Home
last modified time | relevance | path

Searched refs:write (Results 1 – 25 of 534) sorted by relevance

12345678910>>...22

/base/request/request/services/service/rust/src/
Drequest_service_ability.rs314 client_data.write::<InterfaceToken>(&notify_token).ok(); in notify_client()
315 client_data.write(&cb_type).ok(); in notify_client()
316 client_data.write(&(notify_data.task_id.to_string())).ok(); in notify_client()
318 .write(&(notify_data.progress.common_data.state as u32)) in notify_client()
321 client_data.write(&(index as u32)).ok(); in notify_client()
323 .write(&(notify_data.progress.processed[index] as u64)) in notify_client()
326 .write(&(notify_data.progress.common_data.total_processed as u64)) in notify_client()
328 client_data.write(&(notify_data.progress.sizes)).ok(); in notify_client()
330 .write(&(notify_data.progress.extras.len() as u32)) in notify_client()
333 client_data.write(&k).ok(); in notify_client()
[all …]
Drequest_service.rs53 reply.write(&(ErrorCode::Permission as i32)); in construct()
87 reply.write(&(ErrorCode::Ipc_size_too_large as i32)); in construct()
101 reply.write(&(ErrorCode::Ipc_size_too_large as i32)); in construct()
123 reply.write(&(ErrorCode::Ipc_size_too_large as i32)); in construct()
136 reply.write(&(ErrorCode::Ipc_size_too_large as i32)); in construct()
182 reply.write(&(ret as i32))?; in construct()
187 reply.write(&(task_id as i32))?; in construct()
197 reply.write(&(ErrorCode::Permission as i32)); in pause()
206 reply.write(&(ret as i32))?; in pause()
215 reply.write(&(ErrorCode::TaskNotFound as i32)); in pause()
[all …]
/base/startup/init/scripts/
Dparam_cfg_to_code.py81 f.write('#ifndef PARAM_LITE_DEF_CFG_' + os.linesep)
82 f.write('#define PARAM_LITE_DEF_CFG_' + os.linesep)
83 f.write('#include <stdint.h>' + os.linesep + os.linesep)
84 f.write('#ifdef __cplusplus' + os.linesep)
85 f.write('#if __cplusplus' + os.linesep)
86 f.write('extern "C" {' + os.linesep)
87 f.write('#endif' + os.linesep)
88 f.write('#endif' + os.linesep + os.linesep)
91 f.write('typedef struct Node_ {' + os.linesep)
92 f.write(' const char *name;' + os.linesep)
[all …]
/base/security/selinux_adapter/sepolicy/base/te/
Dudevd.te25 allow udevd data_file:dir { add_name create read remove_name watch write };
28 allow udevd data_udev:dir { add_name create getattr open read remove_name search watch write };
29 allow udevd data_udev:file { create ioctl open read rename unlink write write open };
34 allow udevd dev_bbox:chr_file { getattr write };
37 allow udevd dev_bus_usb_file:chr_file { getattr write };
39 allow udevd dev_char_file:dir { add_name getattr search write };
40 allow udevd dev_char_file:lnk_file { create getattr read write };
41 allow udevd dev_console_file:chr_file { getattr write };
42 allow udevd dev_cpu_dma_latency_file:chr_file { getattr write };
43 allow udevd dev_dev_cec0:chr_file { getattr write };
[all …]
Dkernel.te14 allow kernel data_file:dir { add_name write create search setattr };
15 allow kernel data_log:dir { add_name create search setattr write };
16 allow kernel data_log:file { append create read write open setattr };
17 allow kernel dev_bbox:chr_file { open write };
19 allow kernel device:dir { add_name remove_name rmdir search write };
23 allow kernel pstorefs:dir { open read remove_name search write };
25 allow kernel softbus_server:tcp_socket { read write };
27 allow kernel tmpfs:chr_file { write };
/base/startup/init/services/etc/
Dinit.cfg10 "write /proc/sys/kernel/sysrq 0",
11 "write /proc/sys/kernel/dmesg_restrict 1",
12 "write /proc/sys/kernel/kptr_restrict 1",
42 "write /proc/sys/kernel/panic_on_oops 1",
43 "write /proc/sys/kernel/hung_task_timeout_secs 0",
44 "write /proc/cpu/alignment 4",
45 "write /proc/sys/kernel/sched_tunable_scaling 0",
46 "write /proc/sys/kernel/sched_latency_ns 10000000",
