Home
last modified time | relevance | path

Searched refs:file (Results 1 – 25 of 986) sorted by relevance

12345678910>>...40

/device/google/bonito-sepolicy/vendor/qcom/common/
Dhal_dumpstate_impl.te8 allow hal_dumpstate_impl vendor_shell_exec:file rx_file_perms;
9 allow hal_dumpstate_impl vendor_toolbox_exec:file rx_file_perms;
11 # Allow to read pixel-trace trace file
13 allow hal_dumpstate_impl debugfs_tracing_instances:file r_file_perms;
19 allow hal_dumpstate_impl netmgr_data_file:file r_file_perms;
21 allow hal_dumpstate_impl sysfs_usb_device:file r_file_perms;
23 allow hal_dumpstate_impl ssr_log_file:file r_file_perms;
25 allow hal_dumpstate_impl tcpdump_vendor_data_file:file create_file_perms;
30 allow hal_dumpstate_impl perfstatsd_exec:file rx_file_perms;
37 allow hal_dumpstate_impl sensors_vendor_data_file:file r_file_perms;
[all …]
Dueventd.te1 allow ueventd sysfs_thermal:file w_file_perms;
2 allow ueventd sysfs_leds:file w_file_perms;
3 allow ueventd sysfs_camera:file w_file_perms;
4 allow ueventd sysfs_easel:file w_file_perms;
5 allow ueventd sysfs_fingerprint:file w_file_perms;
6 allow ueventd sysfs_graphics:file w_file_perms;
7 allow ueventd sysfs_laser:file w_file_perms;
8 allow ueventd sysfs_rmtfs:file w_file_perms;
9 allow ueventd sysfs_scsi_devices_0000:file write;
10 allow ueventd sysfs_soc:file w_file_perms;
[all …]
Dinit-devstart-sh.te6 allow init-qcom-devstart-sh vendor_shell_exec:file rx_file_perms;
7 allow init-qcom-devstart-sh vendor_toolbox_exec:file rx_file_perms;
10 allow init-qcom-devstart-sh vendor_file:file rx_file_perms;
18 allow init-qcom-devstart-sh sysfs_msm_subsys:file w_file_perms;
21 allow init-qcom-devstart-sh sysfs_chargelevel:file rw_file_perms;
27 allow init-qcom-devstart-sh sysfs_pinctrl:file rw_file_perms;
28 allow init-qcom-devstart-sh sysfs_gpio_export:file w_file_perms;
30 allow init-qcom-devstart-sh sysfs_soc:file r_file_perms;
32 allow init-qcom-devstart-sh sysfs_msm_subsys:file r_file_perms;
33 allow init-qcom-devstart-sh sysfs_scsi_devices_0000:file r_file_perms;
[all …]
Dhardware_info_app.te6 allow hardware_info_app app_data_file:file execute;
13 allow hardware_info_app shell_data_file:file { open read };
17 allow hardware_info_app sysfs_batteryinfo:file { getattr open read };
19 allow hardware_info_app sysfs_camera:file { getattr open read };
22 allow hardware_info_app sysfs_mmc:file r_file_perms;
24 allow hardware_info_app sysfs_soc:file { getattr open read };
26 allow hardware_info_app sysfs_display:file { getattr open read };
Dwcnss_service.te12 allow wcnss_service vendor_shell_exec:file rx_file_perms;
13 allow wcnss_service vendor_toolbox_exec:file rx_file_perms;
15 allow wcnss_service proc_net:file w_file_perms;
24 allow wcnss_service cnss_vendor_data_file:file create_file_perms;
26 allow wcnss_service proc_net:file getattr;
32 allow wcnss_service wifi_vendor_log_data_file:file create_file_perms;
37 allow wcnss_service sysfs_soc:file r_file_perms;
41 # used for collecting the sku for radio for BDF file selection
Dhal_fingerprint.te2 allow hal_fingerprint sysfs_fingerprint:file rw_file_perms;
4 allow hal_fingerprint sysfs_msm_subsys:file r_file_perms;
6 allow hal_fingerprint sysfs_camera:file r_file_perms;
8 allow hal_fingerprint sysfs_leds:file r_file_perms;
10 allow hal_fingerprint sysfs_pinctrl:file r_file_perms;
12 allow hal_fingerprint tee_device:file rw_file_perms;
/device/google/coral-sepolicy/vendor/google/
