Searched refs:kernel (Results 1 – 25 of 195) sorted by relevance
12345678
/system/sepolicy/prebuilts/api/28.0/public/ |
D | kernel.te | 1 # Life begins with the kernel. 2 type kernel, domain, mlstrustedsubject; 4 allow kernel self:global_capability_class_set sys_nice; 7 r_dir_file(kernel, rootfs) 8 allow kernel proc_cmdline:file r_file_perms; 11 allow kernel selinuxfs:dir r_dir_perms; 12 allow kernel selinuxfs:file r_file_perms; 15 allow kernel file_contexts_file:file r_file_perms; 18 allow kernel rootfs:file relabelfrom; 19 allow kernel init_exec:file relabelto; [all …]
|
D | performanced.te | 16 # Performanced also shields unbound kernel threads. It scans every task in the 17 # root cpu set, but only affects the kernel threads. 18 r_dir_file(performanced, { appdomain bufferhubd kernel surfaceflinger }) 20 allow performanced { appdomain bufferhubd kernel surfaceflinger }:process setsched;
|
/system/sepolicy/public/ |
D | kernel.te | 1 # Life begins with the kernel. 2 type kernel, domain, mlstrustedsubject; 4 allow kernel self:global_capability_class_set sys_nice; 7 r_dir_file(kernel, rootfs) 8 allow kernel proc_cmdline:file r_file_perms; 11 allow kernel selinuxfs:dir r_dir_perms; 12 allow kernel selinuxfs:file r_file_perms; 15 allow kernel file_contexts_file:file r_file_perms; 18 allow kernel rootfs:file relabelfrom; 19 allow kernel init_exec:file relabelto; [all …]
|
D | performanced.te | 16 # Performanced also shields unbound kernel threads. It scans every task in the 17 # root cpu set, but only affects the kernel threads. 18 r_dir_file(performanced, { appdomain bufferhubd kernel surfaceflinger }) 20 allow performanced { appdomain bufferhubd kernel surfaceflinger }:process setsched;
|
/system/sepolicy/prebuilts/api/27.0/public/ |
D | kernel.te | 1 # Life begins with the kernel. 2 type kernel, domain, mlstrustedsubject; 4 allow kernel self:capability sys_nice; 7 r_dir_file(kernel, rootfs) 8 r_dir_file(kernel, proc) 11 allow kernel selinuxfs:dir r_dir_perms; 12 allow kernel selinuxfs:file r_file_perms; 15 allow kernel file_contexts_file:file r_file_perms; 18 allow kernel rootfs:file relabelfrom; 19 allow kernel init_exec:file relabelto; [all …]
|
D | performanced.te | 16 # Performanced also shields unbound kernel threads. It scans every task in the 17 # root cpu set, but only affects the kernel threads. 18 r_dir_file(performanced, { appdomain bufferhubd kernel surfaceflinger }) 20 allow performanced { appdomain bufferhubd kernel surfaceflinger }:process setsched;
|
D | update_engine.te | 20 dontaudit update_engine kernel:process setsched; 26 # Don't allow kernel module loading, just silence the logs. 27 dontaudit update_engine kernel:system module_request;
|
/system/sepolicy/prebuilts/api/26.0/public/ |
D | kernel.te | 1 # Life begins with the kernel. 2 type kernel, domain, mlstrustedsubject; 4 allow kernel self:capability sys_nice; 7 r_dir_file(kernel, rootfs) 8 r_dir_file(kernel, proc) 11 allow kernel selinuxfs:dir r_dir_perms; 12 allow kernel selinuxfs:file r_file_perms; 15 allow kernel file_contexts_file:file r_file_perms; 18 allow kernel rootfs:file relabelfrom; 19 allow kernel init_exec:file relabelto; [all …]
|
D | performanced.te | 11 # Performanced also shields unbound kernel threads. It scans every task in the 12 # root cpu set, but only affects the kernel threads. 13 r_dir_file(performanced, { appdomain bufferhubd kernel surfaceflinger }) 15 allow performanced { appdomain bufferhubd kernel surfaceflinger }:process setsched;
|
D | update_engine.te | 20 dontaudit update_engine kernel:process setsched; 26 # Don't allow kernel module loading, just silence the logs. 27 dontaudit update_engine kernel:system module_request;
|
/system/connectivity/wificond/net/kernel-header-latest/ |
D | README.txt | 3 This folder contains any wifi kernel header updates to the kernels running on 4 the latest devices, but not present in external/kernel-headers. 5 external/kernel-headers has the headers from the stable kernel tree which is generally 9 cp <kernel-dir>/private/msm-google/include/uapi/linux/nl80211.h 10 <android-source-dir>/system/connectivity/wificond/net/kernel-header-latest/nl80211.h 12 Last update from kernel branch: `p-dev-msm-bluecross-4.9`
|
/system/extras/libpagemap/ |
