Home
last modified time | relevance | path

Searched refs:init (Results 1 – 25 of 1156) sorted by relevance

12345678910>>...47

/system/sepolicy/prebuilts/api/32.0/private/
Dinit.te1 typeattribute init coredomain;
3 tmpfs_domain(init)
5 # Transitions to seclabel processes in init.rc
6 domain_trans(init, rootfs, healthd)
7 domain_trans(init, rootfs, slideshow)
8 domain_auto_trans(init, charger_exec, charger)
9 domain_auto_trans(init, e2fs_exec, e2fs)
10 domain_auto_trans(init, bpfloader_exec, bpfloader)
14 domain_trans(init, rootfs, adbd)
15 domain_trans(init, rootfs, charger)
[all …]
Dproperty.te70 # init is in coredomain, but should be able to read/write all props.
72 neverallow { coredomain -init -dumpstate } {
79 neverallow { coredomain -init } {
122 -init
141 -init
146 -init
240 -init
317 -init
337 -init
344 # Only allow init and system_server to set system_adbd_prop
[all …]
/system/sepolicy/prebuilts/api/31.0/private/
Dinit.te1 typeattribute init coredomain;
3 tmpfs_domain(init)
5 # Transitions to seclabel processes in init.rc
6 domain_trans(init, rootfs, healthd)
7 domain_trans(init, rootfs, slideshow)
8 domain_auto_trans(init, charger_exec, charger)
9 domain_auto_trans(init, e2fs_exec, e2fs)
10 domain_auto_trans(init, bpfloader_exec, bpfloader)
14 domain_trans(init, rootfs, adbd)
15 domain_trans(init, rootfs, charger)
[all …]
Dproperty.te69 # init is in coredomain, but should be able to read/write all props.
71 neverallow { coredomain -init -dumpstate } {
78 neverallow { coredomain -init } {
121 -init
140 -init
145 -init
239 -init
316 -init
336 -init
343 # Only allow init and system_server to set system_adbd_prop
[all …]
/system/sepolicy/prebuilts/api/34.0/private/
Dinit.te1 typeattribute init coredomain;
3 tmpfs_domain(init)
5 # Transitions to seclabel processes in init.rc
6 domain_trans(init, rootfs, slideshow)
7 domain_auto_trans(init, charger_exec, charger)
8 domain_auto_trans(init, e2fs_exec, e2fs)
9 domain_auto_trans(init, bpfloader_exec, bpfloader)
13 domain_trans(init, rootfs, adbd)
14 domain_trans(init, rootfs, hal_bootctl_server)
15 domain_trans(init, rootfs, charger)
[all …]
Dproperty.te87 # init is in coredomain, but should be able to read/write all props.
89 neverallow { coredomain -init -dumpstate } {
96 neverallow { coredomain -init } {
139 -init
158 -init
164 -init
169 -init
263 -init
340 -init
360 -init
[all …]
Dbug_map4 init app_data_file file b/77873135
5 init cache_file blk_file b/77873135
6 init logpersist file b/77873135
7 init nativetest_data_file dir b/77873135
8 init pstorefs dir b/77873135
9 init shell_data_file dir b/77873135
10 init shell_data_file file b/77873135
11 init shell_data_file lnk_file b/77873135
12 init shell_data_file sock_file b/77873135
13 init system_data_file chr_file b/77873135
/system/sepolicy/prebuilts/api/33.0/private/
Dinit.te1 typeattribute init coredomain;
3 tmpfs_domain(init)
5 # Transitions to seclabel processes in init.rc
6 domain_trans(init, rootfs, slideshow)
7 domain_auto_trans(init, charger_exec, charger)
8 domain_auto_trans(init, e2fs_exec, e2fs)
9 domain_auto_trans(init, bpfloader_exec, bpfloader)
13 domain_trans(init, rootfs, adbd)
14 domain_trans(init, rootfs, charger)
15 domain_trans(init, rootfs, fastbootd)
[all …]
Dproperty.te80 # init is in coredomain, but should be able to read/write all props.
82 neverallow { coredomain -init -dumpstate } {
89 neverallow { coredomain -init } {
133 -init
152 -init
157 -init
251 -init
328 -init
348 -init
355 # Only allow init and system_server to set system_adbd_prop
[all …]
/system/sepolicy/private/
Dinit.te1 typeattribute init coredomain;
3 tmpfs_domain(init)
5 # Transitions to seclabel processes in init.rc
6 domain_trans(init, rootfs, slideshow)
7 domain_auto_trans(init, charger_exec, charger)
8 domain_auto_trans(init, e2fs_exec, e2fs)
9 domain_auto_trans(init, bpfloader_exec, bpfloader)
13 domain_trans(init, rootfs, adbd)
14 domain_trans(init, rootfs, hal_bootctl_server)
15 domain_trans(init, rootfs, charger)
[all …]
Dproperty.te87 # init is in coredomain, but should be able to read/write all props.