47 "write /proc/sys/kernel/sched_wakeup_granularity_ns 2000000",
48 "write /proc/sys/kernel/sched_child_runs_first 0",
[all …]
Dinit.without_two_stages.cfg10 "write /proc/sys/kernel/sysrq 0",
30 "write /proc/sys/kernel/panic_on_oops 1",
31 "write /proc/sys/kernel/hung_task_timeout_secs 0",
32 "write /proc/cpu/alignment 4",
33 "write /proc/sys/kernel/sched_tunable_scaling 0",
34 "write /proc/sys/kernel/sched_latency_ns 10000000",
35 "write /proc/sys/kernel/sched_wakeup_granularity_ns 2000000",
36 "write /proc/sys/kernel/sched_child_runs_first 0",
37 "write /proc/sys/kernel/randomize_va_space 2",
38 "write /proc/sys/vm/mmap_min_addr 32768",
[all …]
/base/security/selinux_adapter/sepolicy/ohos_policy/communication/netmanager/system/
Dnetsysnative.te16 allow netsysnative netsysnative:netlink_route_socket { create listen nlmsg_write write };
24 allow netsysnative proc_file:file { write open read };
28 allow netsysnative tty_device:chr_file { open read write };
29 allow netsysnative netsysnative:udp_socket { bind read getopt setopt connect write };
33 allow netsysnative dev_file:sock_file { write unlink };
34 allow netsysnative dev_console_file:chr_file { read write };
41 allow netsysnative data_service_el1_file:dir { search write add_name };
42 allow netsysnative data_service_el1_file:file { create write open ioctl read };
43 allow netsysnative fwmark_service:sock_file { create unlink setattr write };
47 allow netsysnative normal_hap_attr:tcp_socket { read write getopt setopt };
[all …]
/base/security/selinux_adapter/sepolicy/ohos_policy/hiviewdfx/hilog/system/
Dhilogd.te18 allow $1 hilog_input_socket:sock_file write;
24 allow $1 hilog_output_socket:sock_file write;
30 allow $1 hilog_control_socket:sock_file write;
73 allow hilogd data_init_agent:dir { add_name search write };
79 allow hilogd init:unix_dgram_socket { getattr getopt read write };
83 allow hilogd paramservice_socket:sock_file { write };
95 # hilogd is not allowed to write anywhere other than /data/log/hilog
100 }:file { create write append };
108 # write to /system
109 neverallow hilogd system_file:dir_file_class_set write;
[all …]
/base/security/selinux_adapter/sepolicy/ohos_policy/bundlemanager/bundle_framework/system/
Dinstalls.te16 allow installs data_app_el1_file:dir { add_name getattr open read remove_name rmdir search write };
18 …data_app_el2_file:dir { add_name create getattr open read remove_name search setattr write rmdir };
22 allow installs data_service_el1_file:file { create setattr unlink getattr open read rename write io…
23 allow installs data_service_el2_file:dir { add_name create open read search setattr write getattr r…
28 …a_file_attr:dir { getattr open read relabelfrom relabelto remove_name rmdir search setattr write };
32 allow installs selinuxfs:file { open read write };
34 …a_file_attr:dir { open read relabelfrom relabelto remove_name rmdir search getattr setattr write };
35 …a_file_attr:dir { getattr open read relabelfrom relabelto remove_name rmdir search setattr write };
39 …service_el2_share:dir { add_name create open read search remove_name setattr write getattr rmdir };
40 allow installs data_local:file { create getattr ioctl setattr unlink map read open write };
[all …]
/base/security/selinux_adapter/sepolicy/ohos_policy/hiviewdfx/hitrace/system/
Dhitrace.te14 #allow hitrace data_file:file write;
17 allow hitrace data_log:dir { add_name search write };
18 allow hitrace data_log:file { create getattr open write };
19 allow hitrace data_local_tmp:dir { add_name search write create };
20 allow hitrace data_local_tmp:file { create getattr open write };
23 allow hitrace devpts:chr_file { read write };
25 allow hitrace hdcd:unix_stream_socket { read write };
29 allow hitrace tracefs_trace_marker_file:file { getattr open write };
