Home
last modified time | relevance | path

Searched refs:kernel (Results 1 – 25 of 382) sorted by relevance

12345678910>>...16

/system/sepolicy/prebuilts/api/28.0/public/
Dkernel.te1 # Life begins with the kernel.
2 type kernel, domain, mlstrustedsubject;
4 allow kernel self:global_capability_class_set sys_nice;
7 r_dir_file(kernel, rootfs)
8 allow kernel proc_cmdline:file r_file_perms;
11 allow kernel selinuxfs:dir r_dir_perms;
12 allow kernel selinuxfs:file r_file_perms;
15 allow kernel file_contexts_file:file r_file_perms;
18 allow kernel rootfs:file relabelfrom;
19 allow kernel init_exec:file relabelto;
[all …]
Dperformanced.te16 # Performanced also shields unbound kernel threads. It scans every task in the
17 # root cpu set, but only affects the kernel threads.
18 r_dir_file(performanced, { appdomain bufferhubd kernel surfaceflinger })
20 allow performanced { appdomain bufferhubd kernel surfaceflinger }:process setsched;
/system/sepolicy/prebuilts/api/27.0/public/
Dkernel.te1 # Life begins with the kernel.
2 type kernel, domain, mlstrustedsubject;
4 allow kernel self:capability sys_nice;
7 r_dir_file(kernel, rootfs)
8 r_dir_file(kernel, proc)
11 allow kernel selinuxfs:dir r_dir_perms;
12 allow kernel selinuxfs:file r_file_perms;
15 allow kernel file_contexts_file:file r_file_perms;
18 allow kernel rootfs:file relabelfrom;
19 allow kernel init_exec:file relabelto;
[all …]
Dperformanced.te16 # Performanced also shields unbound kernel threads. It scans every task in the
17 # root cpu set, but only affects the kernel threads.
18 r_dir_file(performanced, { appdomain bufferhubd kernel surfaceflinger })
20 allow performanced { appdomain bufferhubd kernel surfaceflinger }:process setsched;
/system/sepolicy/prebuilts/api/29.0/public/
Dkernel.te1 # Life begins with the kernel.
2 type kernel, domain, mlstrustedsubject;
4 allow kernel self:global_capability_class_set sys_nice;
7 r_dir_file(kernel, rootfs)
8 allow kernel proc_cmdline:file r_file_perms;
11 allow kernel selinuxfs:dir r_dir_perms;
12 allow kernel selinuxfs:file r_file_perms;
15 allow kernel file_contexts_file:file r_file_perms;
18 allow kernel rootfs:file relabelfrom;
19 allow kernel init_exec:file relabelto;
[all …]
/system/sepolicy/prebuilts/api/26.0/public/
Dkernel.te1 # Life begins with the kernel.
2 type kernel, domain, mlstrustedsubject;
4 allow kernel self:capability sys_nice;
7 r_dir_file(kernel, rootfs)
8 r_dir_file(kernel, proc)
11 allow kernel selinuxfs:dir r_dir_perms;
12 allow kernel selinuxfs:file r_file_perms;
15 allow kernel file_contexts_file:file r_file_perms;
18 allow kernel rootfs:file relabelfrom;
19 allow kernel init_exec:file relabelto;
[all …]
Dperformanced.te11 # Performanced also shields unbound kernel threads. It scans every task in the
12 # root cpu set, but only affects the kernel threads.
13 r_dir_file(performanced, { appdomain bufferhubd kernel surfaceflinger })
15 allow performanced { appdomain bufferhubd kernel surfaceflinger }:process setsched;
/system/sepolicy/public/
Dkernel.te1 # Life begins with the kernel.
2 type kernel, domain, mlstrustedsubject;
4 allow kernel self:global_capability_class_set sys_nice;
7 r_dir_file(kernel, rootfs)
8 allow kernel proc_cmdline:file r_file_perms;
11 allow kernel selinuxfs:dir r_dir_perms;
12 allow kernel selinuxfs:file r_file_perms;
15 allow kernel file_contexts_file:file r_file_perms;
18 allow kernel rootfs:file relabelfrom;
19 allow kernel init_exec:file relabelto;
[all …]
/system/sepolicy/prebuilts/api/30.0/public/
Dkernel.te1 # Life begins with the kernel.
