Home
last modified time | relevance | path

Searched refs:read (Results 1 – 25 of 1129) sorted by relevance

12345678910>>...46

/system/sepolicy/prebuilts/api/30.0/public/
Diorap_prefetcherd.te8 # Allow read/write /proc/sys/vm/drop/caches
16 allow iorap_prefetcherd iorapd:fifo_file { read write };
24 allow iorap_prefetcherd logcat_exec:file { open read };
27 allow iorap_prefetcherd apk_data_file:dir { open read search };
28 allow iorap_prefetcherd apk_data_file:file { open read };
29 allow iorap_prefetcherd app_data_file:dir { open read search };
30 allow iorap_prefetcherd app_data_file:file { open read };
31 allow iorap_prefetcherd dalvikcache_data_file:dir { open read search };
32 allow iorap_prefetcherd dalvikcache_data_file:file{ open read };
33 allow iorap_prefetcherd packages_list_file:dir { open read search };
[all …]
Diorap_inode2filename.te10 allow iorap_inode2filename iorapd:fifo_file { read write getattr };
18 allow iorap_inode2filename apex_data_file:dir { getattr open read search };
20 allow iorap_inode2filename apex_mnt_dir:dir { getattr open read search };
22 allow iorap_inode2filename apk_data_file:dir { getattr open read search };
24 allow iorap_inode2filename app_data_file:dir { getattr open read search };
26 allow iorap_inode2filename backup_data_file:dir { getattr open read search };
28 allow iorap_inode2filename bluetooth_data_file:dir { getattr open read search };
30 allow iorap_inode2filename bootchart_data_file:dir { getattr open read search };
32 allow iorap_inode2filename metadata_file:dir { getattr open read search search };
34 allow iorap_inode2filename packages_list_file:dir { getattr open read search };
[all …]
Dprofman.te5 allow profman user_profile_data_file:file { getattr read write lock map };
8 allow profman asec_apk_file:file { read map };
9 allow profman apk_data_file:file { getattr read map };
10 allow profman apk_data_file:dir { getattr read search };
12 allow profman oemfs:file { read map };
14 allow profman tmpfs:file { read map };
22 allow profman { privapp_data_file app_data_file }:file { getattr read write lock map };
23 allow profman { privapp_data_file app_data_file }:dir { getattr read search };
Ddnsmasq.te18 allow dnsmasq netd:fifo_file { getattr read write };
20 allow dnsmasq netd:netlink_kobject_uevent_socket { read write };
21 allow dnsmasq netd:netlink_nflog_socket { read write };
22 allow dnsmasq netd:netlink_route_socket { read write };
23 allow dnsmasq netd:unix_stream_socket { getattr read write };
24 allow dnsmasq netd:unix_dgram_socket { read write };
25 allow dnsmasq netd:udp_socket { read write };
/system/sepolicy/public/
Diorap_prefetcherd.te8 # Allow read/write /proc/sys/vm/drop/caches
16 allow iorap_prefetcherd iorapd:fifo_file { read write };
24 allow iorap_prefetcherd logcat_exec:file { open read };
27 allow iorap_prefetcherd apk_data_file:dir { open read search };
28 allow iorap_prefetcherd apk_data_file:file { open read };
29 allow iorap_prefetcherd app_data_file:dir { open read search };
30 allow iorap_prefetcherd app_data_file:file { open read };
31 allow iorap_prefetcherd dalvikcache_data_file:dir { open read search };
32 allow iorap_prefetcherd dalvikcache_data_file:file{ open read };
33 allow iorap_prefetcherd packages_list_file:dir { open read search };
[all …]
Diorap_inode2filename.te10 allow iorap_inode2filename iorapd:fifo_file { read write getattr };
18 allow iorap_inode2filename apex_data_file:dir { getattr open read search };
20 allow iorap_inode2filename apex_mnt_dir:dir { getattr open read search };
22 allow iorap_inode2filename apk_data_file:dir { getattr open read search };
24 allow iorap_inode2filename app_data_file:dir { getattr open read search };
26 allow iorap_inode2filename backup_data_file:dir { getattr open read search };
