Searched refs:access (Results 1 – 25 of 148) sorted by relevance
123456
/device/linaro/hikey/sepolicy/ |
D | hal_sensors.te | 1 #Allow access to nanohub device 7 # Allow access to saved settings file and nanohub_lock dir/file 11 # Allow access to sensor properties 14 # Allow access to gralloc shared memory (ion), for sensor direct report 21 # allow access to detect change in /dev folder
|
D | system_server.te | 1 # TODO(b/73123675): BatterySaver needs access to cpufreq. Remove this access
|
/device/google/crosshatch-sepolicy/vendor/qcom/common/ |
D | easel.te | 11 # access easel dev nodes 16 # access easel thermal sysfs 21 # access "/proc/stat" 31 # access to keychain for kernel based authentication
|
D | hal_camera.te | 10 # access to /dev/input/event{5,10} 26 # access vd6281 rainbow sensor files 50 # access easel dev nodes 54 # access hexagon
|
D | hal_wlc.te | 10 # Allow access to /sys/class/power_supply/wireless 13 # Allow access to /sys/devices/platform/soc/a88000.i2c/i2c-0/0-0061
|
D | hal_wifi_ext.te | 1 # Allow wifi hal access to LOWI 23 # Allow wifi hal to access wlan debugfs files and directories
|
D | hal_wifi_default.te | 1 # Allow wifi hal access to LOWI 23 # Allow wifi hal to access wlan debugfs files and directories
|
/device/google/bonito-sepolicy/vendor/qcom/common/ |
D | easel.te | 11 # access easel dev nodes 16 # access easel thermal sysfs 21 # access "/proc/stat" 31 # access to keychain for kernel based authentication
|
D | hal_camera.te | 10 # access to /dev/input/event{5,10} 26 # access vd6281 rainbow sensor files 50 # access easel dev nodes 54 # access hexagon
|
D | hal_wlc.te | 10 # Allow access to /sys/class/power_supply/wireless 13 # Allow access to /sys/devices/platform/soc/a88000.i2c/i2c-0/0-0061
|
D | hal_wifi_default.te | 1 # Allow wifi hal access to LOWI 20 # Allow wifi hal to access wlan debugfs files and directories
|
D | hal_wifi_ext.te | 1 # Allow wifi hal access to LOWI 23 # Allow wifi hal to access wlan debugfs files and directories
|
/device/google/vrservices/vrcore/sepolicy_mtc/ |
D | vrcore_app.te | 7 # allow vrcore to access dsp 11 # allow vrcore to access sensor service 15 # allow vrcore to access /persist/tango/calibration.xml
|
/device/google/wahoo/sepolicy/vendor/ |
D | hal_camera.te | 5 # access to /dev/input/event{5,10} 24 # Grant access to Qualcomm MSM Interface (QMI) radio sockets 37 # access easel dev nodes 41 # access hexagon
|
D | hal_power_stats_default.te | 1 # power.stats HAL needs access to rpm, and wlan sysfs nodes in /d/ 6 # power.stats HAL needs access to the easel sysfs node
|
D | hal_wifi_default.te | 1 # Allow wifi hal access to LOWI 23 # Allow wifi hal to access wlan debugfs files and directories
|
/device/linaro/hikey/hifi/xaf/hifi-dpf/core/ |
D | xf-io.c | 76 port->filled = 0, port->access = NULL; in xf_input_port_init() 118 port->access = m->buffer, port->remaining = m->length; in xf_input_port_put() 121 (!port->access ? port->flags ^= XF_INPUT_FLAG_EOS | XF_INPUT_FLAG_DONE : 0); in xf_input_port_put() 149 port->access = m->buffer, port->remaining = m->length; in xf_input_port_complete() 157 port->access = NULL; in xf_input_port_complete() 213 BUG(!port->access, _x("invalid port state")); in xf_input_port_fill() 216 memcpy(port->buffer + filled, port->access, k), port->access += k; in xf_input_port_fill() 273 if (xf_msg_queue_head(&port->queue) && !port->access) in xf_input_port_consume() 286 port->access += n; in xf_input_port_consume() 321 port->filled = 0, port->access = NULL; in xf_input_port_purge()
|
/device/google/coral-sepolicy/vendor/google/ |
D | google_camera_app.te | 4 ## it has access to hardware accelerators such as Hexagon and Airbrush. 6 ## This policy defines the extra rules necessary for that access. 8 ## Untrusted_app_domain disallows access to new HW services, and since 67 ## Allow access to Airbrush HIDL service for power management and access arbitration 72 # Much of Airbrush usage still needs to be done via direct access to kernel devices 80 # Read adsp files, for Hexagon access
|
/device/google/coral-sepolicy/private/ |
D | google_camera_app.te | 4 ## it has access to hardware accelerators such as Hexagon and Airbrush. 6 ## This policy defines the extra rules necessary for that access, 9 # Duplicate all access that normal untrusted_app has, except for untrusted_app_domain
|
/device/google/coral-sepolicy/vendor/qcom/common/ |
D | factory_ota_app.te | 9 # So Factory OTA client need read / write and create file access right for this folder 20 # For get access WiFi manager service 26 #For access update engine function
|
D | hal_display_color.te | 10 # Rule for display color to access graphics composer process 13 # Allow hal_display_color_default access hw service
|
D | hal_wifi_ext.te | 3 # Allow wifi hal access to LOWI 21 # Allow wifi hal to access wlan debugfs directories
|
D | hal_wifi_default.te | 3 # Allow wifi hal access to LOWI 24 # Allow wifi hal to access wlan debugfs directories
|
D | hal_graphics_composer_default.te | 11 #allow composer to access /mnt/vendor/persist/display/ 16 #allow composer access hal_light
|
D | rild.te | 6 #Allow access to netmgrd socket 23 #Fix the avc denied for QCRILD QtiBusSocketTransport access b/131700006
|
123456