Searched refs:perms (Results 1 – 15 of 15) sorted by relevance
/system/sepolicy/tests/ |
D | searchpolicy.py | 35 if not (args.source or args.target or args.tclass or args.perms): 52 if args.perms: 53 perms = set(args.perms.split(",")) variable 55 perms = set() variable 60 perms=perms) 65 if len(r.perms) > 1: 67 " ".join(r.perms) + " };") 70 " ".join(r.perms) + ";")
|
D | policy.py | 42 self.perms = set((data[4].strip()).split(' ')) 154 not bool(Rule.perms & kwargs['perms'])):
|
D | treble_sepolicy_tests.py | 130 for x in pol.QueryExpandedTERule(tclass=set(["file"]), perms=set(["entrypoint"])):
|
/system/apex/apexd/ |
D | apex_shim.cpp | 48 static constexpr const fs::perms kForbiddenFilePermissions = 49 fs::perms::owner_exec | fs::perms::group_exec | fs::perms::others_exec; 141 fs::perms::none) { in ValidateShimApex()
|
/system/sepolicy/tools/sepolicy-analyze/ |
D | dups.c | 59 uint32_t perms = node->datum.data & d->data; in find_dups_helper() local 60 if ((attrib1 && perms == node->datum.data) || in find_dups_helper() 61 (attrib2 && perms == d->data)) { in find_dups_helper()
|
D | utils.c | 12 void display_allow(policydb_t *policydb, avtab_key_t *key, int idx, uint32_t perms) in display_allow() argument 22 (policydb, key->target_class, perms)); in display_allow()
|
D | utils.h | 12 void display_allow(policydb_t *policydb, avtab_key_t *key, int idx, uint32_t perms);
|
D | neverallow.c | 183 class_perm_node_t **perms) in read_classperms() argument 364 *perms = classperms; in read_classperms() 419 if (read_classperms(policydb, &p, end, &avrule->perms)) in check_neverallows()
|
/system/core/libunwindstack/tools/ |
D | unwind_for_offline.cpp | 319 char perms[5] = {"---p"}; in SaveData() local 322 perms[0] = 'r'; in SaveData() 325 perms[1] = 'w'; in SaveData() 328 perms[2] = 'x'; in SaveData() 330 fprintf(fp.get(), "%" PRIx64 "-%" PRIx64 " %s %" PRIx64 " 00:00 0", map.start, map.end, perms, in SaveData()
|
/system/security/keystore/ |
D | permissions.cpp | 69 perm_t perms; member 190 return (user.perms & perm) && keystore_selinux_check_access(uid, perm, spid, sid); in has_permission()
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | fastbootd.te | 83 # Refined manipulation of /mnt/scratch, without these perms resorts
|
/system/sepolicy/public/ |
D | fastbootd.te | 79 # Refined manipulation of /mnt/scratch, without these perms resorts
|
/system/sepolicy/prebuilts/api/30.0/public/ |
D | fastbootd.te | 89 # Refined manipulation of /mnt/scratch, without these perms resorts
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | domain_deprecated.te | 167 # split this auditallow into read and write perms since most domains seem to
|
/system/core/rootdir/ |
D | init.rc | 680 # create resource-cache and double-check the perms
|