Home
last modified time | relevance | path

Searched refs:init (Results 1 – 25 of 320) sorted by relevance

12345678910>>...13

/device/google/bonito-sepolicy/vendor/qcom/common/
Dinit-devstart-sh.te1 type init-qcom-devstart-sh, domain;
2 type init-qcom-devstart-sh_exec, exec_type, vendor_file_type, file_type;
4 init_daemon_domain(init-qcom-devstart-sh)
6 allow init-qcom-devstart-sh vendor_shell_exec:file rx_file_perms;
7 allow init-qcom-devstart-sh vendor_toolbox_exec:file rx_file_perms;
10 allow init-qcom-devstart-sh vendor_file:file rx_file_perms;
13 set_prop(init-qcom-devstart-sh, vendor_device_prop)
15 set_prop(init-qcom-devstart-sh, public_vendor_system_prop)
18 allow init-qcom-devstart-sh sysfs_msm_subsys:file w_file_perms;
21 allow init-qcom-devstart-sh sysfs_chargelevel:file rw_file_perms;
[all …]
Dinit.te1 allow init configfs:lnk_file create;
3 allow init configfs:file w_file_perms;
4 allow init debugfs_clk:file w_file_perms;
6 allow init tty_device:chr_file rw_file_perms;
9 allow init mnt_vendor_file:dir mounton;
10 allow init vendor_firmware_file:dir mounton;
11 allow init vendor_firmware_file:filesystem { relabelto relabelfrom mount getattr };
13 allow init ab_block_device:lnk_file relabelto;
14 allow init boot_block_device:lnk_file relabelto;
15 allow init persist_block_device:lnk_file relabelto;
[all …]
Dinit-insmod-sh.te1 type init-insmod-sh, domain;
2 type init-insmod-sh_exec, exec_type, vendor_file_type, file_type;
4 init_daemon_domain(init-insmod-sh)
6 allow init-insmod-sh vendor_shell_exec:file rx_file_perms;
7 allow init-insmod-sh vendor_toolbox_exec:file rx_file_perms;
10 set_prop(init-insmod-sh, vendor_device_prop)
13 allow init-insmod-sh self:capability sys_module;
14 allow init-insmod-sh system_file:system module_load;
16 allow init-insmod-sh vendor_file:system module_load;
18 allow init-insmod-sh kernel:key search;
[all …]
Dinit-wlan-sh.te1 type init-qcom-wlan-sh, domain;
2 type init-qcom-wlan-sh_exec, exec_type, vendor_file_type, file_type;
4 init_daemon_domain(init-qcom-wlan-sh)
6 allow init-qcom-wlan-sh vendor_shell_exec:file rx_file_perms;
7 allow init-qcom-wlan-sh vendor_toolbox_exec:file rx_file_perms;
10 set_prop(init-qcom-wlan-sh, vendor_wifi_version)
13 allow init-qcom-wlan-sh sysfs_msm_wlan:dir r_dir_perms;
14 allow init-qcom-wlan-sh sysfs_msm_wlan:file r_file_perms;
/device/google/crosshatch-sepolicy/vendor/qcom/common/
Dinit-devstart-sh.te1 type init-qcom-devstart-sh, domain;
2 type init-qcom-devstart-sh_exec, exec_type, vendor_file_type, file_type;
4 init_daemon_domain(init-qcom-devstart-sh)
6 allow init-qcom-devstart-sh vendor_shell_exec:file rx_file_perms;
7 allow init-qcom-devstart-sh vendor_toolbox_exec:file rx_file_perms;
10 allow init-qcom-devstart-sh vendor_file:file rx_file_perms;
13 set_prop(init-qcom-devstart-sh, vendor_device_prop)
15 set_prop(init-qcom-devstart-sh, public_vendor_system_prop)
18 allow init-qcom-devstart-sh sysfs_msm_subsys:file w_file_perms;
22 allow init-qcom-devstart-sh sysfs:dir r_dir_perms;
[all …]
Dinit.te1 allow init configfs:lnk_file create;
3 allow init configfs:file w_file_perms;
4 allow init debugfs_clk:file w_file_perms;
6 allow init tty_device:chr_file rw_file_perms;
8 allow init mnt_vendor_file:dir mounton;
10 allow init ab_block_device:lnk_file relabelto;
11 allow init boot_block_device:lnk_file relabelto;
13 dontaudit init kernel:system module_request;
16 allow init sysfs_vdso:file w_file_perms;
18 allow init sysfs_poweroff:file w_file_perms;
[all …]
Dinit-insmod-sh.te1 type init-insmod-sh, domain;
2 type init-insmod-sh_exec, exec_type, vendor_file_type, file_type;
4 init_daemon_domain(init-insmod-sh)
6 allow init-insmod-sh vendor_shell_exec:file rx_file_perms;
7 allow init-insmod-sh vendor_toolbox_exec:file rx_file_perms;
10 set_prop(init-insmod-sh, vendor_device_prop)
13 allow init-insmod-sh self:capability sys_module;
14 allow init-insmod-sh system_file:system module_load;
16 allow init-insmod-sh vendor_file:system module_load;
