Home
last modified time | relevance | path

Searched refs:perms (Results 1 – 15 of 15) sorted by relevance

/system/sepolicy/tests/
Dsearchpolicy.py35 if not (args.source or args.target or args.tclass or args.perms):
52 if args.perms:
53 perms = set(args.perms.split(",")) variable
55 perms = set() variable
60 perms=perms)
65 if len(r.perms) > 1:
67 " ".join(r.perms) + " };")
70 " ".join(r.perms) + ";")
Dpolicy.py42 self.perms = set((data[4].strip()).split(' '))
154 not bool(Rule.perms & kwargs['perms'])):
Dtreble_sepolicy_tests.py130 for x in pol.QueryExpandedTERule(tclass=set(["file"]), perms=set(["entrypoint"])):
/system/apex/apexd/
Dapex_shim.cpp48 static constexpr const fs::perms kForbiddenFilePermissions =
49 fs::perms::owner_exec | fs::perms::group_exec | fs::perms::others_exec;
141 fs::perms::none) { in ValidateShimApex()
/system/sepolicy/tools/sepolicy-analyze/
Ddups.c59 uint32_t perms = node->datum.data & d->data; in find_dups_helper() local
60 if ((attrib1 && perms == node->datum.data) || in find_dups_helper()
61 (attrib2 && perms == d->data)) { in find_dups_helper()
Dutils.c12 void display_allow(policydb_t *policydb, avtab_key_t *key, int idx, uint32_t perms) in display_allow() argument
22 (policydb, key->target_class, perms)); in display_allow()
Dutils.h12 void display_allow(policydb_t *policydb, avtab_key_t *key, int idx, uint32_t perms);
Dneverallow.c183 class_perm_node_t **perms) in read_classperms() argument
364 *perms = classperms; in read_classperms()
419 if (read_classperms(policydb, &p, end, &avrule->perms)) in check_neverallows()
/system/core/libunwindstack/tools/
Dunwind_for_offline.cpp319 char perms[5] = {"---p"}; in SaveData() local
322 perms[0] = 'r'; in SaveData()
325 perms[1] = 'w'; in SaveData()
328 perms[2] = 'x'; in SaveData()
330 fprintf(fp.get(), "%" PRIx64 "-%" PRIx64 " %s %" PRIx64 " 00:00 0", map.start, map.end, perms, in SaveData()
/system/security/keystore/
Dpermissions.cpp69 perm_t perms; member
190 return (user.perms & perm) && keystore_selinux_check_access(uid, perm, spid, sid); in has_permission()
/system/sepolicy/prebuilts/api/29.0/public/
Dfastbootd.te83 # Refined manipulation of /mnt/scratch, without these perms resorts
/system/sepolicy/public/
Dfastbootd.te79 # Refined manipulation of /mnt/scratch, without these perms resorts
/system/sepolicy/prebuilts/api/30.0/public/
Dfastbootd.te89 # Refined manipulation of /mnt/scratch, without these perms resorts
/system/sepolicy/prebuilts/api/26.0/private/
Ddomain_deprecated.te167 # split this auditallow into read and write perms since most domains seem to
/system/core/rootdir/
Dinit.rc680 # create resource-cache and double-check the perms