2 type kernel, domain, mlstrustedsubject;
4 allow kernel self:global_capability_class_set sys_nice;
7 r_dir_file(kernel, rootfs)
8 allow kernel proc_cmdline:file r_file_perms;
11 allow kernel selinuxfs:dir r_dir_perms;
12 allow kernel selinuxfs:file r_file_perms;
15 allow kernel file_contexts_file:file r_file_perms;
18 allow kernel rootfs:file relabelfrom;
19 allow kernel init_exec:file relabelto;
[all …]
/system/netd/
DTEST_MAPPING11 "keywords": ["netd-device-kernel-4.9", "netd-device-kernel-4.14"]},
13 "keywords": ["netd-device-kernel-4.9", "netd-device-kernel-4.14"]},
15 "keywords": ["netd-device-kernel-4.9", "netd-device-kernel-4.14"]}
/system/connectivity/wificond/net/kernel-header-latest/
DREADME.txt3 This folder contains any wifi kernel header updates to the kernels running on
4 the latest devices, but not present in external/kernel-headers.
5 external/kernel-headers has the headers from the stable kernel tree which is generally
9 cp <kernel-dir>/private/msm-google/include/uapi/linux/nl80211.h
10 <android-source-dir>/system/connectivity/wificond/net/kernel-header-latest/nl80211.h
12 Last update from kernel branch: `p-dev-msm-bluecross-4.9`
/system/sepolicy/private/
Dkernel.te1 typeattribute kernel coredomain;
3 domain_auto_trans(kernel, init_exec, init)
5 # Allow the kernel to read otapreopt_chroot's file descriptors and files under
7 allow kernel otapreopt_chroot:fd use;
8 allow kernel postinstall_file:file read;
Dfsverity_init.te9 # Kernel only prints the keys that can be accessed and only kernel keyring is needed here.
12 allow fsverity_init kernel:key { view search write setattr };
18 # When kernel requests an algorithm, the crypto API first looks for an
19 # already registered algorithm with that name. If it fails, the kernel creates
21 dontaudit fsverity_init kernel:system module_request;
/system/sepolicy/prebuilts/api/29.0/private/
Dkernel.te1 typeattribute kernel coredomain;
3 domain_auto_trans(kernel, init_exec, init)
5 # Allow the kernel to read otapreopt_chroot's file descriptors and files under
7 allow kernel otapreopt_chroot:fd use;
8 allow kernel postinstall_file:file read;
Dfsverity_init.te13 # Kernel only prints the keys that can be accessed and only kernel keyring is needed here.
16 allow fsverity_init kernel:key { view search write setattr };
22 # When kernel requests an algorithm, the crypto API first looks for an
23 # already registered algorithm with that name. If it fails, the kernel creates
25 dontaudit fsverity_init kernel:system module_request;
/system/sepolicy/prebuilts/api/30.0/private/
Dkernel.te1 typeattribute kernel coredomain;
3 domain_auto_trans(kernel, init_exec, init)
5 # Allow the kernel to read otapreopt_chroot's file descriptors and files under
7 allow kernel otapreopt_chroot:fd use;
8 allow kernel postinstall_file:file read;
Dfsverity_init.te9 # Kernel only prints the keys that can be accessed and only kernel keyring is needed here.
