Home
last modified time | relevance | path

Searched refs:access (Results 1 – 25 of 514) sorted by relevance

12345678910>>...21

/device/mediatek/wembley-sepolicy/non_plat/
Dcmddumper.te1 #cmddumper access external modem ttySDIO2
4 # for modem logging sdcard access
8 # cmddumper access on /data/mdlog
17 # purpose: allow cmddumper to access storage in N version
21 # purpose: access plat_file_contexts
24 # purpose: access /sys/devices/virtual/BOOT/BOOT/boot/boot_mode
Dboot_logo_updater.te9 # Purpose : To access file directories and files like logo.bin
11 # To access block files at /dev/block/mmcblk0 ir /dev/block/sdc
14 #To access file at /dev/logo
16 # To access file at /proc/lk_env
Dmtk_hal_power.te7 # hwbinder access
36 # Purpose : Allow powerHAL to access perfmgr
43 # Purpose : Allow powerHAL to access powerhal folder
59 # Purpose : Allow powerHAL to access thermal
66 # Purpose : Allow powerHAL to access wlan
71 # Purpose : Allow powerHAL to access mediacodec
79 # Purpose : Allow powerHAL to access /d/mtkfb
100 # Purpose : Allow powerHAL to access /proc/[pid]
118 # Purpose : Allow powerHAL to access block read ahead
129 # Purpose : Allow powerHAL to access prop
[all …]
Dmtk_hal_bluetooth.te17 # sysfs access.
21 # Allow write access to bluetooth-specific properties
24 # /proc access (bluesleep etc.).
30 # Purpose : Set to access stpbt driver & NVRAM
/device/mediatek/wembley-sepolicy/r_non_plat/
Dcmddumper.te1 #cmddumper access external modem ttySDIO2
4 # for modem logging sdcard access
8 # cmddumper access on /data/mdlog
17 # purpose: allow cmddumper to access storage in N version
21 # purpose: access plat_file_contexts
24 # purpose: access /sys/devices/virtual/BOOT/BOOT/boot/boot_mode
Dboot_logo_updater.te9 # Purpose : To access file directories and files like logo.bin
11 # To access block files at /dev/block/mmcblk0 ir /dev/block/sdc
14 #To access file at /dev/logo
16 # To access file at /proc/lk_env
Dmtk_hal_power.te7 # hwbinder access
36 # Purpose : Allow powerHAL to access perfmgr
43 # Purpose : Allow powerHAL to access powerhal folder
59 # Purpose : Allow powerHAL to access thermal
66 # Purpose : Allow powerHAL to access wlan
71 # Purpose : Allow powerHAL to access mediacodec
79 # Purpose : Allow powerHAL to access /d/mtkfb
100 # Purpose : Allow powerHAL to access /proc/[pid]
118 # Purpose : Allow powerHAL to access block read ahead
129 # Purpose : Allow powerHAL to access prop
[all …]
/device/linaro/bootloader/edk2/StdLib/Include/sys/
Dsysctl.h168 #define SYSCTL_NODE(parent, nbr, name, access, handler, descr) \ argument
170 SYSCTL_OID(parent, nbr, name, CTLTYPE_NODE|access, \
175 #define SYSCTL_NODE(parent, nbr, name, access, handler, descr) argument
179 #define SYSCTL_STRING(parent, nbr, name, access, arg, len, descr) \ argument
180 SYSCTL_OID(parent, nbr, name, CTLTYPE_STRING|access, \
184 #define SYSCTL_INT(parent, nbr, name, access, ptr, val, descr) \ argument
185 SYSCTL_OID(parent, nbr, name, CTLTYPE_INT|access, \
189 #define SYSCTL_LONG(parent, nbr, name, access, ptr, descr) \ argument
190 SYSCTL_OID(parent, nbr, name, CTLTYPE_INT|access, \
194 #define SYSCTL_OPAQUE(parent, nbr, name, access, ptr, len, fmt, descr) \ argument
[all …]
/device/linaro/hikey/sepolicy/
Dhal_sensors.te1 #Allow access to nanohub device
7 # Allow access to saved settings file and nanohub_lock dir/file
11 # Allow access to sensor properties
14 # Allow access to gralloc shared memory (ion), for sensor direct report
21 # allow access to detect change in /dev folder
/device/mediatek/wembley-sepolicy/plat_public/
Ddomain.te7 # Do not allow access to the generic sysfs label. This is too broad.
8 # Instead, if access to part of sysfs is desired, it should have a
50 # Do not allow access to the generic proc label. This is too broad.
51 # Instead, if access to part of proc is desired, it should have a
108 # Do not allow access to the generic debugfs label. This is too broad.
109 # Instead, if access to part of debugfs is desired, it should have a
