D | init.h | 61 int perm; member
|
D | parser.c | 31 RAW(" socket %s %s 0%o\n", si->name, si->type, si->perm); in DUMP()
|
D | property_service.c | 102 const char *perm = "set"; in check_mac_perms() local 114 if (selinux_check_access(sctx, tctx, class, perm, (void*) name) == 0) in check_mac_perms()
|
D | init.c | 274 si->perm, si->uid, si->gid, si->socketcon ?: scon); in service_start()
|
D | init_parser.c | 795 si->perm = strtoul(args[3], 0, 8); in parse_line_service()
|
D | readme.txt | 73 socket <name> <type> <perm> [ <user> [ <group> [ <context> ] ] ]
|
/system/core/sdcard/ |
D | sdcard.c | 173 perm_t perm; member 431 node->perm = PERM_INHERIT; in derive_permissions_locked() 442 switch (parent->perm) { in derive_permissions_locked() 448 node->perm = PERM_ROOT; in derive_permissions_locked() 456 node->perm = PERM_ANDROID; in derive_permissions_locked() 475 node->perm = PERM_ANDROID_DATA; in derive_permissions_locked() 479 node->perm = PERM_ANDROID_OBB; in derive_permissions_locked() 486 node->perm = PERM_ANDROID_MEDIA; in derive_permissions_locked() 492 node->perm = PERM_ANDROID_USER; in derive_permissions_locked() 508 node->perm = PERM_ROOT; in derive_permissions_locked() [all …]
|
/system/security/keystore/ |
D | keystore.cpp | 208 static const char *get_perm_label(perm_t perm) { in get_perm_label() argument 209 unsigned int index = ffs(perm); in get_perm_label() 234 static bool keystore_selinux_check_access(uid_t uid, perm_t perm, pid_t spid) { in keystore_selinux_check_access() argument 241 const char *str_perm = get_perm_label(perm); in keystore_selinux_check_access() 258 static bool has_permission(uid_t uid, perm_t perm, pid_t spid) { in has_permission() argument 267 return (user.perms & perm) && in has_permission() 268 keystore_selinux_check_access(uid, perm, spid); in has_permission() 272 return (DEFAULT_PERMS & perm) && in has_permission() 273 keystore_selinux_check_access(uid, perm, spid); in has_permission()
|
/system/keymaster/ |
D | ocb.c | 230 const vector unsigned char perm = {1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 0}; in double_block() local 236 t = vec_perm(t, t, perm); in double_block()
|