18 allow init-insmod-sh kernel:key search;
[all …]
/device/linaro/poplar/sepolicy/
Dinit.te1 allow init tmpfs:lnk_file { create };
2 allow init nativetest_data_file:dir { getattr open read };
3 allow init hi_system_block_device:blk_file { relabelfrom relabelto create setattr };
4 allow init hi_vendor_block_device:blk_file { relabelfrom relabelto create setattr };
5 allow init hi_cache_block_device:blk_file { relabelfrom relabelto create setattr };
6 allow init hi_userdata_block_device:blk_file { relabelfrom relabelto create setattr };
7 allow init nativetest_data_file:file { getattr };
8 allow init proc_hisi:file { open setattr write };
9 allow init debugfs:file { write };
10 allow init sysfs:file { setattr };
[all …]
/device/google/wahoo/sepolicy/vendor/
Dinit.te1 allow init configfs:lnk_file create;
3 allow init firmware_file:dir mounton;
4 allow init configfs:file w_file_perms;
5 allow init debugfs_clk:file w_file_perms;
7 allow init tty_device:chr_file rw_file_perms;
9 allow init persist_file:dir mounton;
11 allow init ab_block_device:lnk_file relabelto;
12 allow init boot_block_device:lnk_file relabelto;
13 allow init persist_block_device:lnk_file relabelto;
15 dontaudit init kernel:system module_request;
[all …]
Dinit-insmod-sh.te1 type init-insmod-sh, domain;
2 type init-insmod-sh_exec, exec_type, vendor_file_type, file_type;
4 init_daemon_domain(init-insmod-sh)
6 allow init-insmod-sh vendor_shell_exec:file rx_file_perms;
7 allow init-insmod-sh vendor_toolbox_exec:file rx_file_perms;
10 set_prop(init-insmod-sh, public_vendor_system_prop)
13 allow init-insmod-sh self:capability sys_module;
14 allow init-insmod-sh system_file:system module_load;
16 allow init-insmod-sh vendor_file:system module_load;
Dinit-fingerprint.te1 type init-fingerprint, domain;
2 type init-fingerprint_exec, exec_type, vendor_file_type, file_type;
4 init_daemon_domain(init-fingerprint)
6 allow init-fingerprint vendor_shell_exec:file rx_file_perms;
7 allow init-fingerprint vendor_toolbox_exec:file rx_file_perms;
9 set_prop(init-fingerprint, vendor_fingerprint_prop)
10 set_prop(init-fingerprint, ctl_start_prop)
Dinit-devstart-sh.te1 type init-qcom-devstart-sh, domain;
2 type init-qcom-devstart-sh_exec, exec_type, vendor_file_type, file_type;
4 init_daemon_domain(init-qcom-devstart-sh)
6 allow init-qcom-devstart-sh vendor_shell_exec:file rx_file_perms;
7 allow init-qcom-devstart-sh vendor_toolbox_exec:file rx_file_perms;
10 allow init-qcom-devstart-sh vendor_file:file rx_file_perms;
13 set_prop(init-qcom-devstart-sh, public_vendor_system_prop)
16 allow init-qcom-devstart-sh sysfs_msm_subsys:file w_file_perms;
/device/google/coral-sepolicy/vendor/google/
Dinit-insmod-sh.te1 type init-insmod-sh, domain;
2 type init-insmod-sh_exec, exec_type, vendor_file_type, file_type;
4 init_daemon_domain(init-insmod-sh)
6 allow init-insmod-sh vendor_toolbox_exec:file rx_file_perms;
9 set_prop(init-insmod-sh, vendor_device_prop)
12 allow init-insmod-sh self:capability sys_module;
14 allow init-insmod-sh vendor_file:system module_load;
16 allow init-insmod-sh kernel:key search;
18 allow init-insmod-sh sysfs_msm_boot:file w_file_perms;
21 allow init-insmod-sh proc_modules:file r_file_perms;
[all …]
/device/google/crosshatch-sepolicy/vendor/google/
Dinit-firstboot.te1 type init-firstboot, domain;
2 type init-firstboot_exec, exec_type, vendor_file_type, file_type;
4 init_daemon_domain(init-firstboot)
6 allow init-firstboot vendor_shell_exec:file rx_file_perms;
7 allow init-firstboot vendor_toolbox_exec:file rx_file_perms;
10 allow init-firstboot sysfs_msm_subsys:dir search;
11 r_dir_file(init-firstboot, sysfs_batteryinfo)
14 set_prop(init-firstboot, powerctl_prop)
Dinit-fingerprint.te1 type init-fingerprint, domain;
2 type init-fingerprint_exec, exec_type, vendor_file_type, file_type;
4 init_daemon_domain(init-fingerprint)
6 allow init-fingerprint vendor_shell_exec:file rx_file_perms;