30 allow hitrace tty_device:chr_file { read write };
31 allow hitrace tracefs:file { getattr ioctl open read write };
[all …]
/base/security/selinux_adapter/sepolicy/ohos_policy/developtools/bytrace/system/
Dbytrace.te14 #allow bytrace data_file:file write;
17 allow bytrace data_log:dir { add_name search write };
18 allow bytrace data_log:file { create getattr open write };
19 allow bytrace data_local_tmp:dir { add_name search write create };
20 allow bytrace data_local_tmp:file { create getattr open write };
23 allow bytrace devpts:chr_file { read write };
25 allow bytrace hdcd:unix_stream_socket { read write };
29 allow bytrace tracefs_trace_marker_file:file { getattr open write };
30 allow bytrace tty_device:chr_file { read write };
31 allow bytrace tracefs:file { getattr ioctl open read write };
[all …]
/base/security/selinux_adapter/sepolicy/ohos_policy/filemanagement/dfs_service/system/
Dcloudfiledaemon.te18 allow cloudfiledaemon paramservice_socket:sock_file { write };
28 allow cloudfiledaemon data_app_file:dir { search open read write };
29 allow cloudfiledaemon data_app_el2_file:dir { search read write open };
30 allow cloudfiledaemon data_app_el2_file:file { lock getattr open read write ioctl map };
31 allow cloudfiledaemon dev_fuse_file:chr_file { read write };
33 allow cloudfiledaemon data_service_el2_hmdfs:dir { create search read open write add_name remove_na…
34 allow cloudfiledaemon data_service_el2_hmdfs:file { create setattr getattr read open write append i…
35 allow cloudfiledaemon hmdfs:dir { search write remove_name add_name create open read rmdir };
44 allow cloudfiledaemon dev_console_file:chr_file { read write };
46 allow cloudfiledaemon data_service_el1_file:dir { search write add_name create remove_name };
[all …]
/base/security/selinux_adapter/sepolicy/ohos_policy/multimodalinput/input/system/
Dudevd.te18 allow udevd data_service_el1_file:dir { search write add_name create getattr remove_name read open …
19 allow udevd data_service_el1_file:file { create unlink write open ioctl read rename };
24 allow udevd dev_char_file:dir { search write remove_name };
26 allow udevd dev_dri_file:chr_file { getattr write };
27 allow udevd dev_dri_file:dir { add_name search write };
28 allow udevd dev_file:dir { add_name create write };
31 allow udevd dev_input_file:lnk_file { getattr read write unlink rename };
32 allow udevd dev_ptmx:chr_file { write getattr };
36 allow udevd tty_device:chr_file { open read write };
39 allow udevd udevd:netlink_kobject_uevent_socket { getattr setopt write };
Dmultimodalinput.te19 allow multimodalinput data_log:dir { search write add_name create };
20 allow multimodalinput data_log:file { create open read write ioctl };
21 …nput data_multimodalinput:dir { add_name create getattr open read remove_name search watch write };
22 allow multimodalinput data_multimodalinput:file { create open read rename unlink write setattr geta…
27 allow multimodalinput dev_console_file:chr_file { open read write getattr ioctl };
29 allow multimodalinput dev_dri_file:chr_file { open read write getattr ioctl };
30 allow multimodalinput dev_kmsg_file:chr_file { open write };
34 allow multimodalinput dev_unix_socket:sock_file { write };
38 allow multimodalinput faultloggerd_socket:sock_file { write };
49 allow multimodalinput rootfs:chr_file { write };
[all …]
/base/security/selinux_adapter/sepolicy/ohos_policy/update/updater_sa/system/
Dupdater_sa.te17 allow updater_sa updater_sa:tcp_socket { connect create read setopt write getopt getattr };
20 allow updater_sa data_ota_package:dir { add_name search write remove_name getattr };
23 allow updater_sa dev_file:sock_file { write };
25 allow updater_sa updater_sa:udp_socket { create bind connect getattr read write };
33 allow updater_sa data_service_el1_file:dir { search write add_name remove_name read open getattr };
