Home
last modified time | relevance | path

Searched refs:access (Results 1 – 25 of 148) sorted by relevance

123456

/device/linaro/hikey/sepolicy/
Dhal_sensors.te1 #Allow access to nanohub device
7 # Allow access to saved settings file and nanohub_lock dir/file
11 # Allow access to sensor properties
14 # Allow access to gralloc shared memory (ion), for sensor direct report
21 # allow access to detect change in /dev folder
Dsystem_server.te1 # TODO(b/73123675): BatterySaver needs access to cpufreq. Remove this access
/device/google/crosshatch-sepolicy/vendor/qcom/common/
Deasel.te11 # access easel dev nodes
16 # access easel thermal sysfs
21 # access "/proc/stat"
31 # access to keychain for kernel based authentication
Dhal_camera.te10 # access to /dev/input/event{5,10}
26 # access vd6281 rainbow sensor files
50 # access easel dev nodes
54 # access hexagon
Dhal_wlc.te10 # Allow access to /sys/class/power_supply/wireless
13 # Allow access to /sys/devices/platform/soc/a88000.i2c/i2c-0/0-0061
Dhal_wifi_ext.te1 # Allow wifi hal access to LOWI
23 # Allow wifi hal to access wlan debugfs files and directories
Dhal_wifi_default.te1 # Allow wifi hal access to LOWI
23 # Allow wifi hal to access wlan debugfs files and directories
/device/google/bonito-sepolicy/vendor/qcom/common/
Deasel.te11 # access easel dev nodes
16 # access easel thermal sysfs
21 # access "/proc/stat"
31 # access to keychain for kernel based authentication
Dhal_camera.te10 # access to /dev/input/event{5,10}
26 # access vd6281 rainbow sensor files
50 # access easel dev nodes
54 # access hexagon
Dhal_wlc.te10 # Allow access to /sys/class/power_supply/wireless
13 # Allow access to /sys/devices/platform/soc/a88000.i2c/i2c-0/0-0061
Dhal_wifi_default.te1 # Allow wifi hal access to LOWI
20 # Allow wifi hal to access wlan debugfs files and directories
Dhal_wifi_ext.te1 # Allow wifi hal access to LOWI
23 # Allow wifi hal to access wlan debugfs files and directories
/device/google/vrservices/vrcore/sepolicy_mtc/
Dvrcore_app.te7 # allow vrcore to access dsp
11 # allow vrcore to access sensor service
15 # allow vrcore to access /persist/tango/calibration.xml
/device/google/wahoo/sepolicy/vendor/
Dhal_camera.te5 # access to /dev/input/event{5,10}
24 # Grant access to Qualcomm MSM Interface (QMI) radio sockets
37 # access easel dev nodes
41 # access hexagon
Dhal_power_stats_default.te1 # power.stats HAL needs access to rpm, and wlan sysfs nodes in /d/
6 # power.stats HAL needs access to the easel sysfs node
Dhal_wifi_default.te1 # Allow wifi hal access to LOWI
23 # Allow wifi hal to access wlan debugfs files and directories
/device/linaro/hikey/hifi/xaf/hifi-dpf/core/
Dxf-io.c76 port->filled = 0, port->access = NULL; in xf_input_port_init()
118 port->access = m->buffer, port->remaining = m->length; in xf_input_port_put()
121 (!port->access ? port->flags ^= XF_INPUT_FLAG_EOS | XF_INPUT_FLAG_DONE : 0); in xf_input_port_put()
149 port->access = m->buffer, port->remaining = m->length; in xf_input_port_complete()
157 port->access = NULL; in xf_input_port_complete()
213 BUG(!port->access, _x("invalid port state")); in xf_input_port_fill()
216 memcpy(port->buffer + filled, port->access, k), port->access += k; in xf_input_port_fill()
273 if (xf_msg_queue_head(&port->queue) && !port->access) in xf_input_port_consume()
286 port->access += n; in xf_input_port_consume()
321 port->filled = 0, port->access = NULL; in xf_input_port_purge()
/device/google/coral-sepolicy/vendor/google/
Dgoogle_camera_app.te4 ## it has access to hardware accelerators such as Hexagon and Airbrush.
6 ## This policy defines the extra rules necessary for that access.
8 ## Untrusted_app_domain disallows access to new HW services, and since
67 ## Allow access to Airbrush HIDL service for power management and access arbitration
72 # Much of Airbrush usage still needs to be done via direct access to kernel devices
80 # Read adsp files, for Hexagon access
/device/google/coral-sepolicy/private/
Dgoogle_camera_app.te4 ## it has access to hardware accelerators such as Hexagon and Airbrush.
6 ## This policy defines the extra rules necessary for that access,
9 # Duplicate all access that normal untrusted_app has, except for untrusted_app_domain
/device/google/coral-sepolicy/vendor/qcom/common/
Dfactory_ota_app.te9 # So Factory OTA client need read / write and create file access right for this folder
20 # For get access WiFi manager service
26 #For access update engine function
Dhal_display_color.te10 # Rule for display color to access graphics composer process
13 # Allow hal_display_color_default access hw service
Dhal_wifi_ext.te3 # Allow wifi hal access to LOWI
21 # Allow wifi hal to access wlan debugfs directories
Dhal_wifi_default.te3 # Allow wifi hal access to LOWI
24 # Allow wifi hal to access wlan debugfs directories
Dhal_graphics_composer_default.te11 #allow composer to access /mnt/vendor/persist/display/
16 #allow composer access hal_light
Drild.te6 #Allow access to netmgrd socket
23 #Fix the avc denied for QCRILD QtiBusSocketTransport access b/131700006

123456