7 allow init-fingerprint vendor_toolbox_exec:file rx_file_perms;
9 set_prop(init-fingerprint, vendor_fingerprint_prop)
10 set_prop(init-fingerprint, ctl_start_prop)
/device/google/bonito-sepolicy/vendor/google/
Dinit-firstboot.te1 type init-firstboot, domain;
2 type init-firstboot_exec, exec_type, vendor_file_type, file_type;
4 init_daemon_domain(init-firstboot)
6 allow init-firstboot vendor_shell_exec:file rx_file_perms;
7 allow init-firstboot vendor_toolbox_exec:file rx_file_perms;
10 allow init-firstboot sysfs_msm_subsys:dir search;
11 r_dir_file(init-firstboot, sysfs_batteryinfo)
14 set_prop(init-firstboot, powerctl_prop)
Dinit-fingerprint.te1 type init-fingerprint, domain;
2 type init-fingerprint_exec, exec_type, vendor_file_type, file_type;
4 init_daemon_domain(init-fingerprint)
6 allow init-fingerprint vendor_shell_exec:file rx_file_perms;
7 allow init-fingerprint vendor_toolbox_exec:file rx_file_perms;
9 set_prop(init-fingerprint, vendor_fingerprint_prop)
10 set_prop(init-fingerprint, ctl_start_prop)
/device/google/cuttlefish/shared/sepolicy/vendor/
Dinit.te2 allow init serial_device:chr_file rw_file_perms;
5 allow init configfs:file w_file_perms;
6 allow init configfs:lnk_file create;
9 allow init kernel:system module_request;
12 allow init binfmt_miscfs:file w_file_perms;
13 allow init proc:dir mounton;
15 # init relabel vbmeta* symlinks
16 allow init ab_block_device:lnk_file relabelto;
20 dontaudit init tmpfs:lnk_file create;
23 allow init mnt_vendor_file:dir mounton;
/device/generic/uml/
Duml.mk27 PRODUCT_COPY_FILES += $(LOCAL_PATH)/init.uml.rc:root/init.uml.rc
28 PRODUCT_COPY_FILES += $(LOCAL_PATH)/init.eth0.sh:system/bin/init.eth0.sh
51 init \
52 init.environ.rc \
123 system/core/rootdir/init.usb.rc:system/etc/init/hw/init.usb.rc \
124 system/core/rootdir/init.usb.configfs.rc:system/etc/init/hw/init.usb.configfs.rc \
/device/linaro/dragonboard/db845c/
Ddevice.mk28 device/linaro/dragonboard/init.common.rc:$(TARGET_COPY_OUT_VENDOR)/etc/init/init.db845c.rc \
29 …device/linaro/dragonboard/init.common.usb.rc:$(TARGET_COPY_OUT_VENDOR)/etc/init/init.db845c.usb.rc…
44 device/linaro/dragonboard/qcom/init.qcom.rc:$(TARGET_COPY_OUT_VENDOR)/etc/init/init.qcom.rc
48 $(LOCAL_PATH)/eth_mac_addr.rc:/system/etc/init/eth_mac_addr.rc \
/device/linaro/hikey/sepolicy/
Dinit.te1 # init.hikey.usb.rc writes to /config/* to set up USB
2 allow init configfs:dir create_dir_perms;
3 allow init configfs:file write;
4 allow init configfs:lnk_file { create unlink };
6 allow init tmpfs:lnk_file create;
7 allow init configfs:lnk_file create;
9 dontaudit init kernel:system module_request;
/device/amlogic/yukawa/sepolicy/
Dinit.te1 # init.yukawa.usb.rc writes to /config/* to set up USB
2 allow init configfs:dir create_dir_perms;
3 allow init configfs:file write;
4 allow init configfs:lnk_file { create unlink };
6 allow init tmpfs:lnk_file create;
7 allow init configfs:lnk_file create;
9 dontaudit init kernel:system module_request;
/device/ti/beagle_x15/sepolicy/
Dinit.te1 #For loading modules via init.rc (ex: wifi)
2 allow init self:capability sys_module;
4 allow init tmpfs:lnk_file create_file_perms;
6 allow init vendor_file:system module_load;
8 allow init configfs:file write;
9 allow init configfs:lnk_file { create unlink } ;
11 dontaudit init proc:file write;
/device/linaro/hikey/hikey/
Ddevice-hikey.mk21 device/linaro/hikey/hikey/init.hikey.rc:$(TARGET_COPY_OUT_VENDOR)/etc/init/init.hikey.rc \
22 device/linaro/hikey/init.hikey.power.rc:$(TARGET_COPY_OUT_VENDOR)/etc/init/init.hikey.power.rc \
23 device/linaro/hikey/init.common.usb.rc:$(TARGET_COPY_OUT_VENDOR)/etc/init/init.hikey.usb.rc \
63 device/linaro/hikey/init.recovery.common.rc:recovery/root/init.recovery.hikey.rc
/device/generic/goldfish-opengl/shared/OpenglCodecCommon/
DPortableMutex.h57 int init;
64 if (!lock->init) {
65 lock->init = 1;
67 lock->init = 2;
68 } else while (lock->init != 2) {
80 lock->init = 2;
85 if (lock->init) {
86 lock->init = 0;

12345678910>>...13