Searched refs:init (Results 1 – 25 of 320) sorted by relevance
12345678910>>...13
/device/google/bonito-sepolicy/vendor/qcom/common/ |
D | init-devstart-sh.te | 1 type init-qcom-devstart-sh, domain; 2 type init-qcom-devstart-sh_exec, exec_type, vendor_file_type, file_type; 4 init_daemon_domain(init-qcom-devstart-sh) 6 allow init-qcom-devstart-sh vendor_shell_exec:file rx_file_perms; 7 allow init-qcom-devstart-sh vendor_toolbox_exec:file rx_file_perms; 10 allow init-qcom-devstart-sh vendor_file:file rx_file_perms; 13 set_prop(init-qcom-devstart-sh, vendor_device_prop) 15 set_prop(init-qcom-devstart-sh, public_vendor_system_prop) 18 allow init-qcom-devstart-sh sysfs_msm_subsys:file w_file_perms; 21 allow init-qcom-devstart-sh sysfs_chargelevel:file rw_file_perms; [all …]
|
D | init.te | 1 allow init configfs:lnk_file create; 3 allow init configfs:file w_file_perms; 4 allow init debugfs_clk:file w_file_perms; 6 allow init tty_device:chr_file rw_file_perms; 9 allow init mnt_vendor_file:dir mounton; 10 allow init vendor_firmware_file:dir mounton; 11 allow init vendor_firmware_file:filesystem { relabelto relabelfrom mount getattr }; 13 allow init ab_block_device:lnk_file relabelto; 14 allow init boot_block_device:lnk_file relabelto; 15 allow init persist_block_device:lnk_file relabelto; [all …]
|
D | init-insmod-sh.te | 1 type init-insmod-sh, domain; 2 type init-insmod-sh_exec, exec_type, vendor_file_type, file_type; 4 init_daemon_domain(init-insmod-sh) 6 allow init-insmod-sh vendor_shell_exec:file rx_file_perms; 7 allow init-insmod-sh vendor_toolbox_exec:file rx_file_perms; 10 set_prop(init-insmod-sh, vendor_device_prop) 13 allow init-insmod-sh self:capability sys_module; 14 allow init-insmod-sh system_file:system module_load; 16 allow init-insmod-sh vendor_file:system module_load; 18 allow init-insmod-sh kernel:key search; [all …]
|
D | init-wlan-sh.te | 1 type init-qcom-wlan-sh, domain; 2 type init-qcom-wlan-sh_exec, exec_type, vendor_file_type, file_type; 4 init_daemon_domain(init-qcom-wlan-sh) 6 allow init-qcom-wlan-sh vendor_shell_exec:file rx_file_perms; 7 allow init-qcom-wlan-sh vendor_toolbox_exec:file rx_file_perms; 10 set_prop(init-qcom-wlan-sh, vendor_wifi_version) 13 allow init-qcom-wlan-sh sysfs_msm_wlan:dir r_dir_perms; 14 allow init-qcom-wlan-sh sysfs_msm_wlan:file r_file_perms;
|
/device/google/crosshatch-sepolicy/vendor/qcom/common/ |
D | init-devstart-sh.te | 1 type init-qcom-devstart-sh, domain; 2 type init-qcom-devstart-sh_exec, exec_type, vendor_file_type, file_type; 4 init_daemon_domain(init-qcom-devstart-sh) 6 allow init-qcom-devstart-sh vendor_shell_exec:file rx_file_perms; 7 allow init-qcom-devstart-sh vendor_toolbox_exec:file rx_file_perms; 10 allow init-qcom-devstart-sh vendor_file:file rx_file_perms; 13 set_prop(init-qcom-devstart-sh, vendor_device_prop) 15 set_prop(init-qcom-devstart-sh, public_vendor_system_prop) 18 allow init-qcom-devstart-sh sysfs_msm_subsys:file w_file_perms; 22 allow init-qcom-devstart-sh sysfs:dir r_dir_perms; [all …]
