/system/update_engine/common/ |
D | test_utils.cc | 113 bool writable) { in SetLoopDeviceStatus() argument 117 device_info.lo_flags = (writable ? 0 : LO_FLAGS_READ_ONLY); in SetLoopDeviceStatus() 125 if (writable) { in SetLoopDeviceStatus() 138 bool writable, in BindToUnusedLoopDeviceLegacy() argument 172 return SetLoopDeviceStatus(loop_device_fd, filename, loop_number, writable); in BindToUnusedLoopDeviceLegacy() 176 bool writable, in BindToUnusedLoopDevice() argument 180 (writable ? O_RDWR : O_RDONLY) | O_LARGEFILE | O_CLOEXEC); in BindToUnusedLoopDevice() 194 return SetLoopDeviceStatus(loop_device_fd, filename, loop_number, writable); in BindToUnusedLoopDevice() 197 data_fd, filename, writable, out_lo_dev_name); in BindToUnusedLoopDevice()
|
D | test_utils.h | 65 bool writable, 102 bool writable, in ScopedLoopbackDeviceBinder() argument 104 is_bound_ = BindToUnusedLoopDevice(file, writable, &dev_); in ScopedLoopbackDeviceBinder()
|
/system/core/fastboot/ |
D | usb_linux.cpp | 156 char *ptr, int len, int writable, in filter_usb_device() argument 187 info.writable = writable; in filter_usb_device() 369 int writable; in find_usb_device() local 380 writable = 1; in find_usb_device() 384 writable = 0; in find_usb_device() 392 if (filter_usb_device(de->d_name, desc, n, writable, callback, &in, &out, &ifc) == 0) { in find_usb_device()
|
D | usb.h | 52 unsigned char writable; member
|
D | usb_windows.cpp | 314 info.writable = 1; in recognized_device()
|
D | usb_osx.cpp | 387 handle->info.writable = 1; in try_device()
|
D | fastboot.cpp | 295 if (!info->writable) { in list_devices_callback()
|
/system/sepolicy/private/ |
D | derive_sdk.te | 11 # Prop rules: writable by derive_sdk, readable by bootclasspath (apps)
|
D | app_neverallows.te | 56 # must never be writable to the app. 61 # This is a W^X violation (loading executable code from a writable
|
D | gmscore_app.te | 73 # Allow loading executable code from writable priv-app home
|
D | crosvm.te | 69 # The instance image and the composite image should be writable as well because they could represent
|
D | artd.te | 34 # Read access to primary dex'es on writable partitions
|
D | priv_app.te | 17 # Allow loading executable code from writable priv-app home
|
D | app.te | 601 # that should be writable by apps.
|
D | domain.te | 748 # Ensure that context mount types are not writable, to ensure that 1362 # Minimize read access to shell- or app-writable symlinks.
|
/system/core/rootdir/ |
D | ueventd.rc | 61 # these should not be world writable
|
D | init.rc | 3 # IMPORTANT: Do not create world writable files or directories.
|
/system/sepolicy/microdroid/system/private/ |
D | domain.te | 387 # Ensure that context mount types are not writable, to ensure that 457 # Minimize read access to shell-writable symlinks. 547 # Ensure that no one can execute from encrypted storage, which is a writable partition in VM.
|
/system/core/fs_mgr/ |
D | README.overlayfs.md | 18 _adb remount_ commands, which set up backing storage for a writable file
|
/system/sepolicy/public/ |
D | file.te | 18 # Security-sensitive proc nodes that should not be writable to most. 396 # /data/local - writable by shell
|
/system/core/init/ |
D | README.md | 541 Regarding to the src file, copying from symbolic link file and world-writable 542 or group-writable files are not allowed.
|