Lines Matching refs:write

30 allow appdomain cgroup:dir { search write };
45 allow appdomain zygote:fifo_file write;
48 # Allow apps to create and write method traces in /data/misc/trace.
58 allow appdomain devpts:chr_file { getattr read write ioctl };
63 allow appdomain system_server:unix_stream_socket { read write setopt getattr getopt shutdown };
64 allow appdomain system_server:tcp_socket { read write getattr getopt shutdown };
70 allow appdomain surfaceflinger:unix_stream_socket { read write setopt getattr getopt shutdown };
126 # Read/write wallpaper file (opened by system).
127 allow appdomain wallpaper_file:file { getattr read write };
129 # Read/write cached ringtones (opened by system).
130 allow appdomain ringtone_file:file { getattr read write };
149 # Allow apps to connect and write to the tombstoned java trace socket in
160 allow appdomain dumpstate:unix_stream_socket { read write getopt getattr shutdown };
161 allow appdomain dumpstate:fifo_file { write getattr };
162 allow appdomain shell_data_file:file { write getattr };
165 allow appdomain user_profile_data_file:dir { search write add_name };
210 allow appdomain appdomain:unix_stream_socket { getopt getattr read write shutdown };
214 allow appdomain backup_data_file:file { read write getattr };
215 allow appdomain cache_backup_file:file { read write getattr };
224 # Read and write /data/data/com.android.providers.telephony files passed over Binder.
225 allow { appdomain -isolated_app } radio_data_file:file { read write getattr };
234 # Read/write visible storage
245 # File write access allowed for FDs returned through Storage Access Framework
254 allow { appdomain -isolated_app -ephemeral_app } usb_device:chr_file { read write getattr ioctl };
255 allow { appdomain -isolated_app -ephemeral_app } usbaccessory_device:chr_file { read write getattr …
276 # application inherit logd write socket (urge is to deprecate this long term)
277 allow appdomain zygote:unix_dgram_socket write;
283 allow appdomain console_device:chr_file { read write };
290 # TODO is write really necessary ?
291 auditallow { appdomain userdebug_or_eng(`-su') } ion_device:chr_file { write append };
312 allow appdomain app_fuse_file:file { getattr read append write };
332 allow { appdomain -isolated_app -ephemeral_app } tun_device:chr_file { read write getattr ioctl app…
338 allow appdomain adbd:unix_stream_socket { getattr getopt ioctl read write shutdown };
357 neverallow appdomain dev_type:blk_file { read write };
367 }:chr_file { read write };
370 neverallow { untrusted_app isolated_app shell } graphics_device:chr_file { read write };
373 { read write };
375 { read write };
376 neverallow appdomain tee_device:chr_file { read write };
391 neverallow appdomain domain:netlink_kobject_uevent_socket { write append };
394 neverallow appdomain socket_device:sock_file write;
397 neverallow appdomain adbd_socket:sock_file write;
398 neverallow { appdomain -radio } rild_socket:sock_file write;
399 neverallow appdomain vold_socket:sock_file write;
400 neverallow appdomain zygote_socket:sock_file write;
406 neverallow appdomain { domain -appdomain }:file write;
425 { create write setattr relabelfrom relabelto append unlink link rename };
429 { create write setattr relabelfrom relabelto append unlink link rename };
433 { create write setattr relabelfrom relabelto append unlink link rename };
440 { create write setattr relabelfrom relabelto append unlink link rename };
444 { create write setattr relabelfrom relabelto append unlink link rename };
447 { create write setattr relabelfrom relabelto append unlink link rename };
450 { create write setattr relabelfrom relabelto append unlink link rename };
453 { create write setattr relabelfrom relabelto append unlink link rename };
456 { create write setattr relabelfrom relabelto append unlink link rename };
462 { create write setattr relabelfrom relabelto append unlink link rename };
465 { create write setattr relabelfrom relabelto append unlink link rename };
468 { create write setattr relabelfrom relabelto append unlink link rename };
471 { create write setattr relabelfrom relabelto append unlink link rename };
474 { create write setattr relabelfrom relabelto append unlink link rename };
484 neverallow appdomain efs_file:dir_file_class_set write;
489 sysfs:dir_file_class_set write;
491 proc:dir_file_class_set write;