Home
last modified time | relevance | path

Searched refs:perms (Results 1 – 12 of 12) sorted by relevance

/system/sepolicy/tests/
Dsearchpolicy.py35 if not (args.source or args.target or args.tclass or args.perms):
52 if args.perms:
53 perms = set(args.perms.split(",")) variable
55 perms = set() variable
60 perms=perms)
65 if len(r.perms) > 1:
67 " ".join(r.perms) + " };")
70 " ".join(r.perms) + ";")
Dpolicy.py42 self.perms = set((data[4].strip()).split(' '))
154 not bool(Rule.perms & kwargs['perms'])):
Dtreble_sepolicy_tests.py137 for x in pol.QueryExpandedTERule(tclass=set(["file"]), perms=set(["entrypoint"])):
/system/core/libmemunreachable/
DProcessMappings.cpp45 char perms[5]; in ProcessMappings() local
48 &mapping.end, perms, &name_pos) == 3) { in ProcessMappings()
49 if (perms[0] == 'r') { in ProcessMappings()
52 if (perms[1] == 'w') { in ProcessMappings()
55 if (perms[2] == 'x') { in ProcessMappings()
58 if (perms[3] == 'p') { in ProcessMappings()
/system/sepolicy/tools/sepolicy-analyze/
Ddups.c59 uint32_t perms = node->datum.data & d->data; in find_dups_helper() local
60 if ((attrib1 && perms == node->datum.data) || in find_dups_helper()
61 (attrib2 && perms == d->data)) { in find_dups_helper()
Dutils.c12 void display_allow(policydb_t *policydb, avtab_key_t *key, int idx, uint32_t perms) in display_allow() argument
22 (policydb, key->target_class, perms)); in display_allow()
Dutils.h12 void display_allow(policydb_t *policydb, avtab_key_t *key, int idx, uint32_t perms);
Dneverallow.c183 class_perm_node_t **perms) in read_classperms() argument
364 *perms = classperms; in read_classperms()
418 if (read_classperms(policydb, &p, end, &avrule->perms)) in check_neverallows()
/system/extras/libpagemap/
Dpm_process.c249 char perms[MAX_PERMS]; in read_maps() local
297 &map->start, &map->end, perms, &map->offset, &name_offset); in read_maps()
310 if (perms[0] == 'r') map->flags |= PM_MAP_READ; in read_maps()
311 if (perms[1] == 'w') map->flags |= PM_MAP_WRITE; in read_maps()
312 if (perms[2] == 'x') map->flags |= PM_MAP_EXEC; in read_maps()
/system/security/keystore/
Dpermissions.cpp64 perm_t perms; member
169 return (user.perms & perm) && keystore_selinux_check_access(uid, perm, spid); in has_permission()
/system/sepolicy/prebuilts/api/26.0/private/
Ddomain_deprecated.te167 # split this auditallow into read and write perms since most domains seem to
/system/core/rootdir/
Dinit.rc495 # create resource-cache and double-check the perms