Searched refs:use (Results 1 – 25 of 362) sorted by relevance
12345678910>>...15
/system/sepolicy/public/ |
D | hal_camera.te | 16 # Both the client and the server need to use the graphics allocator 17 allow { hal_camera_client hal_camera_server } hal_graphics_allocator:fd use; 19 # Allow hal_camera to use fd from app,gralloc,and ashmem HAL 20 allow hal_camera { appdomain -isolated_app }:fd use; 21 allow hal_camera surfaceflinger:fd use; 22 allow hal_camera hal_allocator_server:fd use;
|
D | hal_graphics_composer.te | 14 allow hal_graphics_composer hal_graphics_allocator:fd use; 21 allow hal_graphics_composer system_server:fd use; 22 allow hal_graphics_composer bootanim:fd use; 23 allow hal_graphics_composer appdomain:fd use;
|
D | mediacodec.te | 8 # and use macro hal_server_domain 26 allow mediacodec hal_graphics_composer:fd use; 32 allow mediacodec hal_camera:fd use; 40 # allocate and use graphic buffers 46 # via PDX. Thus, there is no need to use pdx_client macro. 47 allow mediacodec bufferhubd:fd use;
|
D | otapreopt_chroot.te | 16 # Allow otapreopt to use file descriptors from update-engine. It will 18 allow otapreopt_chroot postinstall:fd use; 19 allow otapreopt_chroot update_engine:fd use;
|
D | hal_sensors.te | 8 allow hal_sensors { appdomain -isolated_app }:fd use; 12 allow hal_sensors hal_allocator:fd use;
|
D | te_macros | 6 # cause it to occur automatically - use domain_auto_trans 40 # cause it to occur automatically - use file_type_auto_trans 113 # Allow the server domain to use the endpoint socket and accept connections on it. 117 … apply security context label to the channel socket pair (allow process to use setsockcreatecon_ra… 138 # Allow the client to use the PDX channel socket. 142 # Client needs to use an channel event fd from the server. 143 allow $1 pdx_$2_server_type:fd use; 147 allow pdx_$2_server_type $1:fd use; 267 # use set_prop(sourcedomain, targetproperty) 272 …print(`deprecated: unix_socket_connect($1, $2, $3) Please use set_prop($1, <property name>) instea… [all …]
|
D | bufferhubd.te | 19 # Thus, there is no need to use pdx_client macro. 20 allow bufferhubd mediacodec:fd use;
|
D | sgdisk.te | 9 # Inherit and use pty created by android_fork_execvp() 13 allow sgdisk vold:fd use;
|
D | dnsmasq.te | 16 # Inherit and use open files from netd. 17 allow dnsmasq netd:fd use;
|
D | bootanim.te | 28 allow bootanim hal_graphics_allocator:fd use; 31 allow bootanim hal_graphics_composer:fd use;
|
D | toolbox.te | 3 # Do NOT use this domain for toolbox when run by any other domain. 11 # Inherit and use pty created by android_fork_execvp_ext().
|
D | hal_audio.te | 21 allow hal_audio shell:fd use; 23 allow hal_audio dumpstate:fd use;
|
D | postinstall_dexopt.te | 45 # Check validity of SELinux context before use. 53 # Allow otapreopt to use file descriptors from otapreopt_chroot. 55 allow postinstall_dexopt otapreopt_chroot:fd use;
|
D | dex2oat.te | 19 allow dex2oat installd:fd use; 42 # Allow dex2oat to use file descriptors from otapreopt. 43 allow dex2oat postinstall_dexopt:fd use;
|
/system/sepolicy/private/ |
D | incident.te | 9 allow incident shell:fd use; 11 # allow incident to communicate use, read and write over the adb 13 allow incident adbd:fd use;
|
D | storaged.te | 25 allow storaged shell:fd use; 29 allow storaged priv_app:fd use; 39 # use batteryproperties service
|
D | surfaceflinger.te | 45 # Create and use netlink kobject uevent sockets. 53 allow surfaceflinger appdomain:fd use; 72 # do not use add_service() as hal_graphics_composer_default may be the 91 allow surfaceflinger system_server:fd use;
|
D | binderservicedomain.te | 4 allow binderservicedomain { dumpstate incidentd }:fd use; 14 allow binderservicedomain appdomain:fd use;
|
D | domain_deprecated.te | 19 allow domain_deprecated system_server:fd use; 21 auditallow { domain_deprecated -appdomain -netd -surfaceflinger } system_server:fd use; 24 # Connect to adbd and use a socket transferred from it. 26 allow domain_deprecated adbd:fd use; 28 auditallow { domain_deprecated -appdomain -system_server } adbd:fd use;
|
D | mediadrmserver.te | 5 # allocate and use graphic buffers
|
D | untrusted_app.te | 16 ### or define and use a new seinfo value in both mac_permissions.xml and 27 # Allow the allocation and use of ptys
|
/system/sepolicy/vendor/ |
D | hal_drm_default.te | 7 allow hal_drm_default mediacodec:fd use; 8 allow hal_drm_default { appdomain -isolated_app }:fd use;
|
/system/extras/showslab/ |
D | showslab.c | 28 unsigned long use; /* percent full: total / active */ member 129 p->use = 100 * p->nr_active_objs / p->nr_objs; in get_slabinfo() 132 p->use = 0; in get_slabinfo() 239 BUILD_SORT_FUNC(use) in BUILD_SORT_FUNC() 340 p->nr_objs, p->nr_active_objs, p->use, in main()
|
/system/bt/build/ |
D | BUILD.gn | 5 # you may not use this file except in compliance with the License. 41 #TODO(jpawlowski): we should use same c++ version as Android, which is c++11, 42 # but we use some c++14 features. Uncomment when this get fixed in code.:
|
/system/libhidl/transport/memory/1.0/ |
D | IMemory.hal | 5 * you may not use this file except in compliance with the License. 22 * Notify that you are about to use all of this memory. 27 * Notify that you are about to use the specific range.
|
12345678910>>...15