Searched defs:perm (Results 1 - 16 of 16) sorted by relevance

/system/core/init/
H A Dueventd.cpp100 mode_t perm; local
147 perm = strtol(args[1], &endptr, 8);
170 add_dev_perms(name, attr, perm, uid, gid, prefix, wildcard);
H A Dservice.h53 gid_t gid, int perm, const std::string& socketcon);
58 int perm; member in struct:SocketInfo
H A Dservice.cpp46 SocketInfo::SocketInfo() : uid(0), gid(0), perm(0) {
50 gid_t gid, int perm, const std::string& socketcon)
51 : name(name), type(type), uid(uid), gid(gid), perm(perm), socketcon(socketcon) {
164 INFO(" socket %s %s 0%o\n", si.name.c_str(), si.type.c_str(), si.perm);
247 /* name type perm [ uid gid context ] */
254 int perm = std::stoul(args[3], 0, 8); local
259 sockets_.emplace_back(args[1], args[2], uid, gid, perm, socketcon);
405 int s = create_socket(si.name.c_str(), socket_type, si.perm,
49 SocketInfo(const std::string& name, const std::string& type, uid_t uid, gid_t gid, int perm, const std::string& socketcon) argument
H A Dutil.cpp101 int create_socket(const char *name, int type, mode_t perm, uid_t uid, argument
158 ret = fchmodat(AT_FDCWD, addr.sun_path, perm, AT_SYMLINK_NOFOLLOW);
165 addr.sun_path, perm, uid, gid);
H A Ddevices.cpp76 mode_t perm; member in struct:perms_
100 mode_t perm, unsigned int uid, unsigned int gid,
117 node->dp.perm = perm;
157 INFO("fixup %s %d %d 0%o\n", buf, dp->uid, dp->gid, dp->perm);
159 chmod(buf, dp->perm);
223 return dp->perm;
99 add_dev_perms(const char *name, const char *attr, mode_t perm, unsigned int uid, unsigned int gid, unsigned short prefix, unsigned short wildcard) argument
/system/security/keystore/
H A Dpermissions.cpp65 const char* get_perm_label(perm_t perm) { argument
66 unsigned int index = ffs(perm);
108 static bool keystore_selinux_check_access(uid_t uid, perm_t perm, pid_t spid) { argument
116 const char* str_perm = get_perm_label(perm);
152 bool has_permission(uid_t uid, perm_t perm, pid_t spid) { argument
161 return (user.perms & perm) && keystore_selinux_check_access(uid, perm, spid);
165 return (DEFAULT_PERMS & perm) && keystore_selinux_check_access(uid, perm, spid);
/system/bt/bta/gatt/
H A Dbta_gatts_api.c194 ** perm : Characteristic value declaration attribute permission.
201 tBTA_GATT_PERM perm, tBTA_GATT_CHAR_PROP property)
208 p_buf->perm = perm;
227 ** perm: descriptor access permission.
234 tBTA_GATT_PERM perm,
242 p_buf->perm = perm;
200 BTA_GATTS_AddCharacteristic(UINT16 service_id, tBT_UUID *p_char_uuid, tBTA_GATT_PERM perm, tBTA_GATT_CHAR_PROP property) argument
233 BTA_GATTS_AddCharDescriptor(UINT16 service_id, tBTA_GATT_PERM perm, tBT_UUID * p_descr_uuid) argument
H A Dbta_gatts_int.h97 tBTA_GATT_PERM perm; member in struct:__anon182
113 tBTA_GATT_PERM perm; member in struct:__anon184
/system/sepolicy/tools/sepolicy-analyze/
H A Dneverallow.c192 perm_datum_t *perm = NULL; local
336 perm = hashtab_search(cls->permissions.table, id);
337 if (cls->comdatum && !perm)
338 perm = hashtab_search(cls->comdatum->permissions.table, id);
339 if (!perm) {
344 node->data |= 1U << (perm->s.value - 1);
/system/sepolicy/tools/
H A Dsepolicy-check.c18 fprintf(stderr, "%s -s <source> -t <target> -c <class> -p <perm> -P <policy file>\n", arg0);
57 int check_perm(avtab_ptr_t current, perm_datum_t *perm) { argument
58 uint16_t perm_bitmask = 1U << (perm->s.value - 1);
66 perm_datum_t *perm, policydb_t *policy, avtab_t *avtab) {
89 match &= check_perm(cur, perm);
120 perm_datum_t *perm = NULL; local
152 perm = hashtab_search(cls->permissions.table, p);
153 if (perm == NULL) {
155 fprintf(stderr, "perm %s does not exist in class %s\n", p, c);
158 perm
63 expand_and_check(int s_op, uint32_t source_type, int t_op, uint32_t target_type, int c_op, uint32_t target_class, perm_datum_t *perm, policydb_t *policy, avtab_t *avtab) argument
235 char *policy = NULL, *source = NULL, *target = NULL, *class = NULL, *perm = NULL; local
[all...]
