Searched refs:sending (Results 1 – 25 of 28) sorted by relevance
12
/system/sepolicy/prebuilts/api/30.0/private/ |
D | heapprofd.te | 5 # process name), and sending the activation signal to them (+ setting system 24 # Necessary for /proc/[pid]/cmdline access & sending signals. 27 # Allow sending signals to processes. This excludes SIGKILL, SIGSTOP and
|
D | untrusted_app_29.te | 18 # allow binding to netlink route sockets and sending RTM_GETLINK messages.
|
D | radio.te | 19 # allow sending pulled atoms to statsd
|
D | untrusted_app_27.te | 40 # allow binding to netlink route sockets and sending RTM_GETLINK messages.
|
D | untrusted_app_25.te | 52 # allow binding to netlink route sockets and sending RTM_GETLINK messages.
|
D | untrusted_app_all.te | 174 # the profiler (which would be profiling the app that is sending the signal).
|
D | app_neverallows.te | 116 # Disallow sending RTM_GETLINK messages on netlink sockets.
|
/system/sepolicy/private/ |
D | heapprofd.te | 5 # process name), and sending the activation signal to them (+ setting system 24 # Necessary for /proc/[pid]/cmdline access & sending signals. 27 # Allow sending signals to processes. This excludes SIGKILL, SIGSTOP and
|
D | untrusted_app_29.te | 18 # allow binding to netlink route sockets and sending RTM_GETLINK messages.
|
D | radio.te | 33 # allow sending pulled atoms to statsd
|
D | untrusted_app_27.te | 40 # allow binding to netlink route sockets and sending RTM_GETLINK messages.
|
D | untrusted_app_25.te | 52 # allow binding to netlink route sockets and sending RTM_GETLINK messages.
|
D | untrusted_app_all.te | 170 # the profiler (which would be profiling the app that is sending the signal).
|
D | app_neverallows.te | 116 # Disallow sending RTM_GETLINK messages on netlink sockets.
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | heapprofd.te | 5 # process name), and sending the activation signal to them (+ setting system 24 # Necessary for /proc/[pid]/cmdline access & sending signals. 27 # Allow sending signals to processes. This excludes SIGKILL, SIGSTOP and
|
/system/chre/apps/wifi_offload/ |
D | README.md | 2 sending messages between wifi_offload nanoapp and offload HAL. This library is
|
/system/core/liblog/ |
D | README.protocol.md | 67 The header is added immediately before sending the log message to logd.
|
/system/core/adb/daemon/ |
D | file_sync_service.cpp | 665 bool sending = true; in recv_impl() local 666 while (sending) { in recv_impl() 698 sending = false; in recv_impl()
|
/system/nvram/ |
D | README.md | 47 their parameters in preparation for sending them elsewhere (e.g., a TEE) for
|
/system/core/adb/client/ |
D | file_sync_client.cpp | 670 bool sending = true; in SendLargeFile() local 671 while (sending) { in SendLargeFile() 704 sending = false; in SendLargeFile()
|
/system/libsysprop/srcs/android/sysprop/ |
D | TelephonyProperties.sysprop | 327 # Set to false to disable SMS sending, default is
|
/system/core/adb/ |
D | SERVICES.TXT | 164 sending it to the device (see interactive_shell() in commandline.c)
|
/system/sepolicy/prebuilts/api/27.0/public/ |
D | domain.te | 88 # Let everyone read log properties, so that liblog can avoid sending unloggable
|
/system/sepolicy/prebuilts/api/26.0/public/ |
D | domain.te | 88 # Let everyone read log properties, so that liblog can avoid sending unloggable
|
/system/sepolicy/public/ |
D | domain.te | 128 # Let everyone read log properties, so that liblog can avoid sending unloggable
|
12