/system/core/init/ |
D | devices_test.cpp | 226 Permissions permissions("/dev/null", 0666, 0, 0); in TEST() local 227 EXPECT_TRUE(permissions.Match("/dev/null")); in TEST() 228 EXPECT_FALSE(permissions.Match("/dev/nullsuffix")); in TEST() 229 EXPECT_FALSE(permissions.Match("/dev/nul")); in TEST() 230 EXPECT_EQ(0666U, permissions.perm()); in TEST() 231 EXPECT_EQ(0U, permissions.uid()); in TEST() 232 EXPECT_EQ(0U, permissions.gid()); in TEST() 238 Permissions permissions("/dev/dri/*", 0666, 0, 1000); in TEST() local 239 EXPECT_TRUE(permissions.Match("/dev/dri/some_dri_device")); in TEST() 240 EXPECT_TRUE(permissions.Match("/dev/dri/some_other_dri_device")); in TEST() [all …]
|
/system/core/libbacktrace/ |
D | BacktraceMap.cpp | 55 char permissions[5]; local 64 &start, &end, permissions, &name_pos) != 3) { 71 &start, &end, permissions, &name_pos) != 3) { 79 if (permissions[0] == 'r') { 82 if (permissions[1] == 'w') { 85 if (permissions[2] == 'x') {
|
/system/bt/service/common/bluetooth/ |
D | descriptor.h | 27 Descriptor(uint16_t handle, const UUID& uuid, uint16_t permissions) in Descriptor() argument 28 : handle_(handle), uuid_(uuid), permissions_(permissions){}; in Descriptor() 37 uint16_t permissions() const { return permissions_; } in permissions() function
|
D | characteristic.h | 30 uint16_t permissions, in Characteristic() argument 35 permissions_(permissions), in Characteristic() 48 uint16_t permissions() const { return permissions_; } in permissions() function
|
/system/sepolicy/private/ |
D | attributes | 1 # Temporary attribute used for migrating permissions out of domain. 2 # Motivation: Domain is overly permissive. Start removing permissions 7 # reassigning the appropriate permissions to the inheriting domain
|
D | shared_relro.te | 5 # inherits from app to get basic permissions it needs to run.
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | attributes | 1 # Temporary attribute used for migrating permissions out of domain. 2 # Motivation: Domain is overly permissive. Start removing permissions 7 # reassigning the appropriate permissions to the inheriting domain
|
D | shared_relro.te | 5 # inherits from app to get basic permissions it needs to run.
|
/system/core/libunwindstack/ |
D | Maps.cpp | 59 char permissions[5]; in ParseLine() local 64 &map_info->end, permissions, &map_info->offset, &name_pos) != 4) { in ParseLine() 68 if (permissions[0] == 'r') { in ParseLine() 71 if (permissions[1] == 'w') { in ParseLine() 74 if (permissions[2] == 'x') { in ParseLine()
|
/system/tpm/tpm_manager/server/ |
D | local_data_store_impl.cc | 45 int permissions = 0; in Read() local 46 if (base::GetPosixFilePermissions(path, &permissions) && in Read() 47 (permissions & ~kLocalDataPermissions) != 0) { in Read()
|
/system/sepolicy/prebuilts/api/26.0/public/ |
D | virtual_touchpad.te | 8 # Needed to check app permissions. 15 # appropriate VR permissions.
|
D | mediaextractor.te | 23 # allow mediaextractor read permissions for file sources 42 # permissions. Example: Audioserver is only responsible for controlling audio 47 # permissions and be isolated from the rest of the system and network.
|
D | vr_hwc.te | 11 # Needed to check for app permissions. 30 # appropriate VR permissions.
|
D | mediametrics.te | 30 # permissions. Example: Audioserver is only responsible for controlling audio 35 # permissions and be isolated from the rest of the system and network.
|
D | cameraserver.te | 41 # permissions. Example: Audioserver is only responsible for controlling audio 46 # permissions and be isolated from the rest of the system and network.
|
/system/sepolicy/public/ |
D | virtual_touchpad.te | 8 # Needed to check app permissions. 15 # appropriate VR permissions.
|
D | mediaextractor.te | 25 # allow mediaextractor read permissions for file sources 44 # permissions. Example: Audioserver is only responsible for controlling audio 49 # permissions and be isolated from the rest of the system and network.
|
D | vr_hwc.te | 11 # Needed to check for app permissions. 30 # appropriate VR permissions.
|
D | mediametrics.te | 33 # permissions. Example: Audioserver is only responsible for controlling audio 38 # permissions and be isolated from the rest of the system and network.
|
D | cameraserver.te | 41 # permissions. Example: Audioserver is only responsible for controlling audio 46 # permissions and be isolated from the rest of the system and network.
|
/system/tpm/attestation/server/ |
D | database_impl.cc | 101 int permissions = 0; in Read() local 102 if (base::GetPosixFilePermissions(path, &permissions) && in Read() 103 (permissions & kMask) != 0) { in Read() 105 base::SetPosixFilePermissions(path, permissions & ~kMask); in Read()
|
/system/core/libkeyutils/ |
D | keyutils.cpp | 65 long keyctl_setperm(key_serial_t id, int permissions) { in keyctl_setperm() argument 66 return keyctl(KEYCTL_SETPERM, id, permissions); in keyctl_setperm()
|
/system/bt/service/ |
D | gatt_server_old.h | 89 bool AddCharacteristic(const UUID& id, int properties, int permissions); 94 int permissions);
|
D | gatt_server_old.cc | 101 uint16_t permissions); 505 uint16_t permissions) { in AddCharacteristic() argument 511 .permissions = permissions}); in AddCharacteristic() 625 int permissions) { in AddCharacteristic() argument 628 internal_->AddCharacteristic(id, properties, permissions); in AddCharacteristic() 641 int permissions) { in AddBlob() argument 646 internal_->AddCharacteristic(id, properties, permissions); in AddBlob()
|
/system/bt/test/suite/gatt/ |
D | gatt_unittest.cc | 95 .permissions = 0x01 /* read only */}, in TEST_F() 96 {.type = BTGATT_DB_DESCRIPTOR, .uuid = desc_uuid, .permissions = 0x01}}; in TEST_F()
|