Home
last modified time | relevance | path

Searched refs:write (Results 1 – 25 of 1137) sorted by relevance

12345678910>>...46

/system/core/rootdir/
Dinit.usb.rc30 write /sys/class/android_usb/android0/enable 0
31 write /sys/class/android_usb/android0/bDeviceClass 0
38 write /sys/class/android_usb/android0/enable 0
39 write /sys/class/android_usb/android0/idVendor 18d1
40 write /sys/class/android_usb/android0/idProduct 4EE7
41 write /sys/class/android_usb/android0/functions ${sys.usb.config}
42 write /sys/class/android_usb/android0/enable 1
48 write /sys/class/android_usb/android0/enable 0
49 write /sys/class/android_usb/android0/idVendor 18d1
50 write /sys/class/android_usb/android0/idProduct 2d00
[all …]
Dinit.usb.configfs.rc2 write /config/usb_gadget/g1/UDC "none"
5 write /config/usb_gadget/g1/bDeviceClass 0
6 write /config/usb_gadget/g1/bDeviceSubClass 0
7 write /config/usb_gadget/g1/bDeviceProtocol 0
21 write /config/usb_gadget/g1/configs/b.1/strings/0x409/configuration "adb"
23 write /config/usb_gadget/g1/UDC ${sys.usb.controller}
27 write /config/usb_gadget/g1/configs/b.1/strings/0x409/configuration "mtp"
29 write /config/usb_gadget/g1/UDC ${sys.usb.controller}
36 write /config/usb_gadget/g1/configs/b.1/strings/0x409/configuration "mtp_adb"
39 write /config/usb_gadget/g1/UDC ${sys.usb.controller}
[all …]
/system/bt/tools/scripts/
Dbtsnooz.py73 sys.stderr.write('Unsupported btsnooz version: %s\n' % version)
79 sys.stdout.write('btsnoop\x00\x00\x00\x00\x01\x00\x00\x03\xea')
108 sys.stdout.write(struct.pack('>II', length, length))
109 sys.stdout.write(struct.pack('>II', type_to_direction(type), 0))
110 sys.stdout.write(
113 sys.stdout.write(type_to_hci(type))
114 sys.stdout.write(decompressed[offset:offset + length - 1])
139 sys.stdout.write(struct.pack('>II', packet_length, length))
140 sys.stdout.write(struct.pack('>II', type_to_direction(snooz_type), 0))
141 sys.stdout.write(
[all …]
/system/tools/mkbootimg/
Dmkbootimg.py47 f.write(pack(str(pad) + 'x'))
70 args.output.write(pack('8s', BOOT_MAGIC))
71 args.output.write(pack(
78 args.output.write(pack('4I', 0, 0, 0, 0)) # reserved
80 args.output.write(pack('I', args.header_version)) # version of bootimage header
81 args.output.write(pack('1536s', args.cmdline.encode()))
88 args.vendor_boot.write(pack('8s', BOOT_MAGIC))
89 args.vendor_boot.write(pack(
96 args.vendor_boot.write(pack('2048s', args.vendor_cmdline.encode()))
97 args.vendor_boot.write(pack('I', args.base + args.tags_offset)) # physical addr for kernel tags
[all …]
/system/sepolicy/prebuilts/api/28.0/public/
Ddnsmasq.te18 allow dnsmasq netd:fifo_file { read write };
20 allow dnsmasq netd:netlink_kobject_uevent_socket { read write };
21 allow dnsmasq netd:netlink_nflog_socket { read write };
22 allow dnsmasq netd:netlink_route_socket { read write };
23 allow dnsmasq netd:unix_stream_socket { read write };
24 allow dnsmasq netd:unix_dgram_socket { read write };
25 allow dnsmasq netd:udp_socket { read write };
Dapp.te26 allow appdomain cgroup:dir { search write };
41 allow appdomain zygote:fifo_file write;
44 # Allow apps to create and write method traces in /data/misc/trace.
54 allow appdomain devpts:chr_file { getattr read write ioctl };
59 allow appdomain system_server:unix_stream_socket { read write setopt getattr getopt shutdown };
60 allow appdomain system_server:tcp_socket { read write getattr getopt shutdown };
66 allow appdomain surfaceflinger:unix_stream_socket { read write setopt getattr getopt shutdown };
122 # Read/write wallpaper file (opened by system).