Dhal_dumpstate_impl.te8 allow hal_dumpstate_impl vendor_shell_exec:file rx_file_perms;
9 allow hal_dumpstate_impl vendor_toolbox_exec:file rx_file_perms;
13 allow hal_dumpstate_impl sysfs_touch:file rw_file_perms;
14 allow hal_dumpstate_impl proc_touch:file rw_file_perms;
17 allow hal_dumpstate_impl debugfs_f2fs:file r_file_perms;
19 allow hal_dumpstate_impl debugfs_ufs:file r_file_perms;
21 allow hal_dumpstate_impl debugfs_ipc:file r_file_perms;
23 allow hal_dumpstate_impl proc_f2fs:file r_file_perms;
27 allow hal_dumpstate_impl sysfs_display:file r_file_perms;
31 allow hal_dumpstate_impl sysfs_scsi_devices_0000:file r_file_perms;
[all …]
/device/google/crosshatch-sepolicy/vendor/qcom/common/
Dhal_dumpstate_impl.te8 allow hal_dumpstate_impl vendor_shell_exec:file rx_file_perms;
9 allow hal_dumpstate_impl vendor_toolbox_exec:file rx_file_perms;
11 # Allow to read pixel-trace trace file
13 allow hal_dumpstate_impl debugfs_tracing_instances:file r_file_perms;
17 allow hal_dumpstate_impl sysfs_usb_device:file r_file_perms;
19 allow hal_dumpstate_impl ssr_log_file:file r_file_perms;
21 allow hal_dumpstate_impl tcpdump_vendor_data_file:file create_file_perms;
26 allow hal_dumpstate_impl modem_dump_file:file create_file_perms;
31 allow hal_dumpstate_impl radio_vendor_data_file:file r_file_perms;
33 allow hal_dumpstate_impl netmgr_data_file:file r_file_perms;
[all …]
Dueventd.te1 allow ueventd sysfs_thermal:file w_file_perms;
2 allow ueventd sysfs_leds:file w_file_perms;
3 allow ueventd sysfs_camera:file w_file_perms;
4 allow ueventd sysfs_easel:file w_file_perms;
5 allow ueventd sysfs_fingerprint:file w_file_perms;
6 allow ueventd sysfs_graphics:file w_file_perms;
7 allow ueventd sysfs_laser:file w_file_perms;
8 allow ueventd sysfs_rmtfs:file w_file_perms;
9 allow ueventd sysfs_scsi_devices_0000:file write;
10 allow ueventd sysfs_soc:file w_file_perms;
[all …]
Dinit-devstart-sh.te6 allow init-qcom-devstart-sh vendor_shell_exec:file rx_file_perms;
7 allow init-qcom-devstart-sh vendor_toolbox_exec:file rx_file_perms;
10 allow init-qcom-devstart-sh vendor_file:file rx_file_perms;
18 allow init-qcom-devstart-sh sysfs_msm_subsys:file w_file_perms;
24 allow init-qcom-devstart-sh sysfs_pinctrl:file rw_file_perms;
25 allow init-qcom-devstart-sh sysfs_gpio_export:file w_file_perms;
27 allow init-qcom-devstart-sh sysfs_soc:file r_file_perms;
29 allow init-qcom-devstart-sh sysfs_msm_subsys:file r_file_perms;
30 allow init-qcom-devstart-sh sysfs_scsi_devices_0000:file r_file_perms;
31 allow init-qcom-devstart-sh sysfs_pixelstats:file r_file_perms;
[all …]
Dhal_fingerprint.te2 allow hal_fingerprint sysfs_fingerprint:file rw_file_perms;
4 allow hal_fingerprint sysfs_msm_subsys:file r_file_perms;
6 allow hal_fingerprint sysfs_camera:file r_file_perms;
8 allow hal_fingerprint sysfs_leds:file r_file_perms;
10 allow hal_fingerprint sysfs_pinctrl:file r_file_perms;
12 allow hal_fingerprint tee_device:file rw_file_perms;
/device/google/wahoo/sepolicy/vendor/
Dbug_map2 bootanim vendor_default_prop file b/79617173
5 hal_audio_default default_prop file b/77926553
10 hal_camera_default radio_prop file b/77865891
11 hal_health_default persist_file file b/127303305
12 hal_nfc_default default_prop file b/119670542
14 installd media_rw_data_file file b/77926261
16 netutils_wrapper sysfs_timestamp_switch file b/77871509
20 nfc vendor_default_prop file b/79617173
21 priv_app vendor_default_prop file b/79617173
22 platform_app vendor_default_prop file b/79617173
