/system/core/init/ |
H A D | devices.h | 25 mode_t perm, unsigned int uid,
|
H A D | ueventd.cpp | 100 mode_t perm; local 147 perm = strtol(args[1], &endptr, 8); 170 add_dev_perms(name, attr, perm, uid, gid, prefix, wildcard);
|
H A D | util.h | 31 int create_socket(const char *name, int type, mode_t perm,
|
H A D | service.cpp | 46 SocketInfo::SocketInfo() : uid(0), gid(0), perm(0) { 50 gid_t gid, int perm, const std::string& socketcon) 51 : name(name), type(type), uid(uid), gid(gid), perm(perm), socketcon(socketcon) { 164 INFO(" socket %s %s 0%o\n", si.name.c_str(), si.type.c_str(), si.perm); 247 /* name type perm [ uid gid context ] */ 254 int perm = std::stoul(args[3], 0, 8); local 259 sockets_.emplace_back(args[1], args[2], uid, gid, perm, socketcon); 405 int s = create_socket(si.name.c_str(), socket_type, si.perm, 49 SocketInfo(const std::string& name, const std::string& type, uid_t uid, gid_t gid, int perm, const std::string& socketcon) argument
|
H A D | service.h | 53 gid_t gid, int perm, const std::string& socketcon); 58 int perm; member in struct:SocketInfo
|
H A D | devices.cpp | 76 mode_t perm; member in struct:perms_ 100 mode_t perm, unsigned int uid, unsigned int gid, 117 node->dp.perm = perm; 157 INFO("fixup %s %d %d 0%o\n", buf, dp->uid, dp->gid, dp->perm); 159 chmod(buf, dp->perm); 223 return dp->perm; 99 add_dev_perms(const char *name, const char *attr, mode_t perm, unsigned int uid, unsigned int gid, unsigned short prefix, unsigned short wildcard) argument
|
H A D | util.cpp | 101 int create_socket(const char *name, int type, mode_t perm, uid_t uid, argument 158 ret = fchmodat(AT_FDCWD, addr.sun_path, perm, AT_SYMLINK_NOFOLLOW); 165 addr.sun_path, perm, uid, gid);
|
/system/security/keystore/ |
H A D | permissions.h | 44 const char* get_perm_label(perm_t perm); 53 bool has_permission(uid_t uid, perm_t perm, pid_t spid);
|
H A D | permissions.cpp | 65 const char* get_perm_label(perm_t perm) { argument 66 unsigned int index = ffs(perm); 108 static bool keystore_selinux_check_access(uid_t uid, perm_t perm, pid_t spid) { argument 116 const char* str_perm = get_perm_label(perm); 152 bool has_permission(uid_t uid, perm_t perm, pid_t spid) { argument 161 return (user.perms & perm) && keystore_selinux_check_access(uid, perm, spid); 165 return (DEFAULT_PERMS & perm) && keystore_selinux_check_access(uid, perm, spid);
|
/system/sepolicy/tools/ |
H A D | sepolicy-check.c | 18 fprintf(stderr, "%s -s <source> -t <target> -c <class> -p <perm> -P <policy file>\n", arg0); 57 int check_perm(avtab_ptr_t current, perm_datum_t *perm) { argument 58 uint16_t perm_bitmask = 1U << (perm->s.value - 1); 66 perm_datum_t *perm, policydb_t *policy, avtab_t *avtab) { 89 match &= check_perm(cur, perm); 120 perm_datum_t *perm = NULL; local 152 perm = hashtab_search(cls->permissions.table, p); 153 if (perm == NULL) { 155 fprintf(stderr, "perm %s does not exist in class %s\n", p, c); 158 perm 63 expand_and_check(int s_op, uint32_t source_type, int t_op, uint32_t target_type, int c_op, uint32_t target_class, perm_datum_t *perm, policydb_t *policy, avtab_t *avtab) argument 235 char *policy = NULL, *source = NULL, *target = NULL, *class = NULL, *perm = NULL; local [all...] |
/system/sepolicy/tools/sepolicy-analyze/ |
H A D | Android.mk | 10 LOCAL_SRC_FILES := sepolicy-analyze.c dups.c neverallow.c perm.c typecmp.c booleans.c attribute.c utils.c
|
H A D | neverallow.c | 192 perm_datum_t *perm = NULL; local 336 perm = hashtab_search(cls->permissions.table, id); 337 if (cls->comdatum && !perm) 338 perm = hashtab_search(cls->comdatum->permissions.table, id); 339 if (!perm) { 344 node->data |= 1U << (perm->s.value - 1);
|
/system/bt/stack/gatt/ |