12 allow fsverity_init kernel:key { view search write setattr };
18 # When kernel requests an algorithm, the crypto API first looks for an
19 # already registered algorithm with that name. If it fails, the kernel creates
21 dontaudit fsverity_init kernel:system module_request;
/system/core/fastboot/
Dbootimg_utils.cpp50 static boot_img_hdr_v3* mkbootimg_v3(const std::vector<char>& kernel, in mkbootimg_v3() argument
55 int64_t kernel_actual = (kernel.size() + page_mask) & (~page_mask); in mkbootimg_v3()
64 hdr->kernel_size = kernel.size(); in mkbootimg_v3()
70 memcpy(hdr->magic + V3_PAGE_SIZE, kernel.data(), kernel.size()); in mkbootimg_v3()
76 boot_img_hdr_v2* mkbootimg(const std::vector<char>& kernel, const std::vector<char>& ramdisk, in mkbootimg() argument
83 return reinterpret_cast<boot_img_hdr_v2*>(mkbootimg_v3(kernel, ramdisk, src, out)); in mkbootimg()
88 int64_t kernel_actual = (kernel.size() + page_mask) & (~page_mask); in mkbootimg()
102 hdr->kernel_size = kernel.size(); in mkbootimg()
119 memcpy(hdr->magic + hdr->page_size, kernel.data(), kernel.size()); in mkbootimg()
/system/core/llkd/
Dllkd.rc26 write /proc/sys/kernel/hung_task_timeout_secs ${ro.khungtask.timeout:-720}
27 write /proc/sys/kernel/hung_task_warnings 65535
28 write /proc/sys/kernel/hung_task_check_count 65535
29 write /proc/sys/kernel/hung_task_panic 1
32 write /proc/sys/kernel/hung_task_panic 0
/system/libvintf/
DCompatibilityMatrix.cpp48 bool CompatibilityMatrix::addKernel(MatrixKernel&& kernel, std::string* error) { in addKernel() argument
56 if (kernel.getSourceMatrixLevel() == Level::UNSPECIFIED) { in addKernel()
57 kernel.setSourceMatrixLevel(level()); in addKernel()
62 if (it->getSourceMatrixLevel() != kernel.getSourceMatrixLevel()) { in addKernel()
65 if (it->minLts() == kernel.minLts()) { in addKernel()
68 if (it->minLts().dropMinor() == kernel.minLts().dropMinor()) { in addKernel()
71 to_string(kernel.getSourceMatrixLevel()) + ", cannot add " + in addKernel()
72 to_string(kernel.minLts()) + " because " + to_string(it->minLts()) + in addKernel()
84 if (kernel.conditions().empty()) { in addKernel()
88 const auto& configs = kernel.configs(); in addKernel()
[all …]
/system/sepolicy/prebuilts/api/26.0/private/
Dgenfs_contexts20 genfscon proc /sys/kernel/core_pattern u:object_r:usermodehelper:s0
21 genfscon proc /sys/kernel/dmesg_restrict u:object_r:proc_security:s0
22 genfscon proc /sys/kernel/hotplug u:object_r:usermodehelper:s0
23 genfscon proc /sys/kernel/kptr_restrict u:object_r:proc_security:s0
24 genfscon proc /sys/kernel/modprobe u:object_r:usermodehelper:s0
25 genfscon proc /sys/kernel/modules_disabled u:object_r:proc_security:s0
26 genfscon proc /sys/kernel/perf_event_max_sample_rate u:object_r:proc_perf:s0
27 genfscon proc /sys/kernel/poweroff_cmd u:object_r:usermodehelper:s0
28 genfscon proc /sys/kernel/randomize_va_space u:object_r:proc_security:s0
29 genfscon proc /sys/kernel/usermodehelper u:object_r:usermodehelper:s0
Dkernel.te1 typeattribute kernel coredomain;
3 domain_auto_trans(kernel, init_exec, init)
/system/sepolicy/prebuilts/api/28.0/private/
Dkernel.te1 typeattribute kernel coredomain;
3 domain_auto_trans(kernel, init_exec, init)
/system/sepolicy/prebuilts/api/27.0/private/
Dkernel.te1 typeattribute kernel coredomain;
3 domain_auto_trans(kernel, init_exec, init)
/system/extras/boottime_tools/bootio/sepolicy/
Ddomain.te1 # dontaudit bootio kernel:system module_request;
2 allow bootio kernel:fd use;

12345678910>>...16