Home
last modified time | relevance | path

Searched refs:use (Results 1 – 25 of 362) sorted by relevance

12345678910>>...15

/system/sepolicy/public/
Dhal_camera.te16 # Both the client and the server need to use the graphics allocator
17 allow { hal_camera_client hal_camera_server } hal_graphics_allocator:fd use;
19 # Allow hal_camera to use fd from app,gralloc,and ashmem HAL
20 allow hal_camera { appdomain -isolated_app }:fd use;
21 allow hal_camera surfaceflinger:fd use;
22 allow hal_camera hal_allocator_server:fd use;
Dhal_graphics_composer.te14 allow hal_graphics_composer hal_graphics_allocator:fd use;
21 allow hal_graphics_composer system_server:fd use;
22 allow hal_graphics_composer bootanim:fd use;
23 allow hal_graphics_composer appdomain:fd use;
Dmediacodec.te8 # and use macro hal_server_domain
26 allow mediacodec hal_graphics_composer:fd use;
32 allow mediacodec hal_camera:fd use;
40 # allocate and use graphic buffers
46 # via PDX. Thus, there is no need to use pdx_client macro.
47 allow mediacodec bufferhubd:fd use;
Dotapreopt_chroot.te16 # Allow otapreopt to use file descriptors from update-engine. It will
18 allow otapreopt_chroot postinstall:fd use;
19 allow otapreopt_chroot update_engine:fd use;
Dhal_sensors.te8 allow hal_sensors { appdomain -isolated_app }:fd use;
12 allow hal_sensors hal_allocator:fd use;
Dte_macros6 # cause it to occur automatically - use domain_auto_trans
40 # cause it to occur automatically - use file_type_auto_trans
113 # Allow the server domain to use the endpoint socket and accept connections on it.
117 … apply security context label to the channel socket pair (allow process to use setsockcreatecon_ra…
138 # Allow the client to use the PDX channel socket.
142 # Client needs to use an channel event fd from the server.
143 allow $1 pdx_$2_server_type:fd use;
147 allow pdx_$2_server_type $1:fd use;
267 # use set_prop(sourcedomain, targetproperty)
272 …print(`deprecated: unix_socket_connect($1, $2, $3) Please use set_prop($1, <property name>) instea…
[all …]
Dbufferhubd.te19 # Thus, there is no need to use pdx_client macro.
20 allow bufferhubd mediacodec:fd use;
Dsgdisk.te9 # Inherit and use pty created by android_fork_execvp()
13 allow sgdisk vold:fd use;
Ddnsmasq.te16 # Inherit and use open files from netd.
17 allow dnsmasq netd:fd use;
Dbootanim.te28 allow bootanim hal_graphics_allocator:fd use;
31 allow bootanim hal_graphics_composer:fd use;
Dtoolbox.te3 # Do NOT use this domain for toolbox when run by any other domain.
11 # Inherit and use pty created by android_fork_execvp_ext().
Dhal_audio.te21 allow hal_audio shell:fd use;
23 allow hal_audio dumpstate:fd use;
Dpostinstall_dexopt.te45 # Check validity of SELinux context before use.
53 # Allow otapreopt to use file descriptors from otapreopt_chroot.
55 allow postinstall_dexopt otapreopt_chroot:fd use;
Ddex2oat.te19 allow dex2oat installd:fd use;
42 # Allow dex2oat to use file descriptors from otapreopt.
43 allow dex2oat postinstall_dexopt:fd use;
/system/sepolicy/private/
Dincident.te9 allow incident shell:fd use;
11 # allow incident to communicate use, read and write over the adb
13 allow incident adbd:fd use;
Dstoraged.te25 allow storaged shell:fd use;
29 allow storaged priv_app:fd use;
39 # use batteryproperties service
Dsurfaceflinger.te45 # Create and use netlink kobject uevent sockets.
53 allow surfaceflinger appdomain:fd use;
72 # do not use add_service() as hal_graphics_composer_default may be the
91 allow surfaceflinger system_server:fd use;
Dbinderservicedomain.te4 allow binderservicedomain { dumpstate incidentd }:fd use;
14 allow binderservicedomain appdomain:fd use;
Ddomain_deprecated.te19 allow domain_deprecated system_server:fd use;
21 auditallow { domain_deprecated -appdomain -netd -surfaceflinger } system_server:fd use;
24 # Connect to adbd and use a socket transferred from it.
26 allow domain_deprecated adbd:fd use;
28 auditallow { domain_deprecated -appdomain -system_server } adbd:fd use;
Dmediadrmserver.te5 # allocate and use graphic buffers
Duntrusted_app.te16 ### or define and use a new seinfo value in both mac_permissions.xml and
27 # Allow the allocation and use of ptys
/system/sepolicy/vendor/
Dhal_drm_default.te7 allow hal_drm_default mediacodec:fd use;
8 allow hal_drm_default { appdomain -isolated_app }:fd use;
/system/extras/showslab/
Dshowslab.c28 unsigned long use; /* percent full: total / active */ member
129 p->use = 100 * p->nr_active_objs / p->nr_objs; in get_slabinfo()
132 p->use = 0; in get_slabinfo()
239 BUILD_SORT_FUNC(use) in BUILD_SORT_FUNC()
340 p->nr_objs, p->nr_active_objs, p->use, in main()
/system/bt/build/
DBUILD.gn5 # you may not use this file except in compliance with the License.
41 #TODO(jpawlowski): we should use same c++ version as Android, which is c++11,
42 # but we use some c++14 features. Uncomment when this get fixed in code.:
/system/libhidl/transport/memory/1.0/
DIMemory.hal5 * you may not use this file except in compliance with the License.
22 * Notify that you are about to use all of this memory.
27 * Notify that you are about to use the specific range.

12345678910>>...15