|
D | init.te | 1 allow init configfs:lnk_file create; 3 allow init configfs:file w_file_perms; 4 allow init debugfs_clk:file w_file_perms; 6 allow init tty_device:chr_file rw_file_perms; 8 allow init mnt_vendor_file:dir mounton; 10 allow init ab_block_device:lnk_file relabelto; 11 allow init boot_block_device:lnk_file relabelto; 13 dontaudit init kernel:system module_request; 16 allow init sysfs_vdso:file w_file_perms; 18 allow init sysfs_poweroff:file w_file_perms; [all …]
|
D | init-insmod-sh.te | 1 type init-insmod-sh, domain; 2 type init-insmod-sh_exec, exec_type, vendor_file_type, file_type; 4 init_daemon_domain(init-insmod-sh) 6 allow init-insmod-sh vendor_shell_exec:file rx_file_perms; 7 allow init-insmod-sh vendor_toolbox_exec:file rx_file_perms; 10 set_prop(init-insmod-sh, vendor_device_prop) 13 allow init-insmod-sh self:capability sys_module; 14 allow init-insmod-sh system_file:system module_load; 16 allow init-insmod-sh vendor_file:system module_load; 18 allow init-insmod-sh kernel:key search; [all …]
|
/device/linaro/poplar/sepolicy/ |
D | init.te | 1 allow init tmpfs:lnk_file { create }; 2 allow init nativetest_data_file:dir { getattr open read }; 3 allow init hi_system_block_device:blk_file { relabelfrom relabelto create setattr }; 4 allow init hi_vendor_block_device:blk_file { relabelfrom relabelto create setattr }; 5 allow init hi_cache_block_device:blk_file { relabelfrom relabelto create setattr }; 6 allow init hi_userdata_block_device:blk_file { relabelfrom relabelto create setattr }; 7 allow init nativetest_data_file:file { getattr }; 8 allow init proc_hisi:file { open setattr write }; 9 allow init debugfs:file { write }; 10 allow init sysfs:file { setattr }; [all …]
|
/device/google/wahoo/sepolicy/vendor/ |
D | init.te | 1 allow init configfs:lnk_file create; 3 allow init firmware_file:dir mounton; 4 allow init configfs:file w_file_perms; 5 allow init debugfs_clk:file w_file_perms; 7 allow init tty_device:chr_file rw_file_perms; 9 allow init persist_file:dir mounton; 11 allow init ab_block_device:lnk_file relabelto; 12 allow init boot_block_device:lnk_file relabelto; 13 allow init persist_block_device:lnk_file relabelto; 15 dontaudit init kernel:system module_request; [all …]
|
D | init-insmod-sh.te | 1 type init-insmod-sh, domain; 2 type init-insmod-sh_exec, exec_type, vendor_file_type, file_type; 4 init_daemon_domain(init-insmod-sh) 6 allow init-insmod-sh vendor_shell_exec:file rx_file_perms; 7 allow init-insmod-sh vendor_toolbox_exec:file rx_file_perms; 10 set_prop(init-insmod-sh, public_vendor_system_prop) 13 allow init-insmod-sh self:capability sys_module; 14 allow init-insmod-sh system_file:system module_load; 16 allow init-insmod-sh vendor_file:system module_load;
|
D | init-fingerprint.te | 1 type init-fingerprint, domain; 2 type init-fingerprint_exec, exec_type, vendor_file_type, file_type; 4 init_daemon_domain(init-fingerprint) 6 allow init-fingerprint vendor_shell_exec:file rx_file_perms; 7 allow init-fingerprint vendor_toolbox_exec:file rx_file_perms; 9 set_prop(init-fingerprint, vendor_fingerprint_prop) 10 set_prop(init-fingerprint, ctl_start_prop)
