Home
last modified time | relevance | path

Searched refs:create (Results 1 – 25 of 68) sorted by relevance

123

/system/sepolicy/
Dglobal_macros28 define(`create_file_perms', `{ create rename setattr unlink rw_file_perms }')
34 define(`create_dir_perms', `{ create reparent rename rmdir setattr rw_dir_perms }')
39 define(`create_ipc_perms', `{ create setattr destroy rw_ipc_perms }')
44 define(`create_socket_perms', `{ create rw_socket_perms }')
46 define(`create_stream_socket_perms', `{ create rw_stream_socket_perms }')
Dueventd.te6 # TODO: why is ueventd using __kmsg__ when it should just create
9 allow ueventd klog_device:chr_file { create open write unlink };
25 allow ueventd dev_type:lnk_file { create unlink };
26 allow ueventd dev_type:chr_file { create setattr unlink };
27 allow ueventd dev_type:blk_file { relabelfrom relabelto create setattr unlink };
Dneverallow_macros3 define(`no_w_file_perms', `{ append create link unlink relabelfrom rename setattr write }')
6 define(`no_w_dir_perms', `{ add_name create link relabelfrom remove_name rename reparent rmdir set…
Dinit.te53 allow init rootfs:lnk_file { create unlink };
62 allow init cpuctl_device:dir { create mounton };
105 allow init {file_type -system_file -exec_type -app_data_file}:dir { create search getattr open read…
107 …-app_data_file -shell_data_file -vold_data_file -misc_logd_file }:file { create getattr open read …
108 …ll_data_file -vold_data_file -misc_logd_file }:{ sock_file fifo_file } { create getattr open read …
109 …_data_file -shell_data_file -vold_data_file -misc_logd_file }:lnk_file { create getattr setattr re…
114 allow init dev_type:lnk_file create;
131 allow init security_file:dir { create setattr };
183 # Init will create /data/misc/logd when the property persist.logd.logpersistd is "logcatd".
185 allow init misc_logd_file:dir { open create read getattr setattr search };
[all …]
Dapp.te47 # Allow apps to create and write method traces in /data/misc/trace.
49 allow appdomain method_trace_data_file:file { create w_file_perms };
127 # Profiles for foreign dex files are just markers and only need create permissions.
129 allow appdomain user_profile_foreign_dex_data_file:file create;
130 # There is no way to create user_profile_foreign_dex_data_file without
351 { create write setattr relabelfrom relabelto append unlink link rename };
355 { create write setattr relabelfrom relabelto append unlink link rename };
359 { create write setattr relabelfrom relabelto append unlink link rename };
366 { create write setattr relabelfrom relabelto append unlink link rename };
370 { create write setattr relabelfrom relabelto append unlink link rename };
[all …]
Ddex2oat.te35 allow dex2oat ota_data_file:lnk_file { create read };
39 # create them itself (and make them world-readable).
40 allow dex2oat ota_data_file:file { create w_file_perms setattr };
Dvold.te61 allow vold { mnt_media_rw_stub_file storage_stub_file }:dir { mounton create rmdir getattr setattr …
68 # Allow to create and mount expanded storage
70 allow vold apk_data_file:dir { create getattr setattr };
71 allow vold shell_data_file:dir { create getattr setattr };
117 allow vold system_data_file:dir { create rw_dir_perms mounton setattr rmdir };
198 neverallow { domain -vold } vold_data_file:dir ~{ open create read getattr setattr search relabelto…
Dinstalld.te16 allow installd apk_data_file:lnk_file { create read unlink };
35 # Also required to initially create /data/data subdirectories
39 allow installd system_data_file:lnk_file { create setattr unlink };
127 allow installd profman_dump_data_file:file { create setattr open write };
Dlogd.te62 …pe -logd_tmpfs userdebug_or_eng(` -misc_logd_file -coredump_file ') }:file { create write append };
67 neverallow { domain -init } misc_logd_file:dir create;
Daccess_vectors16 create
43 create
71 create
507 create
Dotapreopt_chroot.te6 # We need to create an unshared mount namespace, and then mount /data.
