Searched refs:permitted (Results 1 – 25 of 46) sorted by relevance
12
51 # We can't have entire /system/${LIB} as permitted paths because doing so58 namespace.default.permitted.paths = /system/${LIB}/drm59 namespace.default.permitted.paths += /system/${LIB}/extractors60 namespace.default.permitted.paths += /system/${LIB}/hw61 namespace.default.permitted.paths += /%PRODUCT%/${LIB}62 namespace.default.permitted.paths += /%PRODUCT_SERVICES%/${LIB}64 namespace.default.permitted.paths += /system/framework65 namespace.default.permitted.paths += /system/app66 namespace.default.permitted.paths += /system/priv-app67 namespace.default.permitted.paths += /vendor/framework[all …]
121 namespace.media.permitted.paths = /apex/com.android.media/${LIB}/extractors186 namespace.sphal.permitted.paths = /odm/${LIB}187 namespace.sphal.permitted.paths += /vendor/${LIB}188 namespace.sphal.permitted.paths += /system/vendor/${LIB}195 namespace.sphal.asan.permitted.paths = /data/asan/odm/${LIB}196 namespace.sphal.asan.permitted.paths += /odm/${LIB}197 namespace.sphal.asan.permitted.paths += /data/asan/vendor/${LIB}198 namespace.sphal.asan.permitted.paths += /vendor/${LIB}219 # of the genuine characteristics of Renderscript; /data is in the permitted path231 namespace.rs.permitted.paths = /odm/${LIB}[all …]
16 namespace.sphal.permitted.paths = /odm/${LIB}17 namespace.sphal.permitted.paths += /vendor/${LIB}37 namespace.vndk.permitted.paths = /odm/${LIB}/hw38 namespace.vndk.permitted.paths += /odm/${LIB}/egl39 namespace.vndk.permitted.paths += /vendor/${LIB}/hw40 namespace.vndk.permitted.paths += /vendor/${LIB}/egl42 namespace.vndk.permitted.paths += /system/${LIB}/vndk-sp-Q/hw
44 __u32 permitted; member65 __le32 permitted; member
69 # Isolated apps must not be permitted to use HwBinder73 # Isolated apps must not be permitted to use VndBinder76 # Isolated apps must not be permitted to perform actions on Binder and VndBinder service_manager
150 # by surfaceflinger Binder service, which apps are permitted to access152 # Binder service which apps were permitted to access.
231 if (capdata[0].permitted != capdata[0].inheritable || in raise_caps()232 capdata[1].permitted != capdata[1].inheritable) { in raise_caps()233 capdata[0].inheritable = capdata[0].permitted; in raise_caps()234 capdata[1].inheritable = capdata[1].permitted; in raise_caps()
72 # Isolated apps must not be permitted to use HwBinder76 # Isolated apps must not be permitted to use VndBinder79 # Isolated apps must not be permitted to perform actions on Binder and VndBinder service_manager
28 # Core domains are not permitted to use kernel interfaces which are not
173 # by surfaceflinger Binder service, which apps are permitted to access175 # Binder service which apps were permitted to access.
82 # Isolated apps must not be permitted to use HwBinder86 # Isolated apps must not be permitted to use VndBinder89 # Isolated apps must not be permitted to perform actions on Binder and VndBinder service_manager
88 # Core domains are not permitted to use kernel interfaces which are not
5 Redistribution and use in source and binary forms, with or without modification, are permitted prov…
4 modification, are permitted provided that the following conditions are met:
5 modification, are permitted provided that the following conditions34 modification, are permitted provided that the following conditions62 modification, are permitted provided that the following conditions106 modification, are permitted provided that the following conditions135 modification, are permitted provided that the following conditions168 modification, are permitted provided that the following conditions215 modification, are permitted provided that the following conditions248 modification, are permitted provided that the following conditions281 modification, are permitted provided that the following conditions
95 capdata[CAP_TO_INDEX(CAP_SYS_RAWIO)].permitted = CAP_TO_MASK(CAP_SYS_RAWIO); in drop_privs()
91 # modification, are permitted provided that the following conditions are met:139 # * modification, are permitted provided that the following conditions172 # * modification, are permitted provided that the following conditions212 # Use, reproduction, and distribution of this software is permitted.300 # are permitted provided that the following conditions are met:337 # modification, are permitted provided that the following conditions391 modification, are permitted provided that the following conditions are
5 modification, are permitted provided that the following conditions are
145 # by surfaceflinger Binder service, which apps are permitted to access147 # Binder service which apps were permitted to access.
82 cap_data.data[0].permitted = (capabilities & 0xffffffff); in update_capabilities()84 cap_data.data[1].permitted = (capabilities >> 32); in update_capabilities()