Lines Matching refs:write

26 allow appdomain cgroup:dir { search write };
41 allow appdomain zygote:fifo_file write;
44 # Allow apps to create and write method traces in /data/misc/trace.
54 allow appdomain devpts:chr_file { getattr read write ioctl };
59 allow appdomain system_server:unix_stream_socket { read write setopt getattr getopt shutdown };
60 allow appdomain system_server:tcp_socket { read write getattr getopt shutdown };
66 allow appdomain surfaceflinger:unix_stream_socket { read write setopt getattr getopt shutdown };
122 # Read/write wallpaper file (opened by system).
123 allow appdomain wallpaper_file:file { getattr read write };
125 # Read/write cached ringtones (opened by system).
126 allow appdomain ringtone_file:file { getattr read write };
145 # Allow apps to connect and write to the tombstoned java trace socket in
157 allow appdomain dumpstate:unix_stream_socket { read write getopt getattr shutdown };
158 allow appdomain dumpstate:fifo_file { write getattr };
159 allow appdomain shell_data_file:file { write getattr };
163 allow appdomain incidentd:fifo_file { write getattr };
166 allow appdomain user_profile_data_file:dir { search write add_name };
235 allow appdomain appdomain:unix_stream_socket { getopt getattr read write shutdown };
239 allow appdomain backup_data_file:file { read write getattr };
240 allow appdomain cache_backup_file:file { read write getattr };
249 # Read and write /data/data/com.android.providers.telephony files passed over Binder.
250 allow { appdomain -isolated_app } radio_data_file:file { read write getattr };
259 # Read/write visible storage
272 allow { appdomain -isolated_app -ephemeral_app } usb_device:chr_file { read write getattr ioctl };
273 allow { appdomain -isolated_app -ephemeral_app } usbaccessory_device:chr_file { read write getattr …
294 # application inherit logd write socket (urge is to deprecate this long term)
295 allow appdomain zygote:unix_dgram_socket write;
301 allow appdomain console_device:chr_file { read write };
308 # TODO is write really necessary ?
309 auditallow { appdomain userdebug_or_eng(`-su') } ion_device:chr_file { write append };
330 allow appdomain app_fuse_file:file { getattr read append write };
350 allow { appdomain -isolated_app -ephemeral_app } tun_device:chr_file { read write getattr ioctl app…
356 allow appdomain adbd:unix_stream_socket { getattr getopt ioctl read write shutdown };
374 neverallow appdomain dev_type:blk_file { read write };
384 }:chr_file { read write };
387 neverallow { untrusted_app isolated_app shell } graphics_device:chr_file { read write };
390 { read write };
392 { read write };
393 neverallow appdomain tee_device:chr_file { read write };
408 neverallow appdomain domain:netlink_kobject_uevent_socket { write append };
411 neverallow appdomain socket_device:sock_file write;
414 neverallow appdomain adbd_socket:sock_file write;
415 neverallow { appdomain -radio } rild_socket:sock_file write;
416 neverallow appdomain zygote_socket:sock_file write;
421 # Read or write access to /proc/pid entries for any non-app domain.
443 { create write setattr relabelfrom relabelto append unlink link rename };
447 { create write setattr relabelfrom relabelto append unlink link rename };
451 { create write setattr relabelfrom relabelto append unlink link rename };
458 { create write setattr relabelfrom relabelto append unlink link rename };
462 { create write setattr relabelfrom relabelto append unlink link rename };
465 { create write setattr relabelfrom relabelto append unlink link rename };
468 { create write setattr relabelfrom relabelto append unlink link rename };
471 { create write setattr relabelfrom relabelto append unlink link rename };
474 { create write setattr relabelfrom relabelto append unlink link rename };
480 { create write setattr relabelfrom relabelto append unlink link rename };
483 { create write setattr relabelfrom relabelto append unlink link rename };
486 { create write setattr relabelfrom relabelto append unlink link rename };
489 { create write setattr relabelfrom relabelto append unlink link rename };
492 { create write setattr relabelfrom relabelto append unlink link rename };
502 neverallow appdomain efs_file:dir_file_class_set write;
507 sysfs:dir_file_class_set write;
509 proc:dir_file_class_set write;