/device/google/bonito-sepolicy/vendor/qcom/common/ |
D | hal_dumpstate_impl.te | 8 allow hal_dumpstate_impl vendor_shell_exec:file rx_file_perms; 9 allow hal_dumpstate_impl vendor_toolbox_exec:file rx_file_perms; 11 # Allow to read pixel-trace trace file 13 allow hal_dumpstate_impl debugfs_tracing_instances:file r_file_perms; 19 allow hal_dumpstate_impl netmgr_data_file:file r_file_perms; 21 allow hal_dumpstate_impl sysfs_usb_device:file r_file_perms; 23 allow hal_dumpstate_impl ssr_log_file:file r_file_perms; 25 allow hal_dumpstate_impl tcpdump_vendor_data_file:file create_file_perms; 30 allow hal_dumpstate_impl perfstatsd_exec:file rx_file_perms; 37 allow hal_dumpstate_impl sensors_vendor_data_file:file r_file_perms; [all …]
|
D | ueventd.te | 1 allow ueventd sysfs_thermal:file w_file_perms; 2 allow ueventd sysfs_leds:file w_file_perms; 3 allow ueventd sysfs_camera:file w_file_perms; 4 allow ueventd sysfs_easel:file w_file_perms; 5 allow ueventd sysfs_fingerprint:file w_file_perms; 6 allow ueventd sysfs_graphics:file w_file_perms; 7 allow ueventd sysfs_laser:file w_file_perms; 8 allow ueventd sysfs_rmtfs:file w_file_perms; 9 allow ueventd sysfs_scsi_devices_0000:file write; 10 allow ueventd sysfs_soc:file w_file_perms; [all …]
|
D | init-devstart-sh.te | 6 allow init-qcom-devstart-sh vendor_shell_exec:file rx_file_perms; 7 allow init-qcom-devstart-sh vendor_toolbox_exec:file rx_file_perms; 10 allow init-qcom-devstart-sh vendor_file:file rx_file_perms; 18 allow init-qcom-devstart-sh sysfs_msm_subsys:file w_file_perms; 21 allow init-qcom-devstart-sh sysfs_chargelevel:file rw_file_perms; 27 allow init-qcom-devstart-sh sysfs_pinctrl:file rw_file_perms; 28 allow init-qcom-devstart-sh sysfs_gpio_export:file w_file_perms; 30 allow init-qcom-devstart-sh sysfs_soc:file r_file_perms; 32 allow init-qcom-devstart-sh sysfs_msm_subsys:file r_file_perms; 33 allow init-qcom-devstart-sh sysfs_scsi_devices_0000:file r_file_perms; [all …]
|
D | hardware_info_app.te | 6 allow hardware_info_app app_data_file:file execute; 13 allow hardware_info_app shell_data_file:file { open read }; 17 allow hardware_info_app sysfs_batteryinfo:file { getattr open read }; 19 allow hardware_info_app sysfs_camera:file { getattr open read }; 22 allow hardware_info_app sysfs_mmc:file r_file_perms; 24 allow hardware_info_app sysfs_soc:file { getattr open read }; 26 allow hardware_info_app sysfs_display:file { getattr open read };
|
D | wcnss_service.te | 12 allow wcnss_service vendor_shell_exec:file rx_file_perms; 13 allow wcnss_service vendor_toolbox_exec:file rx_file_perms; 15 allow wcnss_service proc_net:file w_file_perms; 24 allow wcnss_service cnss_vendor_data_file:file create_file_perms; 26 allow wcnss_service proc_net:file getattr; 32 allow wcnss_service wifi_vendor_log_data_file:file create_file_perms; 37 allow wcnss_service sysfs_soc:file r_file_perms; 41 # used for collecting the sku for radio for BDF file selection
|
D | hal_fingerprint.te | 2 allow hal_fingerprint sysfs_fingerprint:file rw_file_perms; 4 allow hal_fingerprint sysfs_msm_subsys:file r_file_perms; 6 allow hal_fingerprint sysfs_camera:file r_file_perms; 8 allow hal_fingerprint sysfs_leds:file r_file_perms; 10 allow hal_fingerprint sysfs_pinctrl:file r_file_perms; 12 allow hal_fingerprint tee_device:file rw_file_perms;
|
/device/google/coral-sepolicy/vendor/google/ |
