/system/core/init/ |
H A D | descriptors.h | 28 gid_t gid, int perm, const std::string& context); 42 int perm() const { return perm_; } function in class:DescriptorInfo 62 gid_t gid, int perm, const std::string& context); 72 gid_t gid, int perm, const std::string& context);
|
H A D | descriptors.cpp | 35 gid_t gid, int perm, const std::string& context) 36 : name_(name), type_(type), uid_(uid), gid_(gid), perm_(perm), context_(context) { 72 gid_t gid, int perm, const std::string& context) 73 : DescriptorInfo(name, type, uid, gid, perm, context) { 84 return create_socket(name().c_str(), flags, perm(), uid(), gid(), context.c_str()); 92 gid_t gid, int perm, const std::string& context) 94 : DescriptorInfo(name, type, uid, gid, perm, context) { 34 DescriptorInfo(const std::string& name, const std::string& type, uid_t uid, gid_t gid, int perm, const std::string& context) argument 71 SocketInfo(const std::string& name, const std::string& type, uid_t uid, gid_t gid, int perm, const std::string& context) argument 91 FileInfo(const std::string& name, const std::string& type, uid_t uid, gid_t gid, int perm, const std::string& context) argument
|
H A D | ueventd.cpp | 101 mode_t perm; local 137 perm = strtol(args[1], &endptr, 8); 157 if (add_dev_perms(name, attr, perm, uid, gid, prefix, wildcard) != 0) { 160 ", perm=" << std::oct << perm << std::dec <<
|
H A D | util.cpp | 95 int create_socket(const char *name, int type, mode_t perm, uid_t uid, argument 147 if (fchmodat(AT_FDCWD, addr.sun_path, perm, AT_SYMLINK_NOFOLLOW)) { 153 << ", mode " << std::oct << perm << std::dec
|
H A D | devices.cpp | 70 mode_t perm; member in struct:perms_ 94 mode_t perm, unsigned int uid, unsigned int gid, 116 node->dp.perm = perm; 174 << " " << dp->uid << " " << dp->gid << " " << std::oct << dp->perm; 176 chmod(attr_file.c_str(), dp->perm); 218 return dp->perm; 93 add_dev_perms(const char *name, const char *attr, mode_t perm, unsigned int uid, unsigned int gid, unsigned short prefix, unsigned short wildcard) argument
|
H A D | service.cpp | 482 int perm = args.size() > 3 ? std::strtoul(args[3].c_str(), 0, 8) : -1; local 487 auto descriptor = std::make_unique<T>(args[1], args[2], uid, gid, perm, context); 502 // name type perm [ uid gid context ] 511 // name type perm [ uid gid context ]
|
/system/hwservicemanager/ |
H A D | AccessControl.cpp | 64 const char *perm, const char *interface) { 78 perm, (void *) &ad) == 0); 85 bool AccessControl::checkPermission(pid_t sourcePid, const char *perm, const char *interface) { argument 95 allowed = checkPermission(sourcePid, targetContext, perm, interface); 63 checkPermission(pid_t sourcePid, const char *targetContext, const char *perm, const char *interface) argument
|
/system/security/keystore/ |
H A D | permissions.cpp | 83 const char* get_perm_label(perm_t perm) { argument 84 unsigned int index = ffs(perm); 120 static bool keystore_selinux_check_access(uid_t uid, perm_t perm, pid_t spid) { argument 124 const char* str_perm = get_perm_label(perm); 160 bool has_permission(uid_t uid, perm_t perm, pid_t spid) { argument 169 return (user.perms & perm) && keystore_selinux_check_access(uid, perm, spid); 173 return (DEFAULT_PERMS & perm) && keystore_selinux_check_access(uid, perm, spid);
|
/system/core/sdcard/ |
H A D | fuse.h | 115 perm_t perm; member in struct:node
|
/system/sepolicy/tools/sepolicy-analyze/ |
H A D | neverallow.c | 189 perm_datum_t *perm = NULL; local 333 perm = hashtab_search(cls->permissions.table, id); 334 if (cls->comdatum && !perm) 335 perm = hashtab_search(cls->comdatum->permissions.table, id); 336 if (!perm) { 341 node->data |= 1U << (perm->s.value - 1);
|
/system/sepolicy/tools/ |
H A D | sepolicy-check.c | 18 fprintf(stderr, "%s -s <source> -t <target> -c <class> -p <perm> -P <policy file>\n", arg0); 57 int check_perm(avtab_ptr_t current, perm_datum_t *perm) { argument 58 uint16_t perm_bitmask = 1U << (perm->s.value - 1); 66 perm_datum_t *perm, policydb_t *policy, avtab_t *avtab) { 89 match &= check_perm(cur, perm); 120 perm_datum_t *perm = NULL; local 152 perm = hashtab_search(cls->permissions.table, p); 153 if (perm == NULL) { 155 fprintf(stderr, "perm %s does not exist in class %s\n", p, c); 158 perm 63 expand_and_check(int s_op, uint32_t source_type, int t_op, uint32_t target_type, int c_op, uint32_t target_class, perm_datum_t *perm, policydb_t *policy, avtab_t *avtab) argument 235 char *policy = NULL, *source = NULL, *target = NULL, *class = NULL, *perm = NULL; local [all...] |
/system/bt/stack/gatt/ |
H A D | gatt_db.cc | 41 tGATT_PERM perm); 83 tGATT_PERM perm = attr.permission; local 85 min_key_size = (((perm & GATT_ENCRYPT_KEY_SIZE_MASK) >> 12)); 90 if (!(perm & GATT_READ_ALLOWED)) { 95 if ((perm & GATT_READ_AUTH_REQUIRED) && 102 if ((perm & GATT_READ_MITM_REQUIRED) && 108 if ((perm & GATT_READ_ENCRYPTED_REQUIRED) && 114 if ((perm & GATT_READ_ENCRYPTED_REQUIRED) && 167 "%s: uuid=0x%04x perm=0x%02x sec_flag=0x%x offset=%d read_long=%d", 355 * perm 362 gatts_add_characteristic(tGATT_SVC_DB& db, tGATT_PERM perm, tGATT_CHAR_PROP property, tBT_UUID& char_uuid) argument 433 gatts_add_char_descr(tGATT_SVC_DB& db, tGATT_PERM perm, tBT_UUID& descr_uuid) argument 709 allocate_attr_in_db(tGATT_SVC_DB& db, const tBT_UUID& uuid, tGATT_PERM perm) argument [all...] |
/system/extras/librank/ |
H A D | librank.c | 174 static int parse_perm(const char *perm) argument 178 while (*perm) { 179 switch(*perm) { 190 fprintf(stderr, "Unknown permission '%c'\n", *perm); 193 perm++; 220 int perm; local 233 perm = 0; 253 {"perm", required_argument, 0, 'm'}, 281 perm = parse_perm(optarg); 353 if (perm [all...] |
/system/keymaster/ |
H A D | ocb.c | 230 const vector unsigned char perm = {1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 0}; local 236 t = vec_perm(t, t, perm);
|
/system/core/liblog/tests/ |
H A D | liblog_test.cpp | 1902 bool perm = (gid == AID_ROOT) || (uid == AID_ROOT); local 1903 EXPECT_STREQ(perm ? "TRUE" : persist_hold, persist); 1911 EXPECT_STREQ(perm ? "FALSE" : persist_hold, persist); 1919 EXPECT_STREQ(perm ? "true" : persist_hold, persist); 1927 EXPECT_STREQ(perm ? "false" : persist_hold, persist); 1935 EXPECT_STREQ(perm ? "" : persist_hold, persist);
|