28 allow iorap_inode2filename bluetooth_data_file:dir { getattr open read search };
30 allow iorap_inode2filename bootchart_data_file:dir { getattr open read search };
32 allow iorap_inode2filename metadata_file:dir { getattr open read search search };
34 allow iorap_inode2filename packages_list_file:dir { getattr open read search };
[all …]
Dprofman.te5 allow profman user_profile_data_file:file { getattr read write lock map };
8 allow profman asec_apk_file:file { read map };
9 allow profman apk_data_file:file { getattr read map };
10 allow profman apk_data_file:dir { getattr read search };
12 allow profman oemfs:file { read map };
14 allow profman tmpfs:file { read map };
22 allow profman { privapp_data_file app_data_file }:file { getattr read write lock map };
23 allow profman { privapp_data_file app_data_file }:dir { getattr read search };
Ddnsmasq.te18 allow dnsmasq netd:fifo_file { getattr read write };
20 allow dnsmasq netd:netlink_kobject_uevent_socket { read write };
21 allow dnsmasq netd:netlink_nflog_socket { read write };
22 allow dnsmasq netd:netlink_route_socket { read write };
23 allow dnsmasq netd:unix_stream_socket { getattr read write };
24 allow dnsmasq netd:unix_dgram_socket { read write };
25 allow dnsmasq netd:udp_socket { read write };
/system/tools/mkbootimg/
Dunpack_bootimg.py39 file_out.write(bootimage.read(size))
75 kernel_ramdisk_second_info = unpack('9I', args.boot_img.read(9 * 4))
86 print_os_version_patch_level(unpack('I', args.boot_img.read(1 * 4))[0])
95 product_name = cstr(unpack('16s', args.boot_img.read(16))[0].decode())
97 cmdline = cstr(unpack('512s', args.boot_img.read(512))[0].decode())
100 cmdline = cstr(unpack('1536s', args.boot_img.read(1536))[0].decode())
104 args.boot_img.read(32) # ignore SHA
108 args.boot_img.read(1024))[0].decode())
123 recovery_dtbo_size = unpack('I', args.boot_img.read(1 * 4))[0]
125 recovery_dtbo_offset = unpack('Q', args.boot_img.read(8))[0]
[all …]
/system/sepolicy/prebuilts/api/26.0/
Dnonplat_sepolicy.cil1728 (allow servicemanager_26_0 bootanim_26_0 (file (read open)))
1739 (allow hwservicemanager_26_0 bootanim_26_0 (file (read open)))
1741 (allow bootanim_26_0 gpu_device_26_0 (chr_file (ioctl read write getattr lock append open)))
1743 (allow bootanim_26_0 oemfs_26_0 (file (ioctl read getattr lock open)))
1744 (allow bootanim_26_0 audio_device_26_0 (dir (ioctl read getattr lock search open)))
1745 (allow bootanim_26_0 audio_device_26_0 (chr_file (ioctl read write getattr lock append open)))
1748 (allow bootanim_26_0 ion_device_26_0 (chr_file (ioctl read write getattr lock append open)))
1751 (allow bootanim_26_0 proc_26_0 (dir (ioctl read getattr lock search open)))
1752 (allow bootanim_26_0 proc_26_0 (file (ioctl read getattr lock open)))
1753 (allow bootanim_26_0 proc_26_0 (lnk_file (ioctl read getattr lock open)))
[all …]
/system/sepolicy/prebuilts/api/27.0/
Dnonplat_sepolicy.cil1948 (allow servicemanager_27_0 bootanim_27_0 (file (read open)))
1959 (allow hwservicemanager_27_0 bootanim_27_0 (file (read open)))
1961 (allow bootanim_27_0 gpu_device_27_0 (chr_file (ioctl read write getattr lock append map open)))
1963 (allow bootanim_27_0 oemfs_27_0 (file (ioctl read getattr lock map open)))
1964 (allow bootanim_27_0 audio_device_27_0 (dir (ioctl read getattr lock search open)))
1965 (allow bootanim_27_0 audio_device_27_0 (chr_file (ioctl read write getattr lock append map open)))
1968 (allow bootanim_27_0 ion_device_27_0 (chr_file (ioctl read write getattr lock append map open)))
1971 (allow bootanim_27_0 proc_27_0 (dir (ioctl read getattr lock search open)))
1972 (allow bootanim_27_0 proc_27_0 (file (ioctl read getattr lock map open)))
1973 (allow bootanim_27_0 proc_27_0 (lnk_file (ioctl read getattr lock map open)))