D | pagemap_test.cpp | 24 pm_kernel_t* kernel; in TEST() local 25 ASSERT_EQ(0, pm_kernel_create(&kernel)); in TEST() 28 ASSERT_EQ(0, pm_process_create(kernel, getpid(), &process)); in TEST() 47 pm_kernel_destroy(kernel); in TEST()
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | genfs_contexts | 20 genfscon proc /sys/kernel/core_pattern u:object_r:usermodehelper:s0 21 genfscon proc /sys/kernel/dmesg_restrict u:object_r:proc_security:s0 22 genfscon proc /sys/kernel/hotplug u:object_r:usermodehelper:s0 23 genfscon proc /sys/kernel/kptr_restrict u:object_r:proc_security:s0 24 genfscon proc /sys/kernel/modprobe u:object_r:usermodehelper:s0 25 genfscon proc /sys/kernel/modules_disabled u:object_r:proc_security:s0 26 genfscon proc /sys/kernel/perf_event_max_sample_rate u:object_r:proc_perf:s0 27 genfscon proc /sys/kernel/poweroff_cmd u:object_r:usermodehelper:s0 28 genfscon proc /sys/kernel/randomize_va_space u:object_r:proc_security:s0 29 genfscon proc /sys/kernel/usermodehelper u:object_r:usermodehelper:s0
|
D | kernel.te | 1 typeattribute kernel coredomain; 3 domain_auto_trans(kernel, init_exec, init)
|
D | file_contexts | 21 # For kernel modules 461 /sys/kernel/uevent_helper -- u:object_r:usermodehelper:s0 469 /sys/kernel/debug/mmc0(/.*)? u:object_r:debugfs_mmc:s0 474 /sys/kernel(/debug)?/tracing/buffer_size_kb u:object_r:trac… 475 /sys/kernel(/debug)?/tracing/events/binder/binder_locked/enable u:object_r:trac… 476 /sys/kernel(/debug)?/tracing/events/binder/binder_lock/enable u:object_r:trac… 477 /sys/kernel(/debug)?/tracing/events/binder/binder_transaction/enable u:object_r:trac… 478 /sys/kernel(/debug)?/tracing/events/binder/binder_transaction_received/enable u:object_r:trac… 479 /sys/kernel(/debug)?/tracing/events/binder/binder_unlock/enable u:object_r:trac… 480 /sys/kernel(/debug)?/tracing/events/cpufreq_interactive/enable u:object_r:trac… [all …]
|
/system/sepolicy/prebuilts/api/28.0/private/ |
D | kernel.te | 1 typeattribute kernel coredomain; 3 domain_auto_trans(kernel, init_exec, init)
|
D | genfs_contexts | 33 genfscon proc /sys/kernel/core_pattern u:object_r:usermodehelper:s0 34 genfscon proc /sys/kernel/core_pipe_limit u:object_r:usermodehelper:s0 35 genfscon proc /sys/kernel/domainname u:object_r:proc_hostname:s0 36 genfscon proc /sys/kernel/dmesg_restrict u:object_r:proc_security:s0 37 genfscon proc /sys/kernel/hostname u:object_r:proc_hostname:s0 38 genfscon proc /sys/kernel/hotplug u:object_r:usermodehelper:s0 39 genfscon proc /sys/kernel/hung_task_timeout_secs u:object_r:proc_hung_task:s0 40 genfscon proc /sys/kernel/kptr_restrict u:object_r:proc_security:s0 41 genfscon proc /sys/kernel/modprobe u:object_r:usermodehelper:s0 42 genfscon proc /sys/kernel/modules_disabled u:object_r:proc_security:s0 [all …]
|
D | initial_sid_contexts | 1 sid kernel u:r:kernel:s0 2 sid security u:object_r:kernel:s0
|
/system/sepolicy/prebuilts/api/27.0/private/ |
D | kernel.te | 1 typeattribute kernel coredomain; 3 domain_auto_trans(kernel, init_exec, init)
|
/system/sepolicy/private/ |
D | kernel.te | 1 typeattribute kernel coredomain; 3 domain_auto_trans(kernel, init_exec, init)
|
D | genfs_contexts | 33 genfscon proc /sys/kernel/core_pattern u:object_r:usermodehelper:s0 34 genfscon proc /sys/kernel/core_pipe_limit u:object_r:usermodehelper:s0 35 genfscon proc /sys/kernel/domainname u:object_r:proc_hostname:s0 36 genfscon proc /sys/kernel/dmesg_restrict u:object_r:proc_security:s0 37 genfscon proc /sys/kernel/hostname u:object_r:proc_hostname:s0 38 genfscon proc /sys/kernel/hotplug u:object_r:usermodehelper:s0 39 genfscon proc /sys/kernel/hung_task_timeout_secs u:object_r:proc_hung_task:s0 40 genfscon proc /sys/kernel/kptr_restrict u:object_r:proc_security:s0 41 genfscon proc /sys/kernel/modprobe u:object_r:usermodehelper:s0 42 genfscon proc /sys/kernel/modules_disabled u:object_r:proc_security:s0 [all …]
|
D | initial_sid_contexts | 1 sid kernel u:r:kernel:s0 2 sid security u:object_r:kernel:s0
|
/system/extras/boottime_tools/bootio/sepolicy/ |
D | domain.te | 1 # dontaudit bootio kernel:system module_request; 2 allow bootio kernel:fd use;
|
/system/core/logd/ |
D | README.auditd | 5 audit kernel subsystem. The audit subsystem of the kernel 9 kernel config:
|
/system/core/libion/ |
D | Android.bp | 12 "kernel-headers", 16 "kernel-headers",
|
12345678