Home
last modified time | relevance | path

Searched refs:permissions (Results 1 – 25 of 402) sorted by relevance

12345678910>>...17

/system/core/init/
Ddevices_test.cpp226 Permissions permissions("/dev/null", 0666, 0, 0); in TEST() local
227 EXPECT_TRUE(permissions.Match("/dev/null")); in TEST()
228 EXPECT_FALSE(permissions.Match("/dev/nullsuffix")); in TEST()
229 EXPECT_FALSE(permissions.Match("/dev/nul")); in TEST()
230 EXPECT_EQ(0666U, permissions.perm()); in TEST()
231 EXPECT_EQ(0U, permissions.uid()); in TEST()
232 EXPECT_EQ(0U, permissions.gid()); in TEST()
238 Permissions permissions("/dev/dri/*", 0666, 0, 1000); in TEST() local
239 EXPECT_TRUE(permissions.Match("/dev/dri/some_dri_device")); in TEST()
240 EXPECT_TRUE(permissions.Match("/dev/dri/some_other_dri_device")); in TEST()
[all …]
/system/core/libbacktrace/
DBacktraceMap.cpp55 char permissions[5]; local
64 &start, &end, permissions, &name_pos) != 3) {
71 &start, &end, permissions, &name_pos) != 3) {
79 if (permissions[0] == 'r') {
82 if (permissions[1] == 'w') {
85 if (permissions[2] == 'x') {
/system/bt/service/common/bluetooth/
Ddescriptor.h27 Descriptor(uint16_t handle, const UUID& uuid, uint16_t permissions) in Descriptor() argument
28 : handle_(handle), uuid_(uuid), permissions_(permissions){}; in Descriptor()
37 uint16_t permissions() const { return permissions_; } in permissions() function
Dcharacteristic.h30 uint16_t permissions, in Characteristic() argument
35 permissions_(permissions), in Characteristic()
48 uint16_t permissions() const { return permissions_; } in permissions() function
/system/sepolicy/private/
Dattributes1 # Temporary attribute used for migrating permissions out of domain.
2 # Motivation: Domain is overly permissive. Start removing permissions
7 # reassigning the appropriate permissions to the inheriting domain
Dshared_relro.te5 # inherits from app to get basic permissions it needs to run.
/system/sepolicy/prebuilts/api/26.0/private/
Dattributes1 # Temporary attribute used for migrating permissions out of domain.
2 # Motivation: Domain is overly permissive. Start removing permissions
7 # reassigning the appropriate permissions to the inheriting domain
Dshared_relro.te5 # inherits from app to get basic permissions it needs to run.
/system/core/libunwindstack/
DMaps.cpp59 char permissions[5]; in ParseLine() local
64 &map_info->end, permissions, &map_info->offset, &name_pos) != 4) { in ParseLine()
68 if (permissions[0] == 'r') { in ParseLine()
71 if (permissions[1] == 'w') { in ParseLine()
74 if (permissions[2] == 'x') { in ParseLine()
/system/tpm/tpm_manager/server/
Dlocal_data_store_impl.cc45 int permissions = 0; in Read() local
46 if (base::GetPosixFilePermissions(path, &permissions) && in Read()
47 (permissions & ~kLocalDataPermissions) != 0) { in Read()
/system/sepolicy/prebuilts/api/26.0/public/
Dvirtual_touchpad.te8 # Needed to check app permissions.
15 # appropriate VR permissions.
Dmediaextractor.te23 # allow mediaextractor read permissions for file sources
42 # permissions. Example: Audioserver is only responsible for controlling audio
47 # permissions and be isolated from the rest of the system and network.
Dvr_hwc.te11 # Needed to check for app permissions.
30 # appropriate VR permissions.
Dmediametrics.te30 # permissions. Example: Audioserver is only responsible for controlling audio
35 # permissions and be isolated from the rest of the system and network.
Dcameraserver.te41 # permissions. Example: Audioserver is only responsible for controlling audio
46 # permissions and be isolated from the rest of the system and network.
/system/sepolicy/public/
Dvirtual_touchpad.te8 # Needed to check app permissions.
15 # appropriate VR permissions.
Dmediaextractor.te25 # allow mediaextractor read permissions for file sources
44 # permissions. Example: Audioserver is only responsible for controlling audio
49 # permissions and be isolated from the rest of the system and network.
Dvr_hwc.te11 # Needed to check for app permissions.
30 # appropriate VR permissions.
Dmediametrics.te33 # permissions. Example: Audioserver is only responsible for controlling audio
38 # permissions and be isolated from the rest of the system and network.
Dcameraserver.te41 # permissions. Example: Audioserver is only responsible for controlling audio
46 # permissions and be isolated from the rest of the system and network.
/system/tpm/attestation/server/
Ddatabase_impl.cc101 int permissions = 0; in Read() local
102 if (base::GetPosixFilePermissions(path, &permissions) && in Read()
103 (permissions & kMask) != 0) { in Read()
105 base::SetPosixFilePermissions(path, permissions & ~kMask); in Read()
/system/core/libkeyutils/
Dkeyutils.cpp65 long keyctl_setperm(key_serial_t id, int permissions) { in keyctl_setperm() argument
66 return keyctl(KEYCTL_SETPERM, id, permissions); in keyctl_setperm()
/system/bt/service/
Dgatt_server_old.h89 bool AddCharacteristic(const UUID& id, int properties, int permissions);
94 int permissions);
Dgatt_server_old.cc101 uint16_t permissions);
505 uint16_t permissions) { in AddCharacteristic() argument
511 .permissions = permissions}); in AddCharacteristic()
625 int permissions) { in AddCharacteristic() argument
628 internal_->AddCharacteristic(id, properties, permissions); in AddCharacteristic()
641 int permissions) { in AddBlob() argument
646 internal_->AddCharacteristic(id, properties, permissions); in AddBlob()
/system/bt/test/suite/gatt/
Dgatt_unittest.cc95 .permissions = 0x01 /* read only */}, in TEST_F()
96 {.type = BTGATT_DB_DESCRIPTOR, .uuid = desc_uuid, .permissions = 0x01}}; in TEST_F()

12345678910>>...17