/system/bt/stack/gatt/
H A Dgatt_db.c42 static void *allocate_attr_in_db(tGATT_SVC_DB *p_db, tBT_UUID *p_uuid, tGATT_PERM perm);
125 tGATT_PERM perm = p_attr->permission; local
128 min_key_size = (((perm & GATT_ENCRYPT_KEY_SIZE_MASK) >> 12));
134 if (!(perm & GATT_READ_ALLOWED))
140 if ((perm & GATT_READ_AUTH_REQUIRED ) && !(sec_flag & GATT_SEC_FLAG_LKEY_UNAUTHED) &&
147 if ((perm & GATT_READ_MITM_REQUIRED ) && !(sec_flag & GATT_SEC_FLAG_LKEY_AUTHED))
153 if ((perm & GATT_READ_ENCRYPTED_REQUIRED ) && !(sec_flag & GATT_SEC_FLAG_ENCRYPTED))
159 if ( (perm & GATT_READ_ENCRYPTED_REQUIRED) && (sec_flag & GATT_SEC_FLAG_ENCRYPTED) && (key_size < min_key_size))
221 GATT_TRACE_DEBUG("read_attr_value uuid=0x%04x perm=0x%0x sec_flag=0x%x offset=%d read_long=%d",
482 ** perm
489 gatts_add_characteristic(tGATT_SVC_DB *p_db, tGATT_PERM perm, tGATT_CHAR_PROP property, tBT_UUID * p_char_uuid) argument
583 gatts_add_char_descr(tGATT_SVC_DB *p_db, tGATT_PERM perm, tBT_UUID * p_descr_uuid) argument
738 tGATT_PERM perm; local
910 allocate_attr_in_db(tGATT_SVC_DB *p_db, tBT_UUID *p_uuid, tGATT_PERM perm) argument
[all...]
H A Dgatt_api.c308 ** perm : Characteristic value declaration attribute permission.
315 tGATT_PERM perm,tGATT_CHAR_PROP property)
325 if ( ((property & GATT_CHAR_PROP_BIT_AUTH) && !(perm & GATT_WRITE_SIGNED_PERM)) ||
326 ((perm & GATT_WRITE_SIGNED_PERM) && !(property & GATT_CHAR_PROP_BIT_AUTH)) )
328 GATT_TRACE_DEBUG("Invalid configuration property=0x%x perm=0x%x ", property, perm);
333 perm,
348 ** perm : Characteristic value declaration attribute
357 tGATT_PERM perm,
376 perm,
314 GATTS_AddCharacteristic(UINT16 service_handle, tBT_UUID *p_char_uuid, tGATT_PERM perm,tGATT_CHAR_PROP property) argument
356 GATTS_AddCharDescriptor(UINT16 service_handle, tGATT_PERM perm, tBT_UUID * p_descr_uuid) argument
[all...]
/system/extras/librank/
H A Dlibrank.c174 static int parse_perm(const char *perm) argument
178 while (*perm) {
179 switch(*perm) {
190 fprintf(stderr, "Unknown permission '%c'\n", *perm);
193 perm++;
220 int perm; local
233 perm = 0;
253 {"perm", required_argument, 0, 'm'},
281 perm = parse_perm(optarg);
353 if (perm
[all...]
/system/core/debuggerd/
H A Ddebuggerd.cpp158 const char *perm; local
166 perm = debuggerd_perms[request->action];
178 allowed = (selinux_check_access(scon, tcon, tclass, perm, reinterpret_cast<void*>(request)) == 0);
/system/keymaster/
H A Docb.c230 const vector unsigned char perm = {1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 0}; local
236 t = vec_perm(t, t, perm);
/system/core/sdcard/
H A Dsdcard.c158 perm_t perm; member in struct:node
430 if (node->perm == PERM_PRE_ROOT) {
468 node->perm = PERM_INHERIT;
474 switch (parent->perm) {
480 node->perm = PERM_ROOT;
487 node->perm = PERM_ANDROID;
494 node->perm = PERM_ANDROID_DATA;
497 node->perm = PERM_ANDROID_OBB;
503 node->perm = PERM_ANDROID_MEDIA;
534 if (parent_node && parent_node->perm
[all...]

Completed in 379 milliseconds