123 allow appdomain wallpaper_file:file { getattr read write };
125 # Read/write cached ringtones (opened by system).
[all …]
Dclatd.te11 allow clatd netd:fifo_file { read write };
13 allow clatd netd:netlink_kobject_uevent_socket { read write };
14 allow clatd netd:netlink_nflog_socket { read write };
15 allow clatd netd:netlink_route_socket { read write };
16 allow clatd netd:udp_socket { read write };
17 allow clatd netd:unix_stream_socket { read write };
18 allow clatd netd:unix_dgram_socket { read write };
/system/sepolicy/prebuilts/api/27.0/public/
Ddnsmasq.te18 allow dnsmasq netd:fifo_file { read write };
20 allow dnsmasq netd:netlink_kobject_uevent_socket { read write };
21 allow dnsmasq netd:netlink_nflog_socket { read write };
22 allow dnsmasq netd:netlink_route_socket { read write };
23 allow dnsmasq netd:unix_stream_socket { read write };
24 allow dnsmasq netd:unix_dgram_socket { read write };
25 allow dnsmasq netd:udp_socket { read write };
Dclatd.te11 allow clatd netd:fifo_file { read write };
13 allow clatd netd:netlink_kobject_uevent_socket { read write };
14 allow clatd netd:netlink_nflog_socket { read write };
15 allow clatd netd:netlink_route_socket { read write };
16 allow clatd netd:udp_socket { read write };
17 allow clatd netd:unix_stream_socket { read write };
18 allow clatd netd:unix_dgram_socket { read write };
/system/sepolicy/prebuilts/api/26.0/public/
Ddnsmasq.te18 allow dnsmasq netd:fifo_file { read write };
20 allow dnsmasq netd:netlink_kobject_uevent_socket { read write };
21 allow dnsmasq netd:netlink_nflog_socket { read write };
22 allow dnsmasq netd:netlink_route_socket { read write };
23 allow dnsmasq netd:unix_stream_socket { read write };
24 allow dnsmasq netd:unix_dgram_socket { read write };
25 allow dnsmasq netd:udp_socket { read write };
Dclatd.te11 allow clatd netd:fifo_file { read write };
13 allow clatd netd:netlink_kobject_uevent_socket { read write };
14 allow clatd netd:netlink_nflog_socket { read write };
15 allow clatd netd:netlink_route_socket { read write };
16 allow clatd netd:udp_socket { read write };
17 allow clatd netd:unix_stream_socket { read write };
18 allow clatd netd:unix_dgram_socket { read write };
/system/sepolicy/prebuilts/api/29.0/public/
Ddnsmasq.te18 allow dnsmasq netd:fifo_file { getattr read write };
20 allow dnsmasq netd:netlink_kobject_uevent_socket { read write };
21 allow dnsmasq netd:netlink_nflog_socket { read write };
22 allow dnsmasq netd:netlink_route_socket { read write };
23 allow dnsmasq netd:unix_stream_socket { getattr read write };
24 allow dnsmasq netd:unix_dgram_socket { read write };
25 allow dnsmasq netd:udp_socket { read write };
/system/sepolicy/prebuilts/api/26.0/private/
Dapp.te30 allow appdomain cgroup:dir { search write };
46 allow appdomain zygote:fifo_file write;
48 # Allow apps to create and write method traces in /data/misc/trace.
58 allow appdomain devpts:chr_file { getattr read write ioctl };
63 allow appdomain system_server:unix_stream_socket { read write setopt getattr getopt shutdown };
64 allow appdomain system_server:tcp_socket { read write getattr getopt shutdown };
70 allow appdomain surfaceflinger:unix_stream_socket { read write setopt getattr getopt shutdown };
129 # Read/write wallpaper file (opened by system).
130 allow appdomain wallpaper_file:file { getattr read write };
132 # Read/write cached ringtones (opened by system).