[all …]
/system/sepolicy/prebuilts/api/28.0/
Dvendor_sepolicy.cil476 (allow init_28_0 hal_audio_default_exec (file (read getattr map execute open)))
478 (allow hal_audio_default hal_audio_default_exec (file (read getattr map execute entrypoint open)))
483 (allow hal_audio_default hal_audio_default_tmpfs (file (read write getattr map)))
485 (allow init_28_0 hal_audiocontrol_default_exec (file (read getattr map execute open)))
487 (allow hal_audiocontrol_default hal_audiocontrol_default_exec (file (read getattr map execute entry…
492 (allow hal_audiocontrol_default hal_audiocontrol_default_tmpfs (file (read write getattr map)))
494 (allow init_28_0 hal_authsecret_default_exec (file (read getattr map execute open)))
496 (allow hal_authsecret_default hal_authsecret_default_exec (file (read getattr map execute entrypoin…
501 (allow hal_authsecret_default hal_authsecret_default_tmpfs (file (read write getattr map)))
503 (allow init_28_0 hal_bluetooth_default_exec (file (read getattr map execute open)))
[all …]
Dplat_pub_versioned.cil3049 (allow appdomain zygote_exec_28_0 (file (ioctl read getattr lock map execute execute_no_trans open)…
3052 (allow appdomain cgroup_28_0 (file (ioctl read write getattr lock append map open)))
3054 (allow appdomain dalvikcache_data_file_28_0 (file (ioctl read getattr lock map open)))
3055 (allow base_typeattr_43_28_0 rootfs_28_0 (lnk_file (ioctl read getattr lock map open)))
3056 (allow base_typeattr_43_28_0 tmpfs_28_0 (lnk_file (ioctl read getattr lock map open)))
3057 (allow appdomain tmpfs_28_0 (dir (ioctl read getattr lock search open)))
3063 (allow appdomain devpts_28_0 (chr_file (ioctl read write getattr)))
3065 (allow appdomain system_server_28_0 (fifo_file (ioctl read write getattr lock append map open)))
3066 (allow appdomain system_server_28_0 (unix_stream_socket (read write getattr getopt setopt shutdown)…
3067 (allow appdomain system_server_28_0 (tcp_socket (read write getattr getopt shutdown)))
[all …]
/system/sepolicy/prebuilts/api/28.0/public/
Dprofman.te5 allow profman user_profile_data_file:file { getattr read write lock };
8 allow profman asec_apk_file:file { read };
9 allow profman apk_data_file:file { getattr read };
10 allow profman apk_data_file:dir { getattr read search };
12 allow profman oemfs:file { read };
14 allow profman tmpfs:file { read };
22 allow profman app_data_file:file { getattr read write lock };
23 allow profman app_data_file:dir { getattr read search };
Ddnsmasq.te18 allow dnsmasq netd:fifo_file { read write };
20 allow dnsmasq netd:netlink_kobject_uevent_socket { read write };
21 allow dnsmasq netd:netlink_nflog_socket { read write };
22 allow dnsmasq netd:netlink_route_socket { read write };
23 allow dnsmasq netd:unix_stream_socket { read write };
24 allow dnsmasq netd:unix_dgram_socket { read write };
25 allow dnsmasq netd:udp_socket { read write };
/system/sepolicy/prebuilts/api/29.0/public/
Dprofman.te5 allow profman user_profile_data_file:file { getattr read write lock map };
8 allow profman asec_apk_file:file { read map };
9 allow profman apk_data_file:file { getattr read map };
10 allow profman apk_data_file:dir { getattr read search };
12 allow profman oemfs:file { read map };
14 allow profman tmpfs:file { read map };
22 allow profman { privapp_data_file app_data_file }:file { getattr read write lock map };
23 allow profman { privapp_data_file app_data_file }:dir { getattr read search };
Ddnsmasq.te18 allow dnsmasq netd:fifo_file { getattr read write };
20 allow dnsmasq netd:netlink_kobject_uevent_socket { read write };
21 allow dnsmasq netd:netlink_nflog_socket { read write };
22 allow dnsmasq netd:netlink_route_socket { read write };