D | hal_dumpstate_impl.te | 8 allow hal_dumpstate_impl vendor_shell_exec:file rx_file_perms; 9 allow hal_dumpstate_impl vendor_toolbox_exec:file rx_file_perms; 13 allow hal_dumpstate_impl sysfs_touch:file rw_file_perms; 14 allow hal_dumpstate_impl proc_touch:file rw_file_perms; 17 allow hal_dumpstate_impl debugfs_f2fs:file r_file_perms; 19 allow hal_dumpstate_impl debugfs_ufs:file r_file_perms; 21 allow hal_dumpstate_impl debugfs_ipc:file r_file_perms; 23 allow hal_dumpstate_impl proc_f2fs:file r_file_perms; 27 allow hal_dumpstate_impl sysfs_display:file r_file_perms; 31 allow hal_dumpstate_impl sysfs_scsi_devices_0000:file r_file_perms; [all …]
|
/device/google/crosshatch-sepolicy/vendor/qcom/common/ |
D | hal_dumpstate_impl.te | 8 allow hal_dumpstate_impl vendor_shell_exec:file rx_file_perms; 9 allow hal_dumpstate_impl vendor_toolbox_exec:file rx_file_perms; 11 # Allow to read pixel-trace trace file 13 allow hal_dumpstate_impl debugfs_tracing_instances:file r_file_perms; 17 allow hal_dumpstate_impl sysfs_usb_device:file r_file_perms; 19 allow hal_dumpstate_impl ssr_log_file:file r_file_perms; 21 allow hal_dumpstate_impl tcpdump_vendor_data_file:file create_file_perms; 26 allow hal_dumpstate_impl modem_dump_file:file create_file_perms; 31 allow hal_dumpstate_impl radio_vendor_data_file:file r_file_perms; 33 allow hal_dumpstate_impl netmgr_data_file:file r_file_perms; [all …]
|
D | ueventd.te | 1 allow ueventd sysfs_thermal:file w_file_perms; 2 allow ueventd sysfs_leds:file w_file_perms; 3 allow ueventd sysfs_camera:file w_file_perms; 4 allow ueventd sysfs_easel:file w_file_perms; 5 allow ueventd sysfs_fingerprint:file w_file_perms; 6 allow ueventd sysfs_graphics:file w_file_perms; 7 allow ueventd sysfs_laser:file w_file_perms; 8 allow ueventd sysfs_rmtfs:file w_file_perms; 9 allow ueventd sysfs_scsi_devices_0000:file write; 10 allow ueventd sysfs_soc:file w_file_perms; [all …]
|
D | init-devstart-sh.te | 6 allow init-qcom-devstart-sh vendor_shell_exec:file rx_file_perms; 7 allow init-qcom-devstart-sh vendor_toolbox_exec:file rx_file_perms; 10 allow init-qcom-devstart-sh vendor_file:file rx_file_perms; 18 allow init-qcom-devstart-sh sysfs_msm_subsys:file w_file_perms; 24 allow init-qcom-devstart-sh sysfs_pinctrl:file rw_file_perms; 25 allow init-qcom-devstart-sh sysfs_gpio_export:file w_file_perms; 27 allow init-qcom-devstart-sh sysfs_soc:file r_file_perms; 29 allow init-qcom-devstart-sh sysfs_msm_subsys:file r_file_perms; 30 allow init-qcom-devstart-sh sysfs_scsi_devices_0000:file r_file_perms; 31 allow init-qcom-devstart-sh sysfs_pixelstats:file r_file_perms; [all …]
|
D | hal_fingerprint.te | 2 allow hal_fingerprint sysfs_fingerprint:file rw_file_perms; 4 allow hal_fingerprint sysfs_msm_subsys:file r_file_perms; 6 allow hal_fingerprint sysfs_camera:file r_file_perms; 8 allow hal_fingerprint sysfs_leds:file r_file_perms; 10 allow hal_fingerprint sysfs_pinctrl:file r_file_perms; 12 allow hal_fingerprint tee_device:file rw_file_perms;
|
/device/google/wahoo/sepolicy/vendor/ |
D | bug_map | 2 bootanim vendor_default_prop file b/79617173 5 hal_audio_default default_prop file b/77926553 10 hal_camera_default radio_prop file b/77865891 11 hal_health_default persist_file file b/127303305 12 hal_nfc_default default_prop file b/119670542 14 installd media_rw_data_file file b/77926261 16 netutils_wrapper sysfs_timestamp_switch file b/77871509 20 nfc vendor_default_prop file b/79617173 21 priv_app vendor_default_prop file b/79617173 22 platform_app vendor_default_prop file b/79617173 [all …]
|