89 neverallow { coredomain -init -dumpstate } {
96 neverallow { coredomain -init } {
139 -init
158 -init
164 -init
169 -init
263 -init
340 -init
360 -init
[all …]
Dbug_map4 init app_data_file file b/77873135
5 init cache_file blk_file b/77873135
6 init logpersist file b/77873135
7 init nativetest_data_file dir b/77873135
8 init pstorefs dir b/77873135
9 init shell_data_file dir b/77873135
10 init shell_data_file file b/77873135
11 init shell_data_file lnk_file b/77873135
12 init shell_data_file sock_file b/77873135
13 init system_data_file chr_file b/77873135
/system/sepolicy/prebuilts/api/30.0/public/
Dinit.te1 # init is its own domain.
2 type init, domain, mlstrustedsubject;
6 # /dev/__null__ node created by init.
7 allow init tmpfs:chr_file { create setattr unlink rw_file_perms };
10 # init direct restorecon calls.
13 allow init tmpfs:chr_file relabelfrom;
14 allow init kmsg_device:chr_file { getattr write relabelto };
17 allow init kmsg_debug_device:chr_file { open write relabelto };
20 allow init properties_device:dir relabelto;
21 allow init properties_serial:file { write relabelto };
[all …]
/system/sepolicy/microdroid/system/private/
Dinit.te1 typeattribute init coredomain;
3 tmpfs_domain(init)
5 domain_trans(init, shell_exec, shell)
6 domain_trans(init, init_exec, ueventd)
7 domain_trans(init, init_exec, vendor_init)
9 # Allow init to figure out name of dm-device from it's /dev/block/dm-XX path.
13 allow init sysfs_dm:file read;
15 # Second-stage init performs a test for whether the kernel has SELinux hooks
18 allow init self:perf_event { open cpu };
19 allow init self:global_capability2_class_set perfmon;
[all …]
/system/sepolicy/prebuilts/api/29.0/public/
Dinit.te1 # init is its own domain.
2 type init, domain, mlstrustedsubject;
6 # /dev/__null__ node created by init.
7 allow init tmpfs:chr_file { create setattr unlink rw_file_perms };
10 # init direct restorecon calls.
13 allow init tmpfs:chr_file relabelfrom;
14 allow init kmsg_device:chr_file { getattr write relabelto };
17 allow init kmsg_debug_device:chr_file { write relabelto };
20 allow init properties_device:dir relabelto;
21 allow init properties_serial:file { write relabelto };
[all …]
/system/sepolicy/public/
Dinit.te1 # init is its own domain.
2 type init, domain, mlstrustedsubject;
6 # /dev/__null__ node created by init.
7 allow init tmpfs:chr_file { create setattr unlink rw_file_perms };
10 # init direct restorecon calls.
13 allow init tmpfs:chr_file relabelfrom;
14 allow init kmsg_device:chr_file { getattr write relabelto };
17 allow init kmsg_debug_device:chr_file { open write relabelto };
20 # allow init to mount and unmount debugfs in debug builds
22 allow init debugfs:dir mounton;
[all …]
/system/sepolicy/prebuilts/api/34.0/public/
Dinit.te1 # init is its own domain.
2 type init, domain, mlstrustedsubject;
6 # /dev/__null__ node created by init.
7 allow init tmpfs:chr_file { create setattr unlink rw_file_perms };
10 # init direct restorecon calls.
13 allow init tmpfs:chr_file relabelfrom;
14 allow init kmsg_device:chr_file { getattr write relabelto };
17 allow init kmsg_debug_device:chr_file { open write relabelto };
20 # allow init to mount and unmount debugfs in debug builds
22 allow init debugfs:dir mounton;
[all …]
/system/sepolicy/prebuilts/api/33.0/public/
Dinit.te1 # init is its own domain.
2 type init, domain, mlstrustedsubject;
6 # /dev/__null__ node created by init.
7 allow init tmpfs:chr_file { create setattr unlink rw_file_perms };
10 # init direct restorecon calls.
13 allow init tmpfs:chr_file relabelfrom;
14 allow init kmsg_device:chr_file { getattr write relabelto };
17 allow init kmsg_debug_device:chr_file { open write relabelto };
20 # allow init to mount and unmount debugfs in debug builds
22 allow init debugfs:dir mounton;
[all …]
/system/sepolicy/prebuilts/api/31.0/public/
Dinit.te1 # init is its own domain.