[all …]
Dhal_dumpstate_impl.te8 allow hal_dumpstate_impl vendor_shell_exec:file rx_file_perms;
9 allow hal_dumpstate_impl vendor_toolbox_exec:file rx_file_perms;
11 # Allow to read pixel-trace trace file
13 allow hal_dumpstate_impl debugfs_tracing_instances:file r_file_perms;
19 allow hal_dumpstate_impl modem_dump_file:file create_file_perms;
22 allow hal_dumpstate_impl radio_vendor_data_file:file r_file_perms;
23 allow hal_dumpstate_impl netmgr_data_file:file r_file_perms;
25 allow hal_dumpstate_impl debugfs_tzdbg:file r_file_perms;
27 allow hal_dumpstate_impl sysfs_usb_device:file r_file_perms;
28 allow hal_dumpstate_impl sysfs_msm_subsys:file write;
[all …]
Dinit_power.te8 allow init_power vendor_shell_exec:file rx_file_perms;
9 allow init_power vendor_toolbox_exec:file rx_file_perms;
13 allow init_power sysfs_msm_subsys:file write;
15 allow init_power sysfs_thermal:file w_file_perms;
16 allow init_power sysfs_devices_system_cpu:file w_file_perms;
17 allow init_power sysfs_soc:file r_file_perms;
19 allow init_power sysfs_console_suspend:file w_file_perms;
Dhardware_info_app.te6 allow hardware_info_app app_data_file:file execute;
13 allow hardware_info_app shell_data_file:file { open read };
17 allow hardware_info_app sysfs_batteryinfo:file { getattr open read };
19 allow hardware_info_app sysfs_camera:file { getattr open read };
22 allow hardware_info_app sysfs_scsi_devices_0000:file { getattr open read };
24 allow hardware_info_app sysfs_soc:file { getattr open read };
28 allow hardware_info_app debugfs_ufs:file r_file_perms;
/device/google/crosshatch-sepolicy/vendor/google/
Dbug_map1 bootanim vendor_default_prop file b/79617173
3 dataservice_app vendor_default_prop file b/79617173
4 factory_ota_app vendor_default_prop file b/79617173
7 hal_camera_default persist_file file b/123018469
9 hal_health_default persist_file file b/127303305
11 init sysfs_graphics file b/126568362
12 netmgrd system_file file b/117232795
13 platform_app vendor_default_prop file b/79617173
15 priv_app vendor_default_prop file b/79617173
17 sensors unlabeled file b/142784012
[all …]
/device/generic/goldfish/sepolicy/common/
Dgoldfish_setup.te11 allow goldfish_setup vendor_toolbox_exec:file execute_no_trans;
12 allow goldfish_setup vendor_file:file execute_no_trans;
15 allow goldfish_setup vendor_shell_exec:file { rx_file_perms };
17 allow goldfish_setup goldfish_ip_exec:file execute_no_trans;
18 allow goldfish_setup goldfish_iw_exec:file execute_no_trans;
19 allow goldfish_setup mac80211_create_radios_exec:file execute_no_trans;
29 allow goldfish_setup varrun_file:file { mounton getattr create read write open unlink };
30 allow goldfish_setup execns_exec:file rx_file_perms;
31 allow goldfish_setup proc_net:file rw_file_perms;
32 allow goldfish_setup proc:file r_file_perms;
[all …]
Dbug_map2 hal_wifi_default default_prop file b/131598173
5 init vendor_toolbox_exec file b/132695863
6 installd device file b/131595213
8 netd device file b/131598170
9 platform_app vendor_default_prop file b/130684647
12 storaged device file b/131598843
18 gsid device file b/133324244
/device/google/bonito-sepolicy/vendor/google/
Dbug_map1 bootanim vendor_default_prop file b/78460200
3 dataservice_app vendor_default_prop file b/78460200
12 platform_app vendor_default_prop file b/78460200
13 priv_app vendor_default_prop file b/78460200
16 sensors vendor_modem_diag_prop file b/78460200
18 ssr_setup vendor_ssr_prop file b/78460200