[all …]
/system/sepolicy/prebuilts/api/30.0/public/
Ddnsmasq.te18 allow dnsmasq netd:fifo_file { getattr read write };
20 allow dnsmasq netd:netlink_kobject_uevent_socket { read write };
21 allow dnsmasq netd:netlink_nflog_socket { read write };
22 allow dnsmasq netd:netlink_route_socket { read write };
23 allow dnsmasq netd:unix_stream_socket { getattr read write };
24 allow dnsmasq netd:unix_dgram_socket { read write };
25 allow dnsmasq netd:udp_socket { read write };
/system/sepolicy/public/
Ddnsmasq.te18 allow dnsmasq netd:fifo_file { getattr read write };
20 allow dnsmasq netd:netlink_kobject_uevent_socket { read write };
21 allow dnsmasq netd:netlink_nflog_socket { read write };
22 allow dnsmasq netd:netlink_route_socket { read write };
23 allow dnsmasq netd:unix_stream_socket { getattr read write };
24 allow dnsmasq netd:unix_dgram_socket { read write };
25 allow dnsmasq netd:udp_socket { read write };
/system/sepolicy/prebuilts/api/27.0/private/
Dapp.te30 allow appdomain cgroup:dir { search write };
45 allow appdomain zygote:fifo_file write;
48 # Allow apps to create and write method traces in /data/misc/trace.
58 allow appdomain devpts:chr_file { getattr read write ioctl };
63 allow appdomain system_server:unix_stream_socket { read write setopt getattr getopt shutdown };
64 allow appdomain system_server:tcp_socket { read write getattr getopt shutdown };
70 allow appdomain surfaceflinger:unix_stream_socket { read write setopt getattr getopt shutdown };
126 # Read/write wallpaper file (opened by system).
127 allow appdomain wallpaper_file:file { getattr read write };
129 # Read/write cached ringtones (opened by system).
[all …]
/system/timezone/distro/tools/
Dcreate-distro.py58 properties.write('rules.version=%s\n' % iana_version)
59 properties.write('revision=%s\n' % revision)
60 properties.write('tzdata.file=%s\n' % tzdata_file)
61 properties.write('icu.file=%s\n' % icu_file)
62 properties.write('tzlookup.file=%s\n' % tzlookup_file)
63 properties.write('telephonylookup.file=%s\n' % telephonylookup_file)
64 properties.write('output.distro.dir=%s\n' % output_distro_dir)
65 properties.write('output.version.file=%s\n' % output_version_file)
/system/sepolicy/prebuilts/api/28.0/
Dplat_pub_versioned.cil3051 (allow appdomain cgroup_28_0 (dir (write search)))
3052 (allow appdomain cgroup_28_0 (file (ioctl read write getattr lock append map open)))
3058 (allow appdomain zygote_28_0 (fifo_file (write)))
3059 (allow appdomain method_trace_data_file_28_0 (dir (write lock add_name remove_name search open)))
3060 (allow appdomain method_trace_data_file_28_0 (file (write create lock append map open)))
3063 (allow appdomain devpts_28_0 (chr_file (ioctl read write getattr)))
3065 (allow appdomain system_server_28_0 (fifo_file (ioctl read write getattr lock append map open)))
3066 (allow appdomain system_server_28_0 (unix_stream_socket (read write getattr getopt setopt shutdown)…
3067 (allow appdomain system_server_28_0 (tcp_socket (read write getattr getopt shutdown)))
3068 (allow appdomain appdomain (fifo_file (ioctl read write getattr lock append map open)))
[all …]
/system/sepolicy/prebuilts/api/26.0/
Dnonplat_sepolicy.cil1741 (allow bootanim_26_0 gpu_device_26_0 (chr_file (ioctl read write getattr lock append open)))
1745 (allow bootanim_26_0 audio_device_26_0 (chr_file (ioctl read write getattr lock append open)))
1748 (allow bootanim_26_0 ion_device_26_0 (chr_file (ioctl read write getattr lock append open)))
1763 (allow bootstat_26_0 bootstat_data_file_26_0 (dir (ioctl read write getattr lock add_name remove_na…
1764 (allow bootstat_26_0 bootstat_data_file_26_0 (file (ioctl read write create getattr setattr lock ap…
1770 (allow bufferhubd_26_0 pdx_bufferhub_client_endpoint_socket_type (unix_stream_socket (read write ge…