2 type init, domain, mlstrustedsubject;
6 # /dev/__null__ node created by init.
7 allow init tmpfs:chr_file { create setattr unlink rw_file_perms };
10 # init direct restorecon calls.
13 allow init tmpfs:chr_file relabelfrom;
14 allow init kmsg_device:chr_file { getattr write relabelto };
17 allow init kmsg_debug_device:chr_file { open write relabelto };
20 # allow init to mount and unmount debugfs in debug builds
22 allow init debugfs:dir mounton;
[all …]
/system/sepolicy/prebuilts/api/32.0/public/
Dinit.te1 # init is its own domain.
2 type init, domain, mlstrustedsubject;
6 # /dev/__null__ node created by init.
7 allow init tmpfs:chr_file { create setattr unlink rw_file_perms };
10 # init direct restorecon calls.
13 allow init tmpfs:chr_file relabelfrom;
14 allow init kmsg_device:chr_file { getattr write relabelto };
17 allow init kmsg_debug_device:chr_file { open write relabelto };
20 # allow init to mount and unmount debugfs in debug builds
22 allow init debugfs:dir mounton;
[all …]
/system/chre/apps/wifi_offload/test/
Dutility.cc23 void init(uint8_t &val, RandomGenerator &rand_gen) { in init() function
27 void init(uint16_t &val, RandomGenerator &rand_gen) { in init() function
31 void init(uint32_t &val, RandomGenerator &rand_gen) { in init() function
35 void init(uint64_t &val, RandomGenerator &rand_gen) { in init() function
39 void init(uint8_t *arr, size_t len, RandomGenerator &rand_gen) { in init() function
46 init(sec_mode, rand_gen); in init_security_mode()
70 void init(wifi_offload::Ssid &ssid, RandomGenerator &rand_gen) { in init() function
73 init(rand_ssid, len, rand_gen); in init()
77 void init(wifi_offload::PreferredNetwork &net_info, RandomGenerator &rand_gen) { in init() function
78 init(net_info.ssid_, rand_gen); in init()
[all …]
/system/sepolicy/prebuilts/api/30.0/private/
Dinit.te1 typeattribute init coredomain;
3 tmpfs_domain(init)
5 # Transitions to seclabel processes in init.rc
6 domain_trans(init, rootfs, healthd)
7 domain_trans(init, rootfs, slideshow)
8 domain_auto_trans(init, charger_exec, charger)
9 domain_auto_trans(init, e2fs_exec, e2fs)
10 domain_auto_trans(init, bpfloader_exec, bpfloader)
14 domain_trans(init, rootfs, adbd)
15 domain_trans(init, rootfs, charger)
[all …]
/system/sepolicy/prebuilts/api/29.0/private/
Dinit.te1 typeattribute init coredomain;
3 tmpfs_domain(init)
5 # Transitions to seclabel processes in init.rc
6 domain_trans(init, rootfs, healthd)
7 domain_trans(init, rootfs, slideshow)
8 domain_auto_trans(init, charger_exec, charger)
9 domain_auto_trans(init, e2fs_exec, e2fs)
10 domain_auto_trans(init, bpfloader_exec, bpfloader)
14 domain_trans(init, rootfs, adbd)
15 domain_trans(init, rootfs, charger)
[all …]
Dbug_map3 init app_data_file file 77873135
4 init cache_file blk_file 77873135
5 init logpersist file 77873135
6 init nativetest_data_file dir 77873135
7 init pstorefs dir 77873135
8 init shell_data_file dir 77873135
9 init shell_data_file file 77873135
10 init shell_data_file lnk_file 77873135
11 init shell_data_file sock_file 77873135
12 init system_data_file chr_file 77873135
/system/chre/apps/wifi_offload/test/include/
Dutility.h58 void init(uint8_t &val, RandomGenerator &rand_gen);
59 void init(uint16_t &val, RandomGenerator &rand_gen);
60 void init(uint32_t &val, RandomGenerator &rand_gen);
61 void init(uint64_t &val, RandomGenerator &rand_gen);
62 void init(uint8_t *arr, size_t len, RandomGenerator &rand_gen);
63 void init(wifi_offload::Ssid &ssid, RandomGenerator &rand_gen);
64 void init(wifi_offload::PreferredNetwork &net_info, RandomGenerator &rand_gen);
65 void init(wifi_offload::ScanRecord &record, RandomGenerator &rand_gen);
66 void init(wifi_offload::RpcLogRecord &record, RandomGenerator &rand_gen);
67 void init(wifi_offload::ChannelHistogram &histo, RandomGenerator &rand_gen);
[all …]

12345678910>>...47