/system/sepolicy/ |
D | global_macros | 28 define(`create_file_perms', `{ create rename setattr unlink rw_file_perms }') 34 define(`create_dir_perms', `{ create reparent rename rmdir setattr rw_dir_perms }') 39 define(`create_ipc_perms', `{ create setattr destroy rw_ipc_perms }') 44 define(`create_socket_perms', `{ create rw_socket_perms }') 46 define(`create_stream_socket_perms', `{ create rw_stream_socket_perms }')
|
D | ueventd.te | 6 # TODO: why is ueventd using __kmsg__ when it should just create 9 allow ueventd klog_device:chr_file { create open write unlink }; 25 allow ueventd dev_type:lnk_file { create unlink }; 26 allow ueventd dev_type:chr_file { create setattr unlink }; 27 allow ueventd dev_type:blk_file { relabelfrom relabelto create setattr unlink };
|
D | neverallow_macros | 3 define(`no_w_file_perms', `{ append create link unlink relabelfrom rename setattr write }') 6 define(`no_w_dir_perms', `{ add_name create link relabelfrom remove_name rename reparent rmdir set…
|
D | init.te | 53 allow init rootfs:lnk_file { create unlink }; 62 allow init cpuctl_device:dir { create mounton }; 105 allow init {file_type -system_file -exec_type -app_data_file}:dir { create search getattr open read… 107 …-app_data_file -shell_data_file -vold_data_file -misc_logd_file }:file { create getattr open read … 108 …ll_data_file -vold_data_file -misc_logd_file }:{ sock_file fifo_file } { create getattr open read … 109 …_data_file -shell_data_file -vold_data_file -misc_logd_file }:lnk_file { create getattr setattr re… 114 allow init dev_type:lnk_file create; 131 allow init security_file:dir { create setattr }; 183 # Init will create /data/misc/logd when the property persist.logd.logpersistd is "logcatd". 185 allow init misc_logd_file:dir { open create read getattr setattr search }; [all …]
|
D | app.te | 47 # Allow apps to create and write method traces in /data/misc/trace. 49 allow appdomain method_trace_data_file:file { create w_file_perms }; 127 # Profiles for foreign dex files are just markers and only need create permissions. 129 allow appdomain user_profile_foreign_dex_data_file:file create; 130 # There is no way to create user_profile_foreign_dex_data_file without 351 { create write setattr relabelfrom relabelto append unlink link rename }; 355 { create write setattr relabelfrom relabelto append unlink link rename }; 359 { create write setattr relabelfrom relabelto append unlink link rename }; 366 { create write setattr relabelfrom relabelto append unlink link rename }; 370 { create write setattr relabelfrom relabelto append unlink link rename }; [all …]
|
D | dex2oat.te | 35 allow dex2oat ota_data_file:lnk_file { create read }; 39 # create them itself (and make them world-readable). 40 allow dex2oat ota_data_file:file { create w_file_perms setattr };
|
D | vold.te | 61 allow vold { mnt_media_rw_stub_file storage_stub_file }:dir { mounton create rmdir getattr setattr … 68 # Allow to create and mount expanded storage 70 allow vold apk_data_file:dir { create getattr setattr }; 71 allow vold shell_data_file:dir { create getattr setattr }; 117 allow vold system_data_file:dir { create rw_dir_perms mounton setattr rmdir }; 198 neverallow { domain -vold } vold_data_file:dir ~{ open create read getattr setattr search relabelto…
|
D | installd.te | 16 allow installd apk_data_file:lnk_file { create read unlink }; 35 # Also required to initially create /data/data subdirectories 39 allow installd system_data_file:lnk_file { create setattr unlink }; 127 allow installd profman_dump_data_file:file { create setattr open write };
|
D | logd.te | 62 …pe -logd_tmpfs userdebug_or_eng(` -misc_logd_file -coredump_file ') }:file { create write append }; 67 neverallow { domain -init } misc_logd_file:dir create;
|
D | access_vectors | 16 create 43 create 71 create 507 create
|
D | otapreopt_chroot.te | 6 # We need to create an unshared mount namespace, and then mount /data.