Ddomain.te150 # Do not allow any domain other than init or recovery to create unlabeled files.
151 neverallow { domain -init -recovery } unlabeled:dir_file_class_set create;
209 # Only init and system_server can create/setattr directories with this type.
212 neverallow { domain -init -system_server } security_file:dir { create setattr };
213 # Only system_server can create subdirectories and files under /data/security.
215 neverallow { domain -system_server } security_file:file { create setattr write append unlink link r…
216 neverallow { domain -system_server } security_file:lnk_file { create setattr unlink rename };
241 neverallow * kmem_device:chr_file ~{ create relabelto unlink setattr };
316 { create write setattr relabelfrom append unlink link rename };
324 neverallow * rootfs:file { create write setattr relabelto append unlink link rename };
[all …]
/system/bt/btif/co/
Dbta_hh_co.c473 strncpy((char*)ev.u.create.name, dev_name, sizeof(ev.u.create.name) - 1); in bta_hh_co_send_hid_info()
474 snprintf((char*)ev.u.create.uniq, sizeof(ev.u.create.uniq), in bta_hh_co_send_hid_info()
479 ev.u.create.rd_size = dscp_len; in bta_hh_co_send_hid_info()
480 ev.u.create.rd_data = p_dscp; in bta_hh_co_send_hid_info()
481 ev.u.create.bus = BUS_BLUETOOTH; in bta_hh_co_send_hid_info()
482 ev.u.create.vendor = vendor_id; in bta_hh_co_send_hid_info()
483 ev.u.create.product = product_id; in bta_hh_co_send_hid_info()
484 ev.u.create.version = version; in bta_hh_co_send_hid_info()
485 ev.u.create.country = ctry_code; in bta_hh_co_send_hid_info()
/system/vold/
DBenchmark.cpp91 nsecs_t create = systemTime(SYSTEM_TIME_BOOTTIME); in benchmark() local
120 nsecs_t create_d = create - start; in benchmark()
121 nsecs_t drop_d = drop - create; in benchmark()
DDevmapper.h27 static int create(const char *name, const char *loopFile, const char *key,
DLoop.h31 static int create(const char *id, const char *loopFile, char *loopDeviceBuffer, size_t len);
DDisk.cpp146 status_t Disk::create() { in create() function in android::vold::Disk
168 vol->create(); in createPublicVolume()
176 vol->create(); in createPublicVolume()
198 vol->create(); in createPrivateVolume()
207 vol->create(); in createPrivateVolume()
/system/core/libbacktrace/
DThreadEntry.cpp49 ThreadEntry* ThreadEntry::Get(pid_t pid, pid_t tid, bool create) { in Get() argument
60 if (create) { in Get()
DThreadEntry.h26 static ThreadEntry* Get(pid_t pid, pid_t tid, bool create = true);
/system/core/libutils/
DNativeHandle.cpp22 sp<NativeHandle> NativeHandle::create( in create() function in android::NativeHandle
/system/core/include/utils/
DNativeHandle.h33 static sp<NativeHandle> create(native_handle_t* handle, bool ownsHandle);
DFileMap.h66 bool create(const char* origFileName, int fd,
/system/bt/btif/src/
Dbtif_gatt_server.c210 srvc_id.is_primary = p_data->create.is_primary; in btapp_gatts_handle_cback()
211 srvc_id.id.inst_id = p_data->create.svc_instance; in btapp_gatts_handle_cback()
212 bta_to_btif_uuid(&srvc_id.id.uuid, &p_data->create.uuid); in btapp_gatts_handle_cback()
215 p_data->create.status, p_data->create.server_if, &srvc_id, in btapp_gatts_handle_cback()
216 p_data->create.service_id in btapp_gatts_handle_cback()
/system/bt/bta/gatt/
Dbta_gatts_act.c335 cb_data.create.status = BTA_GATT_ERROR; in bta_gatts_create_srvc()
360 cb_data.create.status = BTA_GATT_OK; in bta_gatts_create_srvc()
361 cb_data.create.service_id = service_id; in bta_gatts_create_srvc()
362 cb_data.create.is_primary = p_msg->api_create_svc.is_pri; in bta_gatts_create_srvc()
363 cb_data.create.server_if = p_cb->rcb[rcb_idx].gatt_if; in bta_gatts_create_srvc()
371 memcpy(&cb_data.create.uuid, &p_msg->api_create_svc.service_uuid, sizeof(tBT_UUID)); in bta_gatts_create_srvc()
372 cb_data.create.svc_instance= p_msg->api_create_svc.inst; in bta_gatts_create_srvc()
/system/weaved/libweaved/
DREADME.md9 In order to create an instance of `Service`, call asynchronous
13 create their component, register command handlers and update the state.

123