Searched refs:owned (Results 1 – 25 of 37) sorted by relevance
12
/system/core/libsysutils/include/sysutils/ |
D | SocketClient.h | 32 SocketClient(int sock, bool owned); 33 SocketClient(int sock, bool owned, bool useCmdNum); 76 void init(int socket, bool owned, bool useCmdNum);
|
/system/core/libsysutils/src/ |
D | SocketClient.cpp | 35 SocketClient::SocketClient(int socket, bool owned) { in SocketClient() argument 36 init(socket, owned, false); in SocketClient() 39 SocketClient::SocketClient(int socket, bool owned, bool useCmdNum) { in SocketClient() argument 40 init(socket, owned, useCmdNum); in SocketClient() 43 void SocketClient::init(int socket, bool owned, bool useCmdNum) { in init() argument 45 mSocketOwned = owned; in init()
|
/system/sepolicy/prebuilts/api/27.0/public/ |
D | vdc.te | 17 # vdc information is written to shell owned bugreport files
|
D | kernel.te | 101 # the kernel should not be accessing files owned by other users.
|
D | netd.te | 14 # triggered by chmod on a directory or file owned by a group other
|
/system/sepolicy/prebuilts/api/26.0/public/ |
D | vdc.te | 17 # vdc information is written to shell owned bugreport files
|
D | netd.te | 14 # triggered by chmod on a directory or file owned by a group other
|
D | kernel.te | 100 # the kernel should not be accessing files owned by other users.
|
D | attributes | 130 # All socket devices owned by core domain components
|
/system/core/logd/ |
D | logd.rc | 28 write /dev/event-log-tags "# content owned by logd
|
/system/security/keystore-engine/ |
D | Android.bp | 45 // owned by the WiFi user to perform signing operations.
|
/system/sepolicy/private/ |
D | apexd.te | 67 # /dev/cpuset/tasks is owned by system.
|
D | property_contexts | 173 # ro.boot. properties are set based on kernel commandline arguments, which are vendor owned.
|
/system/sepolicy/prebuilts/api/28.0/public/ |
D | kernel.te | 102 # the kernel should not be accessing files owned by other users.
|
D | netd.te | 15 # triggered by chmod on a directory or file owned by a group other
|
D | attributes | 141 # All socket devices owned by core domain components
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | apexd.te | 67 # /dev/cpuset/tasks is owned by system.
|
D | property_contexts | 173 # ro.boot. properties are set based on kernel commandline arguments, which are vendor owned.
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | kernel.te | 127 # the kernel should not be accessing files owned by other users.
|
D | netd.te | 15 # triggered by chmod on a directory or file owned by a group other
|
D | attributes | 152 # All socket devices owned by core domain components
|
/system/sepolicy/public/ |
D | kernel.te | 127 # the kernel should not be accessing files owned by other users.
|
D | netd.te | 15 # triggered by chmod on a directory or file owned by a group other
|
D | attributes | 152 # All socket devices owned by core domain components
|
/system/netd/resolv/ |
D | README.md | 24 `DnsTlsQueryMap` and `DnsTlsSessionCache` are helper classes owned by `DnsTlsTransport`.
|
12