|
D | domain.te | 150 # Do not allow any domain other than init or recovery to create unlabeled files. 151 neverallow { domain -init -recovery } unlabeled:dir_file_class_set create; 209 # Only init and system_server can create/setattr directories with this type. 212 neverallow { domain -init -system_server } security_file:dir { create setattr }; 213 # Only system_server can create subdirectories and files under /data/security. 215 neverallow { domain -system_server } security_file:file { create setattr write append unlink link r… 216 neverallow { domain -system_server } security_file:lnk_file { create setattr unlink rename }; 241 neverallow * kmem_device:chr_file ~{ create relabelto unlink setattr }; 316 { create write setattr relabelfrom append unlink link rename }; 324 neverallow * rootfs:file { create write setattr relabelto append unlink link rename }; [all …]
|
/system/bt/btif/co/ |
D | bta_hh_co.c | 473 strncpy((char*)ev.u.create.name, dev_name, sizeof(ev.u.create.name) - 1); in bta_hh_co_send_hid_info() 474 snprintf((char*)ev.u.create.uniq, sizeof(ev.u.create.uniq), in bta_hh_co_send_hid_info() 479 ev.u.create.rd_size = dscp_len; in bta_hh_co_send_hid_info() 480 ev.u.create.rd_data = p_dscp; in bta_hh_co_send_hid_info() 481 ev.u.create.bus = BUS_BLUETOOTH; in bta_hh_co_send_hid_info() 482 ev.u.create.vendor = vendor_id; in bta_hh_co_send_hid_info() 483 ev.u.create.product = product_id; in bta_hh_co_send_hid_info() 484 ev.u.create.version = version; in bta_hh_co_send_hid_info() 485 ev.u.create.country = ctry_code; in bta_hh_co_send_hid_info()
|
/system/vold/ |
D | Benchmark.cpp | 91 nsecs_t create = systemTime(SYSTEM_TIME_BOOTTIME); in benchmark() local 120 nsecs_t create_d = create - start; in benchmark() 121 nsecs_t drop_d = drop - create; in benchmark()
|
D | Devmapper.h | 27 static int create(const char *name, const char *loopFile, const char *key,
|
D | Loop.h | 31 static int create(const char *id, const char *loopFile, char *loopDeviceBuffer, size_t len);
|
D | Disk.cpp | 146 status_t Disk::create() { in create() function in android::vold::Disk 168 vol->create(); in createPublicVolume() 176 vol->create(); in createPublicVolume() 198 vol->create(); in createPrivateVolume() 207 vol->create(); in createPrivateVolume()
|
/system/core/libbacktrace/ |
D | ThreadEntry.cpp | 49 ThreadEntry* ThreadEntry::Get(pid_t pid, pid_t tid, bool create) { in Get() argument 60 if (create) { in Get()
|
D | ThreadEntry.h | 26 static ThreadEntry* Get(pid_t pid, pid_t tid, bool create = true);
|
/system/core/libutils/ |
D | NativeHandle.cpp | 22 sp<NativeHandle> NativeHandle::create( in create() function in android::NativeHandle
|
/system/core/include/utils/ |
D | NativeHandle.h | 33 static sp<NativeHandle> create(native_handle_t* handle, bool ownsHandle);
|
D | FileMap.h | 66 bool create(const char* origFileName, int fd,
|
/system/bt/btif/src/ |
D | btif_gatt_server.c | 210 srvc_id.is_primary = p_data->create.is_primary; in btapp_gatts_handle_cback() 211 srvc_id.id.inst_id = p_data->create.svc_instance; in btapp_gatts_handle_cback() 212 bta_to_btif_uuid(&srvc_id.id.uuid, &p_data->create.uuid); in btapp_gatts_handle_cback() 215 p_data->create.status, p_data->create.server_if, &srvc_id, in btapp_gatts_handle_cback() 216 p_data->create.service_id in btapp_gatts_handle_cback()
|
/system/bt/bta/gatt/ |
D | bta_gatts_act.c | 335 cb_data.create.status = BTA_GATT_ERROR; in bta_gatts_create_srvc() 360 cb_data.create.status = BTA_GATT_OK; in bta_gatts_create_srvc() 361 cb_data.create.service_id = service_id; in bta_gatts_create_srvc() 362 cb_data.create.is_primary = p_msg->api_create_svc.is_pri; in bta_gatts_create_srvc() 363 cb_data.create.server_if = p_cb->rcb[rcb_idx].gatt_if; in bta_gatts_create_srvc() 371 memcpy(&cb_data.create.uuid, &p_msg->api_create_svc.service_uuid, sizeof(tBT_UUID)); in bta_gatts_create_srvc() 372 cb_data.create.svc_instance= p_msg->api_create_svc.inst; in bta_gatts_create_srvc()
|
/system/weaved/libweaved/ |
D | README.md | 9 In order to create an instance of `Service`, call asynchronous 13 create their component, register command handlers and update the state.
|