34 allow updater_sa data_service_el1_file:file { create getattr read write open lock ioctl unlink map …
40 allow updater_sa update_firmware_file:dir { search read open write getattr add_name remove_name };
41 …updater_sa update_firmware_file:file {create read append open getattr unlink setattr ioctl write };
43 allow updater_sa data_file:dir { read open write getattr setattr add_name remove_name };
45 allow updater_sa data_updater_file:dir { search getattr write add_name create };
[all …]
/base/security/appverify/interfaces/innerkits/appverify/test/unittest/src/
Dhap_signing_block_utils_test.cpp56 hapFile.write(block, sizeof(block)); in CreatTestZipFile()
62 hapFile.write(reinterpret_cast<char*>(&signBlob), sizeof(signBlob)); in CreatTestZipFile()
63 hapFile.write(reinterpret_cast<char*>(&profileBlob), sizeof(profileBlob)); in CreatTestZipFile()
64 hapFile.write(reinterpret_cast<char*>(&propertyBlob), sizeof(propertyBlob)); in CreatTestZipFile()
66 hapFile.write(block, sizeof(block)); in CreatTestZipFile()
69 hapFile.write(reinterpret_cast<char*>(&blockCount), sizeof(blockCount)); in CreatTestZipFile()
72 hapFile.write(reinterpret_cast<char*>(&signBlockSize), sizeof(signBlockSize)); in CreatTestZipFile()
74 hapFile.write(reinterpret_cast<char*>(&magic), sizeof(magic)); in CreatTestZipFile()
76 hapFile.write(reinterpret_cast<char*>(&magic), sizeof(magic)); in CreatTestZipFile()
78 hapFile.write(reinterpret_cast<char*>(&version), sizeof(version)); in CreatTestZipFile()
[all …]
/base/security/selinux_adapter/sepolicy/ohos_policy/developtools/hdc/system/
Dhdcd.te15 allow hdcd data_local:file { read open getattr create write };
16 allow hdcd data_local:dir { search getattr read write add_name open create };
17 allow hdcd data_local_tmp:file { write create setattr read append open getattr unlink };
18 allow hdcd data_local_tmp:dir { add_name remove_name write create setattr search getattr read open …
24 allow hdcd self:tcp_socket { accept ioctl setopt read write create bind listen getattr connect name…
37 allow hdcd dev_rtc_file:chr_file { write open ioctl };
42 allow hdcd data_file:dir { read write open create getattr search rmdir add_name };
47 allow hdcd tty_device:chr_file { ioctl read write open };
57 allow hdcd dev_unix_socket:sock_file { write };
59 allow hdcd data_init_agent:dir { search write add_name };
[all …]
/base/update/packaging_tools/test/
Dtest_utils.py53 zip_obj.write('test_dir', 'test_dir')
64 w_f.write('test')
65 zip_obj.write(UPDATER_CONFIG, UPDATER_CONFIG)
66 zip_obj.write('test.file', 'test.file')
81 w_f.write(UPDATER_SPECIFIED_CONFIG_REPEATS.encode())
103 w_f.write('test')
121 w_f.write('test content')
135 w_f.write('test content')
137 w_f.write('test content')
153 w_f.write(PARTITION_FILE_CONVERSION_FAILED)
/base/security/selinux_adapter/sepolicy/base/public/
Dhap_domain.te47 allow hap_domain appspawn:fifo_file write;
48 allow hap_domain appspawn:unix_dgram_socket { connect write };
51 allow hap_domain data_app_el1_file:dir { add_name create open read search setattr write };
53 allow hap_domain data_app_el2_file:dir { add_name search read write create open remove_name setattr…
54 allow hap_domain data_app_el2_file:file { create read write open lock ioctl unlink map setattr geta…
58 …omain data_file:file { create getattr ioctl lock map open read write rename setattr unlink write };
59 allow hap_domain data_log:file { read write };
89 neverallow hap_domain dev_attr:blk_file { read write };
93 …nix_socket_file -dev_mali -tty_device -dev_fuse_file -dev_bbox }:chr_file { open ioctl read write};
96 …e -dev_mali -tty_device -dev_fuse_file -dev_tun_file -dev_bbox }:chr_file { open ioctl read write};
[all …]
/base/security/selinux_adapter/sepolicy/ohos_policy/hiviewdfx/faultloggerd/system/