H A D | gatt_db.c | 42 static void *allocate_attr_in_db(tGATT_SVC_DB *p_db, tBT_UUID *p_uuid, tGATT_PERM perm); 125 tGATT_PERM perm = p_attr->permission; local 128 min_key_size = (((perm & GATT_ENCRYPT_KEY_SIZE_MASK) >> 12)); 134 if (!(perm & GATT_READ_ALLOWED)) 140 if ((perm & GATT_READ_AUTH_REQUIRED ) && !(sec_flag & GATT_SEC_FLAG_LKEY_UNAUTHED) && 147 if ((perm & GATT_READ_MITM_REQUIRED ) && !(sec_flag & GATT_SEC_FLAG_LKEY_AUTHED)) 153 if ((perm & GATT_READ_ENCRYPTED_REQUIRED ) && !(sec_flag & GATT_SEC_FLAG_ENCRYPTED)) 159 if ( (perm & GATT_READ_ENCRYPTED_REQUIRED) && (sec_flag & GATT_SEC_FLAG_ENCRYPTED) && (key_size < min_key_size)) 221 GATT_TRACE_DEBUG("read_attr_value uuid=0x%04x perm=0x%0x sec_flag=0x%x offset=%d read_long=%d", 482 ** perm 489 gatts_add_characteristic(tGATT_SVC_DB *p_db, tGATT_PERM perm, tGATT_CHAR_PROP property, tBT_UUID * p_char_uuid) argument 583 gatts_add_char_descr(tGATT_SVC_DB *p_db, tGATT_PERM perm, tBT_UUID * p_descr_uuid) argument 738 tGATT_PERM perm; local 910 allocate_attr_in_db(tGATT_SVC_DB *p_db, tBT_UUID *p_uuid, tGATT_PERM perm) argument [all...] |
H A D | gatt_api.c | 308 ** perm : Characteristic value declaration attribute permission. 315 tGATT_PERM perm,tGATT_CHAR_PROP property) 325 if ( ((property & GATT_CHAR_PROP_BIT_AUTH) && !(perm & GATT_WRITE_SIGNED_PERM)) || 326 ((perm & GATT_WRITE_SIGNED_PERM) && !(property & GATT_CHAR_PROP_BIT_AUTH)) ) 328 GATT_TRACE_DEBUG("Invalid configuration property=0x%x perm=0x%x ", property, perm); 333 perm, 348 ** perm : Characteristic value declaration attribute 357 tGATT_PERM perm, 376 perm, 314 GATTS_AddCharacteristic(UINT16 service_handle, tBT_UUID *p_char_uuid, tGATT_PERM perm,tGATT_CHAR_PROP property) argument 356 GATTS_AddCharDescriptor(UINT16 service_handle, tGATT_PERM perm, tBT_UUID * p_descr_uuid) argument [all...] |
H A D | gatt_int.h | 679 extern UINT16 gatts_add_characteristic (tGATT_SVC_DB *p_db, tGATT_PERM perm, tGATT_CHAR_PROP property, tBT_UUID *p_char_uuid); 680 extern UINT16 gatts_add_char_descr (tGATT_SVC_DB *p_db, tGATT_PERM perm, tBT_UUID *p_dscp_uuid);
|
/system/bt/bta/gatt/ |
H A D | bta_gatts_api.c | 194 ** perm : Characteristic value declaration attribute permission. 201 tBTA_GATT_PERM perm, tBTA_GATT_CHAR_PROP property) 208 p_buf->perm = perm; 227 ** perm: descriptor access permission. 234 tBTA_GATT_PERM perm, 242 p_buf->perm = perm; 200 BTA_GATTS_AddCharacteristic(UINT16 service_id, tBT_UUID *p_char_uuid, tBTA_GATT_PERM perm, tBTA_GATT_CHAR_PROP property) argument 233 BTA_GATTS_AddCharDescriptor(UINT16 service_id, tBTA_GATT_PERM perm, tBT_UUID * p_descr_uuid) argument
|
H A D | bta_gatts_int.h | 97 tBTA_GATT_PERM perm; member in struct:__anon180 113 tBTA_GATT_PERM perm; member in struct:__anon182
|
H A D | bta_gatts_act.c | 433 p_msg->api_add_char.perm, 468 p_msg->api_add_char_descr.perm,
|
/system/extras/librank/ |
H A D | librank.c | 174 static int parse_perm(const char *perm) argument 178 while (*perm) { 179 switch(*perm) { 190 fprintf(stderr, "Unknown permission '%c'\n", *perm); 193 perm++; 220 int perm; local 233 perm = 0; 253 {"perm", required_argument, 0, 'm'}, 281 perm = parse_perm(optarg); 353 if (perm [all...] |
/system/core/sdcard/ |
H A D | sdcard.c | 158 perm_t perm; member in struct:node 430 if (node->perm == PERM_PRE_ROOT) { 468 node->perm = PERM_INHERIT; 474 switch (parent->perm) { 480 node->perm = PERM_ROOT; 487 node->perm = PERM_ANDROID; 494 node->perm = PERM_ANDROID_DATA; 497 node->perm = PERM_ANDROID_OBB; 503 node->perm = PERM_ANDROID_MEDIA; 534 if (parent_node && parent_node->perm [all...] |
/system/bt/stack/include/ |
H A D | gatt_api.h | 769 ** perm : Characteristic value declaration attribute permission. 777 tGATT_PERM perm,tGATT_CHAR_PROP property); 790 ** perm : Characteristic value declaration attribute 798 extern UINT16 GATTS_AddCharDescriptor (UINT16 service_handle, tGATT_PERM perm,
|
/system/bt/bta/include/ |
H A D | bta_gatt_api.h | 1109 ** perm : Characteristic value declaration attribute permission. 1116 tBTA_GATT_PERM perm, tBTA_GATT_CHAR_PROP property); 1128 ** perm: descriptor access permission. 1136 tBTA_GATT_PERM perm,
|
/system/core/debuggerd/ |
H A D | debuggerd.cpp | 158 const char *perm; local 166 perm = debuggerd_perms[request->action]; 178 allowed = (selinux_check_access(scon, tcon, tclass, perm, reinterpret_cast<void*>(request)) == 0);
|
/system/keymaster/ |
H A D | ocb.c | 230 const vector unsigned char perm = {1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 0}; local 236 t = vec_perm(t, t, perm);
|