Home
last modified time | relevance | path

Searched refs:owned (Results 1 – 25 of 56) sorted by relevance

123

/system/core/libsysutils/include/sysutils/
DSocketClient.h32 SocketClient(int sock, bool owned);
33 SocketClient(int sock, bool owned, bool useCmdNum);
76 void init(int socket, bool owned, bool useCmdNum);
/system/core/libsysutils/src/
DSocketClient.cpp35 SocketClient::SocketClient(int socket, bool owned) { in SocketClient() argument
36 init(socket, owned, false); in SocketClient()
39 SocketClient::SocketClient(int socket, bool owned, bool useCmdNum) { in SocketClient() argument
40 init(socket, owned, useCmdNum); in SocketClient()
43 void SocketClient::init(int socket, bool owned, bool useCmdNum) { in init() argument
45 mSocketOwned = owned; in init()
/system/core/fs_mgr/
Dfs_mgr_dm_linear.cpp180 bool CreateLogicalPartitionParams::InitDefaults(CreateLogicalPartitionParams::OwnedData* owned) { in InitDefaults() argument
187 owned->partition_opener = std::make_unique<PartitionOpener>(); in InitDefaults()
188 partition_opener = owned->partition_opener.get(); in InitDefaults()
198 if (owned->metadata = ReadMetadata(*partition_opener, block_device, slot); in InitDefaults()
199 !owned->metadata) { in InitDefaults()
203 metadata = owned->metadata.get(); in InitDefaults()
/system/core/fs_mgr/include/
Dfs_mgr_dm_linear.h98 bool InitDefaults(OwnedData* owned);
/system/sepolicy/prebuilts/api/26.0/public/
Dvdc.te17 # vdc information is written to shell owned bugreport files
Dnetd.te14 # triggered by chmod on a directory or file owned by a group other
Dkernel.te100 # the kernel should not be accessing files owned by other users.
/system/sepolicy/prebuilts/api/27.0/public/
Dvdc.te17 # vdc information is written to shell owned bugreport files
Dkernel.te101 # the kernel should not be accessing files owned by other users.
Dnetd.te14 # triggered by chmod on a directory or file owned by a group other
/system/logging/logd/
Dlogd.rc29 write /dev/event-log-tags "# content owned by logd
/system/sepolicy/prebuilts/api/30.0/public/
Dte_macros817 # Define a /system-owned property used only in /system
830 # Define a /system-owned property which can't be written outside /system
843 # Define a /system-owned property with no restrictions
849 # Define a /system-owned property which can only be written by vendor_init
861 # Define a /product-owned property used only in /product
874 # Define a /product-owned property which can't be written outside /product
887 # Define a /product-owned property with no restrictions
893 # Define a /vendor-owned property used only in /vendor
907 # Define a /vendor-owned property which can't be written outside /vendor
921 # Define a /vendor-owned property with no restrictions
Dkernel.te130 # the kernel should not be accessing files owned by other users.
/system/sepolicy/prebuilts/api/31.0/public/
Dte_macros878 # Define a /system-owned property used only in /system
891 # Define a /system-owned property which can't be written outside /system
904 # Define a /system-owned property with no restrictions
910 # Define a /system-owned property which can only be written by vendor_init
922 # Define a /product-owned property used only in /product
935 # Define a /product-owned property which can't be written outside /product
948 # Define a /product-owned property with no restrictions
954 # Define a /vendor-owned property used only in /vendor
968 # Define a /vendor-owned property which can't be written outside /vendor
982 # Define a /vendor-owned property with no restrictions
Dnetd.te15 # triggered by chmod on a directory or file owned by a group other
Dkernel.te135 # the kernel should not be accessing files owned by other users.
/system/sepolicy/public/
Dte_macros878 # Define a /system-owned property used only in /system
891 # Define a /system-owned property which can't be written outside /system
904 # Define a /system-owned property with no restrictions
910 # Define a /system-owned property which can only be written by vendor_init
922 # Define a /product-owned property used only in /product
935 # Define a /product-owned property which can't be written outside /product
948 # Define a /product-owned property with no restrictions
954 # Define a /vendor-owned property used only in /vendor
968 # Define a /vendor-owned property which can't be written outside /vendor
982 # Define a /vendor-owned property with no restrictions
Dnetd.te15 # triggered by chmod on a directory or file owned by a group other
Dkernel.te135 # the kernel should not be accessing files owned by other users.
/system/sepolicy/prebuilts/api/28.0/public/
Dkernel.te102 # the kernel should not be accessing files owned by other users.
Dnetd.te15 # triggered by chmod on a directory or file owned by a group other
/system/sepolicy/prebuilts/api/29.0/private/
Dapexd.te67 # /dev/cpuset/tasks is owned by system.
/system/core/fs_mgr/libfiemap/
DREADME.md68 underlying blocks are no longer owned by the original file. Thus, when mapping
/system/sepolicy/prebuilts/api/30.0/private/
Dproperty_contexts104 # if device is fully owned by organization instead of being
195 # ro.boot. properties are set based on kernel commandline arguments, which are vendor owned.
/system/sepolicy/prebuilts/api/29.0/public/
Dkernel.te127 # the kernel should not be accessing files owned by other users.

123