Dprocessdump.te42 allow domain self:fifo_file { write };
45 allow processdump domain:fifo_file { read write };
48 #============= write event to hiview =========
53 allow processdump faultloggerd_temp_file:file { getattr open read write };
56 allow processdump faultloggerd_socket:sock_file write;
63 allow processdump processdump:unix_dgram_socket { create connect write };
64 allow processdump processdump:unix_stream_socket { create setopt connect write read };
77 allow processdump hdcd:fifo_file { read write };
80 allow processdump hdcd:unix_stream_socket { read write };
83 allow processdump devpts:chr_file { read write };
[all …]
/base/security/selinux_adapter/sepolicy/ohos_policy/developtools/profiler/system/
Dnative_daemon.te16 allow domain dev_unix_socket:sock_file write;
17 allow domain dev_unix_file:sock_file write;
22 allow domain hiprofiler_socket:sock_file { getattr write unlink };
25 allow native_daemon data_local_tmp:file { create read open write lock getattr ioctl map };
26 allow native_daemon data_local_tmp:dir { search add_name write getattr };
31 allow native_daemon devpts:chr_file { read write };
36 allow native_daemon hdcd:unix_stream_socket { read write };
38 allow native_daemon tty_device:chr_file { ioctl open read write };
50 allow native_daemon paramservice_socket:sock_file write;
59 allow native_daemon dev_unix_socket:dir { add_name remove_name write search };
[all …]
/base/security/selinux_adapter/sepolicy/ohos_policy/bundlemanager/distributed_bundle_framework/system/
Dsh.te15 allow sh configfs:dir { add_name create search write };
16 allow sh configfs:file { open write };
20 allow sh data_file:dir { add_name create setattr write };
21 allow sh data_file:file { create ioctl setattr write };
36 allow sh hilog_control_socket:sock_file { write };
47 allow sh selinuxfs:file { open read write };
53 allow sh tmpfs:dir { add_name write };
54 allow sh tmpfs:file { create open open write write write open };
/base/security/selinux_adapter/sepolicy/ohos_policy/communication/wifi/system/
Dwifi_hal_service.te15 allow wifi_hal_service data_log:file { read write };
16 allow wifi_hal_service data_service_el1_file:dir { add_name getattr remove_name search write };
17 allow wifi_hal_service data_service_el1_file:file { create read write open getattr ioctl rename };
21 allow wifi_hal_service dev_unix_socket:sock_file { write };
32 allow wifi_hal_service tty_device:chr_file { open read write };
39 …wifi_hal_service wifi_hal_service:netlink_generic_socket { bind create getattr read setopt write };
40 allow wifi_hal_service wifi_hal_service:netlink_route_socket { bind create nlmsg_write read write };
41 allow wifi_hal_service wifi_hal_service:packet_socket { bind create ioctl read setopt write };
42 allow wifi_hal_service wifi_hal_service:udp_socket { bind connect create ioctl read write };
70 allow wifi_hal_service dev_hdfwifi:chr_file { read open write getattr ioctl };
[all …]
/base/security/selinux_adapter/sepolicy/ohos_policy/filemanagement/user_file_service/system/
Dnormal_hap.te14 allow normal_hap_attr data_service_el1_file:dir { create read open rename reparent search write rmd…
15 allow normal_hap_attr data_service_el1_file:file { create read open write unlink getattr rename };
16 allow normal_hap_attr vfat:dir { add_name create open read remove_name rename reparent rmdir write
17 allow normal_hap_attr vfat:file { create getattr read rename open unlink write };
20 allow normal_hap_attr exfat:dir { create read open rename reparent search write rmdir getattr remov…
21 allow normal_hap_attr exfat:file { create read open write unlink getattr rename };
23 allow normal_hap_attr ntfs:dir { create read open rename reparent search write rmdir getattr remove…
24 allow normal_hap_attr ntfs:file { create read open write unlink getattr rename };

12345678910>>...22