19 system_app vendor_default_prop file b/78460200
20 system_server vendor_default_prop file b/78460200
22 untrusted_app vendor_default_prop file b/78460200
/device/linaro/poplar/sepolicy/
Dpriv_app.te2 allow priv_app sysfs:file { getattr }; # open read
3 allow priv_app proc_stat:file { read write open getattr };
4 allow priv_app sysfs_hisi:file { read write open getattr };
5 allow priv_app proc_uptime:file { getattr open read };
7 allow priv_app proc_interrupts:file { open };
8 allow priv_app proc_modules:file { open };
9 allow priv_app sysfs_android_usb:file { open };
12 allow priv_app hi_overlay_file:file { read open getattr };
/device/generic/goldfish/tools/
Dmk_qemu_ramdisk.py14 with open(f1name, mode='rb') as file:
15 f1buffer = file.read()
17 with open(f2name, mode='rb') as file:
18 f2buffer = file.read()
29 with open(f3name, mode='wb') as file:
30 file.write(f1buffer)
31 file.write(vendorramimg)
/device/google/coral-sepolicy/vendor/qcom/common/
Dhardware_info_app.te6 allow hardware_info_app app_data_file:file execute;
13 allow hardware_info_app shell_data_file:file r_file_perms;
17 allow hardware_info_app sysfs_display:file r_file_perms;
21 allow hardware_info_app sysfs_soc:file r_file_perms;
25 allow hardware_info_app sysfs_batteryinfo:file r_file_perms;
27 allow hardware_info_app debugfs_batteryinfo:file r_file_perms;
30 allow hardware_info_app sysfs_scsi_devices_0000:file r_file_perms;
34 allow hardware_info_app sysfs_audio:file r_file_perms;
/device/google/cuttlefish/host/libs/config/
Dfetcher_config.cpp102 bool FetcherConfig::SaveToFile(const std::string& file) const { in SaveToFile()
103 std::ofstream ofs(file); in SaveToFile()
105 LOG(ERROR) << "Unable to write to file " << file; in SaveToFile()
112 bool FetcherConfig::LoadFromFile(const std::string& file) { in LoadFromFile() argument
113 auto real_file_path = cuttlefish::AbsolutePath(file); in LoadFromFile()
115 LOG(ERROR) << "Could not get real path for file " << file; in LoadFromFile()
121 LOG(ERROR) << "Could not read config file " << file << ": " in LoadFromFile()
176 bool FetcherConfig::add_cvd_file(const CvdFile& file, bool override_entry) { in add_cvd_file() argument
181 if ((*dictionary_)[kCvdFiles].isMember(file.file_path) && !override_entry) { in add_cvd_file()
184 (*dictionary_)[kCvdFiles][file.file_path] = CvdFileToJson(file); in add_cvd_file()
[all …]
/device/google/cuttlefish/common/libs/utils/
Darchive.cpp29 Archive::Archive(const std::string& file) : file(file) { in Archive() argument
38 bsdtar_cmd.AddParameter(file); in Contents()
43 LOG(ERROR) << "`bsdtar -tf \"" << file << "\"` returned " << bsdtar_ret; in Contents()
62 bsdtar_cmd.AddParameter(file); in ExtractFiles()
71 LOG(ERROR) << "bsdtar extraction on \"" << file << "\" returned " << bsdtar_ret; in ExtractFiles()
79 bsdtar_cmd.AddParameter(file); in ExtractToMemory()
86 LOG(ERROR) << "Could not extract \"" << path << "\" from \"" << file in ExtractToMemory()
/device/linaro/dragonboard/sepolicy/
Dcrash_dump.te2 allow crash_dump bluetooth_data_file:file { getattr map open read };
3 allow crash_dump bluetooth_prop:file { getattr map open };
4 allow crash_dump device_config_runtime_native_boot_prop:file { getattr map open };
5 allow crash_dump device_config_runtime_native_prop:file { getattr map open };
6 allow crash_dump hwservicemanager_prop:file { getattr map open };
7 allow crash_dump runtime_event_log_tags_file:file getattr;

12345678910>>...40