23 allow dnsmasq netd:unix_stream_socket { getattr read write };
24 allow dnsmasq netd:unix_dgram_socket { read write };
25 allow dnsmasq netd:udp_socket { read write };
Dclatd.te9 auditallow clatd proc_net_type:{ dir file lnk_file } { getattr open read };
14 allow clatd netd:fifo_file { read write };
16 allow clatd netd:netlink_kobject_uevent_socket { read write };
17 allow clatd netd:netlink_nflog_socket { read write };
18 allow clatd netd:netlink_route_socket { read write };
19 allow clatd netd:udp_socket { read write };
20 allow clatd netd:unix_stream_socket { read write };
21 allow clatd netd:unix_dgram_socket { read write };
/system/sepolicy/prebuilts/api/26.0/public/
Ddnsmasq.te18 allow dnsmasq netd:fifo_file { read write };
20 allow dnsmasq netd:netlink_kobject_uevent_socket { read write };
21 allow dnsmasq netd:netlink_nflog_socket { read write };
22 allow dnsmasq netd:netlink_route_socket { read write };
23 allow dnsmasq netd:unix_stream_socket { read write };
24 allow dnsmasq netd:unix_dgram_socket { read write };
25 allow dnsmasq netd:udp_socket { read write };
Dprofman.te5 allow profman user_profile_data_file:file { getattr read write lock };
8 allow profman asec_apk_file:file { read };
9 allow profman apk_data_file:file { read };
10 allow profman oemfs:file { read };
12 allow profman tmpfs:file { read };
20 allow profman app_data_file:file { getattr read write lock };
/system/sepolicy/prebuilts/api/27.0/public/
Ddnsmasq.te18 allow dnsmasq netd:fifo_file { read write };
20 allow dnsmasq netd:netlink_kobject_uevent_socket { read write };
21 allow dnsmasq netd:netlink_nflog_socket { read write };
22 allow dnsmasq netd:netlink_route_socket { read write };
23 allow dnsmasq netd:unix_stream_socket { read write };
24 allow dnsmasq netd:unix_dgram_socket { read write };
25 allow dnsmasq netd:udp_socket { read write };
Dprofman.te5 allow profman user_profile_data_file:file { getattr read write lock };
8 allow profman asec_apk_file:file { read };
9 allow profman apk_data_file:file { read };
10 allow profman oemfs:file { read };
12 allow profman tmpfs:file { read };
20 allow profman app_data_file:file { getattr read write lock };
Ddex2oat.te10 allow dex2oat vendor_framework_file:file { getattr open read };
12 allow dex2oat tmpfs:file { read getattr };
18 allow dex2oat dalvikcache_data_file:lnk_file read;
27 allow dex2oat asec_apk_file:file read;
28 allow dex2oat unlabeled:file read;
29 allow dex2oat oemfs:file read;
32 allow dex2oat user_profile_data_file:file { getattr read lock };
36 allow dex2oat app_data_file:file { getattr read write lock };
47 allow dex2oat postinstall_file:lnk_file read;
53 # Create and read symlinks in /data/ota/dalvik-cache. This is required for PIC mode boot images,
[all …]
/system/sepolicy/private/
Dclatd.te9 auditallow clatd proc_net_type:{ dir file lnk_file } { getattr open read };
14 allow clatd netd:fifo_file { read write };
16 allow clatd netd:netlink_kobject_uevent_socket { read write };
17 allow clatd netd:netlink_nflog_socket { read write };
18 allow clatd netd:netlink_route_socket { read write };
19 allow clatd netd:udp_socket { read write };
20 allow clatd netd:unix_stream_socket { read write };
21 allow clatd netd:unix_dgram_socket { read write };
/system/sepolicy/prebuilts/api/30.0/private/
Dclatd.te9 auditallow clatd proc_net_type:{ dir file lnk_file } { getattr open read };
14 allow clatd netd:fifo_file { read write };
16 allow clatd netd:netlink_kobject_uevent_socket { read write };
17 allow clatd netd:netlink_nflog_socket { read write };
18 allow clatd netd:netlink_route_socket { read write };
19 allow clatd netd:udp_socket { read write };
20 allow clatd netd:unix_stream_socket { read write };
21 allow clatd netd:unix_dgram_socket { read write };

12345678910>>...46