141 # Do not allow access to the generic system_data_file label. This is
143 # Instead, if access to part of system_data_file is desired, it should
289 # Do not allow access to the generic vendor_data_file label. This is
291 # Instead, if access to part of vendor_data_file is desired, it should
[all …]
/device/mediatek/wembley-sepolicy/prebuilts/api/26.0/plat_private/
Dcmddumper.te11 # cmddumper access on /data/mdlog
18 # for modem logging sdcard access
22 # modem logger socket access
30 # purpose: allow cmddumper to access storage in N version
34 # purpose: access plat_file_contexts
Dboot_logo_updater.te24 # To access directory /dev/block/mmcblk0 or /dev/block/sdc
27 # to access file at /dev/block/mtd
30 #To access the file at /dev/kmsg
33 #To the access /fstab mount point
35 #To access linux filesystem
Dmobile_log_d.te35 #general storage access
44 #factory mode vfat access
48 #chiptest mode storage access
55 #selinux_version access
58 #dev/__properties__ access
63 # purpose: allow MobileLog to access storage in N version
67 # access debugfs/tracing/instances/
/device/google/redbull-sepolicy/vendor/qcom/common/
Dhal_qseecom.te15 #allow access to hal_allocator
18 #allow access to ion device
21 #Allow access to firmware
24 #Allow access to tee device
/device/google/coral-sepolicy/vendor/qcom/common/
Dhal_qseecom.te15 #allow access to hal_allocator
18 #allow access to ion device
21 #Allow access to firmware
24 #Allow access to tee device
/device/google/sunfish-sepolicy/vendor/qcom/common/
Dhal_qseecom.te15 #allow access to hal_allocator
18 #allow access to ion device
21 #Allow access to firmware
24 #Allow access to tee device
/device/google/bonito-sepolicy/vendor/qcom/common/
Deasel.te11 # access easel dev nodes
16 # access easel thermal sysfs
21 # access "/proc/stat"
31 # access to keychain for kernel based authentication
/device/google/crosshatch-sepolicy/vendor/qcom/common/
Deasel.te11 # access easel dev nodes
16 # access easel thermal sysfs
21 # access "/proc/stat"
31 # access to keychain for kernel based authentication
/device/mediatek/wembley-sepolicy/plat_private/
Dboot_logo_updater.te24 # To access directory /dev/block/mmcblk0 or /dev/block/sdc
27 # to access file at /dev/block/mtd
30 #To access the file at /dev/kmsg
33 #To the access /fstab mount point
35 #To access linux filesystem
Dcmddumper.te12 # for modem logging sdcard access
16 # modem logger socket access
24 # purpose: allow cmddumper to access storage in N version
28 # purpose: access plat_file_contexts
Dmobile_log_d.te41 #general storage access
50 #factory mode vfat access
54 #chiptest mode storage access
61 #selinux_version access
64 #dev/__properties__ access
69 # purpose: allow MobileLog to access storage in N version
73 # access debugfs/tracing/instances/
/device/linaro/bootloader/edk2/SignedCapsulePkg/Library/PlatformFlashAccessLibNull/
DPlatformFlashAccessLibNull.uni2 // Platform flash device access library.
4 // Platform flash device access library NULL instance.
18 #string STR_MODULE_ABSTRACT #language en-US "Platform flash device access library."
20 #string STR_MODULE_DESCRIPTION #language en-US "Platform flash device access library NULL …
/device/linaro/bootloader/edk2/UefiCpuPkg/Feature/Capsule/Library/MicrocodeFlashAccessLibNull/
DMicrocodeFlashAccessLibNull.uni2 // Microcode flash device access library.
4 // Microcode flash device access library NULL instance.
18 #string STR_MODULE_ABSTRACT #language en-US "Microcode flash device access library."
20 #string STR_MODULE_DESCRIPTION #language en-US "Microcode flash device access library NULL…
/device/google/vrservices/vrcore/sepolicy_mtc/
Dvrcore_app.te7 # allow vrcore to access dsp
11 # allow vrcore to access sensor service
15 # allow vrcore to access /persist/tango/calibration.xml
/device/google/redbull-sepolicy/vendor/google/
Drlsservice.te7 # access vd6281 rainbow sensor files
18 # For rlsservice to access display related sys file nodes
24 # For rlsservice to access audio
30 # For rlsservice to access sensor

12345678910>>...21