|
D | init-devstart-sh.te | 1 type init-qcom-devstart-sh, domain; 2 type init-qcom-devstart-sh_exec, exec_type, vendor_file_type, file_type; 4 init_daemon_domain(init-qcom-devstart-sh) 6 allow init-qcom-devstart-sh vendor_shell_exec:file rx_file_perms; 7 allow init-qcom-devstart-sh vendor_toolbox_exec:file rx_file_perms; 10 allow init-qcom-devstart-sh vendor_file:file rx_file_perms; 13 set_prop(init-qcom-devstart-sh, public_vendor_system_prop) 16 allow init-qcom-devstart-sh sysfs_msm_subsys:file w_file_perms;
|
/device/google/coral-sepolicy/vendor/google/ |
D | init-insmod-sh.te | 1 type init-insmod-sh, domain; 2 type init-insmod-sh_exec, exec_type, vendor_file_type, file_type; 4 init_daemon_domain(init-insmod-sh) 6 allow init-insmod-sh vendor_toolbox_exec:file rx_file_perms; 9 set_prop(init-insmod-sh, vendor_device_prop) 12 allow init-insmod-sh self:capability sys_module; 14 allow init-insmod-sh vendor_file:system module_load; 16 allow init-insmod-sh kernel:key search; 18 allow init-insmod-sh sysfs_msm_boot:file w_file_perms; 21 allow init-insmod-sh proc_modules:file r_file_perms; [all …]
|
/device/google/crosshatch-sepolicy/vendor/google/ |
D | init-firstboot.te | 1 type init-firstboot, domain; 2 type init-firstboot_exec, exec_type, vendor_file_type, file_type; 4 init_daemon_domain(init-firstboot) 6 allow init-firstboot vendor_shell_exec:file rx_file_perms; 7 allow init-firstboot vendor_toolbox_exec:file rx_file_perms; 10 allow init-firstboot sysfs_msm_subsys:dir search; 11 r_dir_file(init-firstboot, sysfs_batteryinfo) 14 set_prop(init-firstboot, powerctl_prop)
|
D | init-fingerprint.te | 1 type init-fingerprint, domain; 2 type init-fingerprint_exec, exec_type, vendor_file_type, file_type; 4 init_daemon_domain(init-fingerprint) 6 allow init-fingerprint vendor_shell_exec:file rx_file_perms; 7 allow init-fingerprint vendor_toolbox_exec:file rx_file_perms; 9 set_prop(init-fingerprint, vendor_fingerprint_prop) 10 set_prop(init-fingerprint, ctl_start_prop)
|
/device/google/bonito-sepolicy/vendor/google/ |
D | init-firstboot.te | 1 type init-firstboot, domain; 2 type init-firstboot_exec, exec_type, vendor_file_type, file_type; 4 init_daemon_domain(init-firstboot) 6 allow init-firstboot vendor_shell_exec:file rx_file_perms; 7 allow init-firstboot vendor_toolbox_exec:file rx_file_perms; 10 allow init-firstboot sysfs_msm_subsys:dir search; 11 r_dir_file(init-firstboot, sysfs_batteryinfo) 14 set_prop(init-firstboot, powerctl_prop)
|
D | init-fingerprint.te | 1 type init-fingerprint, domain; 2 type init-fingerprint_exec, exec_type, vendor_file_type, file_type; 4 init_daemon_domain(init-fingerprint) 6 allow init-fingerprint vendor_shell_exec:file rx_file_perms; 7 allow init-fingerprint vendor_toolbox_exec:file rx_file_perms; 9 set_prop(init-fingerprint, vendor_fingerprint_prop) 10 set_prop(init-fingerprint, ctl_start_prop)
|