D | hal_dumpstate_impl.te | 8 allow hal_dumpstate_impl vendor_shell_exec:file rx_file_perms; 9 allow hal_dumpstate_impl vendor_toolbox_exec:file rx_file_perms; 11 # Allow to read pixel-trace trace file 13 allow hal_dumpstate_impl debugfs_tracing_instances:file r_file_perms; 19 allow hal_dumpstate_impl modem_dump_file:file create_file_perms; 22 allow hal_dumpstate_impl radio_vendor_data_file:file r_file_perms; 23 allow hal_dumpstate_impl netmgr_data_file:file r_file_perms; 25 allow hal_dumpstate_impl debugfs_tzdbg:file r_file_perms; 27 allow hal_dumpstate_impl sysfs_usb_device:file r_file_perms; 28 allow hal_dumpstate_impl sysfs_msm_subsys:file write; [all …]
|
D | init_power.te | 8 allow init_power vendor_shell_exec:file rx_file_perms; 9 allow init_power vendor_toolbox_exec:file rx_file_perms; 13 allow init_power sysfs_msm_subsys:file write; 15 allow init_power sysfs_thermal:file w_file_perms; 16 allow init_power sysfs_devices_system_cpu:file w_file_perms; 17 allow init_power sysfs_soc:file r_file_perms; 19 allow init_power sysfs_console_suspend:file w_file_perms;
|
D | hardware_info_app.te | 6 allow hardware_info_app app_data_file:file execute; 13 allow hardware_info_app shell_data_file:file { open read }; 17 allow hardware_info_app sysfs_batteryinfo:file { getattr open read }; 19 allow hardware_info_app sysfs_camera:file { getattr open read }; 22 allow hardware_info_app sysfs_scsi_devices_0000:file { getattr open read }; 24 allow hardware_info_app sysfs_soc:file { getattr open read }; 28 allow hardware_info_app debugfs_ufs:file r_file_perms;
|
/device/google/crosshatch-sepolicy/vendor/google/ |
D | bug_map | 1 bootanim vendor_default_prop file b/79617173 3 dataservice_app vendor_default_prop file b/79617173 4 factory_ota_app vendor_default_prop file b/79617173 7 hal_camera_default persist_file file b/123018469 9 hal_health_default persist_file file b/127303305 11 init sysfs_graphics file b/126568362 12 netmgrd system_file file b/117232795 13 platform_app vendor_default_prop file b/79617173 15 priv_app vendor_default_prop file b/79617173 17 sensors unlabeled file b/142784012 [all …]
|
/device/generic/goldfish/sepolicy/common/ |
D | goldfish_setup.te | 11 allow goldfish_setup vendor_toolbox_exec:file execute_no_trans; 12 allow goldfish_setup vendor_file:file execute_no_trans; 15 allow goldfish_setup vendor_shell_exec:file { rx_file_perms }; 17 allow goldfish_setup goldfish_ip_exec:file execute_no_trans; 18 allow goldfish_setup goldfish_iw_exec:file execute_no_trans; 19 allow goldfish_setup mac80211_create_radios_exec:file execute_no_trans; 29 allow goldfish_setup varrun_file:file { mounton getattr create read write open unlink }; 30 allow goldfish_setup execns_exec:file rx_file_perms; 31 allow goldfish_setup proc_net:file rw_file_perms; 32 allow goldfish_setup proc:file r_file_perms; [all …]
|
D | bug_map | 2 hal_wifi_default default_prop file b/131598173 5 init vendor_toolbox_exec file b/132695863 6 installd device file b/131595213 8 netd device file b/131598170 9 platform_app vendor_default_prop file b/130684647 12 storaged device file b/131598843 18 gsid device file b/133324244
|
/device/google/bonito-sepolicy/vendor/google/ |
D | bug_map | 1 bootanim vendor_default_prop file b/78460200 3 dataservice_app vendor_default_prop file b/78460200 12 platform_app vendor_default_prop file b/78460200 13 priv_app vendor_default_prop file b/78460200 16 sensors vendor_modem_diag_prop file b/78460200 18 ssr_setup vendor_ssr_prop file b/78460200 19 system_app vendor_default_prop file b/78460200 20 system_server vendor_default_prop file b/78460200 22 untrusted_app vendor_default_prop file b/78460200
