Searched refs:perms (Results 1 – 12 of 12) sorted by relevance
/system/sepolicy/tests/ |
D | searchpolicy.py | 35 if not (args.source or args.target or args.tclass or args.perms): 52 if args.perms: 53 perms = set(args.perms.split(",")) variable 55 perms = set() variable 60 perms=perms) 65 if len(r.perms) > 1: 67 " ".join(r.perms) + " };") 70 " ".join(r.perms) + ";")
|
D | policy.py | 42 self.perms = set((data[4].strip()).split(' ')) 154 not bool(Rule.perms & kwargs['perms'])):
|
D | treble_sepolicy_tests.py | 137 for x in pol.QueryExpandedTERule(tclass=set(["file"]), perms=set(["entrypoint"])):
|
/system/core/libmemunreachable/ |
D | ProcessMappings.cpp | 45 char perms[5]; in ProcessMappings() local 48 &mapping.end, perms, &name_pos) == 3) { in ProcessMappings() 49 if (perms[0] == 'r') { in ProcessMappings() 52 if (perms[1] == 'w') { in ProcessMappings() 55 if (perms[2] == 'x') { in ProcessMappings() 58 if (perms[3] == 'p') { in ProcessMappings()
|
/system/sepolicy/tools/sepolicy-analyze/ |
D | dups.c | 59 uint32_t perms = node->datum.data & d->data; in find_dups_helper() local 60 if ((attrib1 && perms == node->datum.data) || in find_dups_helper() 61 (attrib2 && perms == d->data)) { in find_dups_helper()
|
D | utils.c | 12 void display_allow(policydb_t *policydb, avtab_key_t *key, int idx, uint32_t perms) in display_allow() argument 22 (policydb, key->target_class, perms)); in display_allow()
|
D | utils.h | 12 void display_allow(policydb_t *policydb, avtab_key_t *key, int idx, uint32_t perms);
|
D | neverallow.c | 183 class_perm_node_t **perms) in read_classperms() argument 364 *perms = classperms; in read_classperms() 418 if (read_classperms(policydb, &p, end, &avrule->perms)) in check_neverallows()
|
/system/extras/libpagemap/ |
D | pm_process.c | 249 char perms[MAX_PERMS]; in read_maps() local 297 &map->start, &map->end, perms, &map->offset, &name_offset); in read_maps() 310 if (perms[0] == 'r') map->flags |= PM_MAP_READ; in read_maps() 311 if (perms[1] == 'w') map->flags |= PM_MAP_WRITE; in read_maps() 312 if (perms[2] == 'x') map->flags |= PM_MAP_EXEC; in read_maps()
|
/system/security/keystore/ |
D | permissions.cpp | 64 perm_t perms; member 169 return (user.perms & perm) && keystore_selinux_check_access(uid, perm, spid); in has_permission()
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | domain_deprecated.te | 167 # split this auditallow into read and write perms since most domains seem to
|
/system/core/rootdir/ |
D | init.rc | 495 # create resource-cache and double-check the perms
|