/device/google/cuttlefish/shared/sepolicy/vendor/ |
D | init.te | 2 allow init serial_device:chr_file rw_file_perms; 5 allow init configfs:file w_file_perms; 6 allow init configfs:lnk_file create; 9 allow init kernel:system module_request; 12 allow init binfmt_miscfs:file w_file_perms; 13 allow init proc:dir mounton; 15 # init relabel vbmeta* symlinks 16 allow init ab_block_device:lnk_file relabelto; 20 dontaudit init tmpfs:lnk_file create; 23 allow init mnt_vendor_file:dir mounton;
|
/device/generic/uml/ |
D | uml.mk | 27 PRODUCT_COPY_FILES += $(LOCAL_PATH)/init.uml.rc:root/init.uml.rc 28 PRODUCT_COPY_FILES += $(LOCAL_PATH)/init.eth0.sh:system/bin/init.eth0.sh 51 init \ 52 init.environ.rc \ 123 system/core/rootdir/init.usb.rc:system/etc/init/hw/init.usb.rc \ 124 system/core/rootdir/init.usb.configfs.rc:system/etc/init/hw/init.usb.configfs.rc \
|
/device/linaro/dragonboard/db845c/ |
D | device.mk | 28 device/linaro/dragonboard/init.common.rc:$(TARGET_COPY_OUT_VENDOR)/etc/init/init.db845c.rc \ 29 …device/linaro/dragonboard/init.common.usb.rc:$(TARGET_COPY_OUT_VENDOR)/etc/init/init.db845c.usb.rc… 44 device/linaro/dragonboard/qcom/init.qcom.rc:$(TARGET_COPY_OUT_VENDOR)/etc/init/init.qcom.rc 48 $(LOCAL_PATH)/eth_mac_addr.rc:/system/etc/init/eth_mac_addr.rc \
|
/device/linaro/hikey/sepolicy/ |
D | init.te | 1 # init.hikey.usb.rc writes to /config/* to set up USB 2 allow init configfs:dir create_dir_perms; 3 allow init configfs:file write; 4 allow init configfs:lnk_file { create unlink }; 6 allow init tmpfs:lnk_file create; 7 allow init configfs:lnk_file create; 9 dontaudit init kernel:system module_request;
|
/device/amlogic/yukawa/sepolicy/ |
D | init.te | 1 # init.yukawa.usb.rc writes to /config/* to set up USB 2 allow init configfs:dir create_dir_perms; 3 allow init configfs:file write; 4 allow init configfs:lnk_file { create unlink }; 6 allow init tmpfs:lnk_file create; 7 allow init configfs:lnk_file create; 9 dontaudit init kernel:system module_request;
|
/device/ti/beagle_x15/sepolicy/ |
D | init.te | 1 #For loading modules via init.rc (ex: wifi) 2 allow init self:capability sys_module; 4 allow init tmpfs:lnk_file create_file_perms; 6 allow init vendor_file:system module_load; 8 allow init configfs:file write; 9 allow init configfs:lnk_file { create unlink } ; 11 dontaudit init proc:file write;
|
/device/linaro/hikey/hikey/ |
D | device-hikey.mk | 21 device/linaro/hikey/hikey/init.hikey.rc:$(TARGET_COPY_OUT_VENDOR)/etc/init/init.hikey.rc \ 22 device/linaro/hikey/init.hikey.power.rc:$(TARGET_COPY_OUT_VENDOR)/etc/init/init.hikey.power.rc \ 23 device/linaro/hikey/init.common.usb.rc:$(TARGET_COPY_OUT_VENDOR)/etc/init/init.hikey.usb.rc \ 63 device/linaro/hikey/init.recovery.common.rc:recovery/root/init.recovery.hikey.rc
|
/device/generic/goldfish-opengl/shared/OpenglCodecCommon/ |
D | PortableMutex.h | 57 int init; 64 if (!lock->init) { 65 lock->init = 1; 67 lock->init = 2; 68 } else while (lock->init != 2) { 80 lock->init = 2; 85 if (lock->init) { 86 lock->init = 0;
|
12345678910>>...13