|
/device/linaro/poplar/sepolicy/ |
D | priv_app.te | 2 allow priv_app sysfs:file { getattr }; # open read 3 allow priv_app proc_stat:file { read write open getattr }; 4 allow priv_app sysfs_hisi:file { read write open getattr }; 5 allow priv_app proc_uptime:file { getattr open read }; 7 allow priv_app proc_interrupts:file { open }; 8 allow priv_app proc_modules:file { open }; 9 allow priv_app sysfs_android_usb:file { open }; 12 allow priv_app hi_overlay_file:file { read open getattr };
|
/device/generic/goldfish/tools/ |
D | mk_qemu_ramdisk.py | 14 with open(f1name, mode='rb') as file: 15 f1buffer = file.read() 17 with open(f2name, mode='rb') as file: 18 f2buffer = file.read() 29 with open(f3name, mode='wb') as file: 30 file.write(f1buffer) 31 file.write(vendorramimg)
|
/device/google/coral-sepolicy/vendor/qcom/common/ |
D | hardware_info_app.te | 6 allow hardware_info_app app_data_file:file execute; 13 allow hardware_info_app shell_data_file:file r_file_perms; 17 allow hardware_info_app sysfs_display:file r_file_perms; 21 allow hardware_info_app sysfs_soc:file r_file_perms; 25 allow hardware_info_app sysfs_batteryinfo:file r_file_perms; 27 allow hardware_info_app debugfs_batteryinfo:file r_file_perms; 30 allow hardware_info_app sysfs_scsi_devices_0000:file r_file_perms; 34 allow hardware_info_app sysfs_audio:file r_file_perms;
|
/device/google/cuttlefish/host/libs/config/ |
D | fetcher_config.cpp | 102 bool FetcherConfig::SaveToFile(const std::string& file) const { in SaveToFile() 103 std::ofstream ofs(file); in SaveToFile() 105 LOG(ERROR) << "Unable to write to file " << file; in SaveToFile() 112 bool FetcherConfig::LoadFromFile(const std::string& file) { in LoadFromFile() argument 113 auto real_file_path = cuttlefish::AbsolutePath(file); in LoadFromFile() 115 LOG(ERROR) << "Could not get real path for file " << file; in LoadFromFile() 121 LOG(ERROR) << "Could not read config file " << file << ": " in LoadFromFile() 176 bool FetcherConfig::add_cvd_file(const CvdFile& file, bool override_entry) { in add_cvd_file() argument 181 if ((*dictionary_)[kCvdFiles].isMember(file.file_path) && !override_entry) { in add_cvd_file() 184 (*dictionary_)[kCvdFiles][file.file_path] = CvdFileToJson(file); in add_cvd_file() [all …]
|
/device/google/cuttlefish/common/libs/utils/ |
D | archive.cpp | 29 Archive::Archive(const std::string& file) : file(file) { in Archive() argument 38 bsdtar_cmd.AddParameter(file); in Contents() 43 LOG(ERROR) << "`bsdtar -tf \"" << file << "\"` returned " << bsdtar_ret; in Contents() 62 bsdtar_cmd.AddParameter(file); in ExtractFiles() 71 LOG(ERROR) << "bsdtar extraction on \"" << file << "\" returned " << bsdtar_ret; in ExtractFiles() 79 bsdtar_cmd.AddParameter(file); in ExtractToMemory() 86 LOG(ERROR) << "Could not extract \"" << path << "\" from \"" << file in ExtractToMemory()
|
/device/linaro/dragonboard/sepolicy/ |
D | crash_dump.te | 2 allow crash_dump bluetooth_data_file:file { getattr map open read }; 3 allow crash_dump bluetooth_prop:file { getattr map open }; 4 allow crash_dump device_config_runtime_native_boot_prop:file { getattr map open }; 5 allow crash_dump device_config_runtime_native_prop:file { getattr map open }; 6 allow crash_dump hwservicemanager_prop:file { getattr map open }; 7 allow crash_dump runtime_event_log_tags_file:file getattr;
|