1772 … pdx_bufferhub_client_channel_socket_type (unix_stream_socket (ioctl read write create getattr set…
1775 (allow bufferhubd_26_0 pdx_performance_client_endpoint_socket_type (sock_file (ioctl read write get…
1776 (allow bufferhubd_26_0 pdx_performance_client_endpoint_socket_type (unix_stream_socket (read write
1777 (allow bufferhubd_26_0 pdx_performance_client_channel_socket_type (unix_stream_socket (read write g…
[all …]
/system/memory/libmemunreachable/
DProcessMappings.h30 bool write; member
35 Mapping(uintptr_t begin, uintptr_t end, bool read, bool write, bool execute, const char* name) in Mapping()
36 : begin(begin), end(end), read(read), write(write), execute(execute) { in Mapping()
/system/sepolicy/prebuilts/api/30.0/private/
Dincident.te12 # allow incident to communicate with dumpstate, and write incident report to
15 allow incident dumpstate:unix_stream_socket { read write };
16 allow incident shell_data_file:file write;
19 allow incident devpts:chr_file { read write };
21 # allow incident to communicate use, read and write over the adb
24 allow incident adbd:unix_stream_socket { read write };
34 allow incident incidentd:fifo_file write;
/system/sepolicy/private/
Dincident.te12 # allow incident to communicate with dumpstate, and write incident report to
15 allow incident dumpstate:unix_stream_socket { read write };
16 allow incident shell_data_file:file write;
19 allow incident devpts:chr_file { read write };
21 # allow incident to communicate use, read and write over the adb
24 allow incident adbd:unix_stream_socket { read write };
34 allow incident incidentd:fifo_file write;
/system/sepolicy/prebuilts/api/27.0/
Dnonplat_sepolicy.cil1961 (allow bootanim_27_0 gpu_device_27_0 (chr_file (ioctl read write getattr lock append map open)))
1965 (allow bootanim_27_0 audio_device_27_0 (chr_file (ioctl read write getattr lock append map open)))
1968 (allow bootanim_27_0 ion_device_27_0 (chr_file (ioctl read write getattr lock append map open)))
1983 (allow bootstat_27_0 bootstat_data_file_27_0 (dir (ioctl read write getattr lock add_name remove_na…
1984 (allow bootstat_27_0 bootstat_data_file_27_0 (file (ioctl read write create getattr setattr lock ap…
1990 (allow bufferhubd_27_0 pdx_bufferhub_client_endpoint_socket_type (unix_stream_socket (read write ge…
1992 … pdx_bufferhub_client_channel_socket_type (unix_stream_socket (ioctl read write create getattr set…
1995 (allow bufferhubd_27_0 pdx_performance_client_endpoint_socket_type (sock_file (ioctl read write get…
1996 (allow bufferhubd_27_0 pdx_performance_client_endpoint_socket_type (unix_stream_socket (read write
1997 (allow bufferhubd_27_0 pdx_performance_client_channel_socket_type (unix_stream_socket (read write g…
[all …]
/system/extras/simpleperf/scripts/inferno/
Dinferno.py170 f.write("<html><body>")
171 f.write("<div id='flamegraph_id' style='font-family: Monospace; %s'>" % (
173 f.write("""<style type="text/css"> .s { stroke:black; stroke-width:0.5; cursor:pointer;}
175 f.write('<style type="text/css"> .t:hover { cursor:pointer; } </style>')
176 f.write('<img height="180" alt = "Embedded Image" src ="data')
177 f.write(get_local_asset_content("inferno.b64"))
178 f.write('"/>')
188 f.write("""<div style='display:inline-block;'>
204 f.write(
210 f.write("Capture : %s<br/><br/>" % process.cmd)
[all …]
Dsvg_renderer.py89 f.write(
147 f.write(
155 f.write(
165 f.write(
177 f.write(
187 f.write("""<div class="flamegraph_block" style="width:100%%; height:%dpx;">
189 f.write("""<svg xmlns="http://www.w3.org/2000/svg"
194 f.write("""<defs > <linearGradient id="background_gradiant" y1="0" y2="1" x1="0" x2="0" >
197 f.write("""<rect x="0.0" y="0" width="100%" height="100%" fill="url(#background_gradiant)" />
204 f.write("</svg></div><br/>\n\n")

12345678910>>...46