Home
last modified time | relevance | path

Searched refs:init (Results 1 – 25 of 304) sorted by relevance

12345678910>>...13

/device/lge/bullhead/sepolicy/
Dinit-power-sh.te1 type init-power-sh, domain, device_domain_deprecated;
2 type init-power-sh_exec, exec_type, file_type;
4 init_daemon_domain(init-power-sh)
6 allow init-power-sh proc_kernel_sched:file w_file_perms;
7 allow init-power-sh self:capability net_admin;
8 allow init-power-sh shell_exec:file r_file_perms;
9 allow init-power-sh sysfs_devices_system_cpu:file w_file_perms;
10 allow init-power-sh sysfs_performance:dir search;
11 allow init-power-sh sysfs_performance:file w_file_perms;
12 allow init-power-sh sysfs_thermal:dir search;
[all …]
Dinit-devstart-sh.te1 type init-qcom-devstart-sh, domain;
2 type init-qcom-devstart-sh_exec, exec_type, file_type;
4 init_daemon_domain(init-qcom-devstart-sh)
6 allow init-qcom-devstart-sh shell_exec:file rx_file_perms;
9 allow init-qcom-devstart-sh toolbox_exec:file rx_file_perms;
12 set_prop(init-qcom-devstart-sh, system_prop)
15 allow init-qcom-devstart-sh sysfs_audio:file w_file_perms;
Dinit-qseecomd-sh.te1 type init-bullhead-qseecomd-sh, domain;
2 type init-bullhead-qseecomd-sh_exec, exec_type, file_type;
4 init_daemon_domain(init-bullhead-qseecomd-sh)
6 get_prop(init-bullhead-qseecomd-sh, qseecomtee_prop)
8 allow init-bullhead-qseecomd-sh shell_exec:file rx_file_perms;
11 allow init-bullhead-qseecomd-sh toolbox_exec:file rx_file_perms;
Dinit-devwait-sh.te1 type init-qcom-devwait-sh, domain;
2 type init-qcom-devwait-sh_exec, exec_type, file_type;
4 init_daemon_domain(init-qcom-devwait-sh)
6 allow init-qcom-devwait-sh shell_exec:file rx_file_perms;
9 allow init-qcom-devwait-sh toolbox_exec:file rx_file_perms;
/device/huawei/angler/sepolicy/
Dinit-power-sh.te1 type init-power-sh, domain, device_domain_deprecated;
2 type init-power-sh_exec, exec_type, file_type;
4 init_daemon_domain(init-power-sh)
6 allow init-power-sh shell_exec:file r_file_perms;
7 allow init-power-sh sysfs_devices_system_cpu:file w_file_perms;
8 allow init-power-sh sysfs_performance:dir r_dir_perms;
9 allow init-power-sh sysfs_performance:file w_file_perms;
10 allow init-power-sh sysfs_thermal:dir r_dir_perms;
11 allow init-power-sh sysfs_thermal:file rw_file_perms;
12 allow init-power-sh proc_kernel_sched:file w_file_perms;
[all …]
Dinit-mcfg-sh.te1 type init-mcfg-sh, domain, device_domain_deprecated;
2 type init-mcfg-sh_exec, exec_type, file_type;
4 init_daemon_domain(init-mcfg-sh)
6 allow init-mcfg-sh shell_exec:file rx_file_perms;
9 allow init-mcfg-sh radio_data_file:dir create_dir_perms;
10 allow init-mcfg-sh radio_data_file:file create_file_perms;
12 allow init-mcfg-sh firmware_file:dir r_dir_perms;
13 allow init-mcfg-sh firmware_file:file r_file_perms;
16 allow init-mcfg-sh toolbox_exec:file rx_file_perms;
Dinit-radio-sh.te1 # /system/bin/init.radio.sh
2 type init-radio-sh, domain;
3 type init-radio-sh_exec, exec_type, file_type;
5 init_daemon_domain(init-radio-sh)
7 allow init-radio-sh shell_exec:file rx_file_perms;
9 allow init-radio-sh toolbox_exec:file rx_file_perms;
11 allow init-radio-sh radio_data_file:dir rw_dir_perms;
12 allow init-radio-sh radio_data_file:file create_file_perms;
Dinit-devstart-sh.te1 type init-qcom-devstart-sh, domain;
2 type init-qcom-devstart-sh_exec, exec_type, file_type;
4 init_daemon_domain(init-qcom-devstart-sh)
6 allow init-qcom-devstart-sh shell_exec:file rx_file_perms;
9 allow init-qcom-devstart-sh toolbox_exec:file rx_file_perms;
12 set_prop(init-qcom-devstart-sh, system_prop)
15 allow init-qcom-devstart-sh sysfs_msm_subsys:file w_file_perms;
Dinit-devwait-sh.te1 type init-qcom-devwait-sh, domain;
2 type init-qcom-devwait-sh_exec, exec_type, file_type;
4 init_daemon_domain(init-qcom-devwait-sh)
6 allow init-qcom-devwait-sh shell_exec:file rx_file_perms;
9 allow init-qcom-devwait-sh toolbox_exec:file rx_file_perms;
Dinit-qseecomd-sh.te1 type init-angler-qseecomd-sh, domain;
2 type init-angler-qseecomd-sh_exec, exec_type, file_type;
4 init_daemon_domain(init-angler-qseecomd-sh)
6 allow init-angler-qseecomd-sh shell_exec:file rx_file_perms;
9 allow init-angler-qseecomd-sh toolbox_exec:file rx_file_perms;
/device/google/wahoo/sepolicy/vendor/
Dinit.te2 allow init tmpfs:lnk_file create;
3 allow init configfs:lnk_file create;
5 allow init firmware_file:dir mounton;
6 allow init configfs:file w_file_perms;
7 allow init debugfs_clk:file w_file_perms;
9 allow init tty_device:chr_file rw_file_perms;
11 allow init persist_file:dir mounton;
13 allow init ab_block_device:lnk_file relabelto;
14 allow init boot_block_device:lnk_file relabelto;
15 allow init persist_block_device:lnk_file relabelto;
[all …]
Dinit-insmod-sh.te1 type init-insmod-sh, domain;
2 type init-insmod-sh_exec, exec_type, vendor_file_type, file_type;
4 init_daemon_domain(init-insmod-sh)
6 allow init-insmod-sh vendor_shell_exec:file rx_file_perms;
7 allow init-insmod-sh vendor_toolbox_exec:file rx_file_perms;
10 set_prop(init-insmod-sh, system_prop)
13 allow init-insmod-sh self:capability sys_module;
14 allow init-insmod-sh system_file:system module_load;
16 allow init-insmod-sh vendor_file:system module_load;
Dinit-devstart-sh.te1 type init-qcom-devstart-sh, domain;
2 type init-qcom-devstart-sh_exec, exec_type, vendor_file_type, file_type;
4 init_daemon_domain(init-qcom-devstart-sh)
6 allow init-qcom-devstart-sh vendor_shell_exec:file rx_file_perms;
7 allow init-qcom-devstart-sh vendor_toolbox_exec:file rx_file_perms;
10 allow init-qcom-devstart-sh vendor_file:file rx_file_perms;
13 set_prop(init-qcom-devstart-sh, system_prop)
16 allow init-qcom-devstart-sh sysfs_msm_subsys:file w_file_perms;
Dinit-ipastart-sh.te1 type init-qcom-ipastart-sh, domain;
2 type init-qcom-ipastart-sh_exec, exec_type, vendor_file_type, file_type;
4 init_daemon_domain(init-qcom-ipastart-sh)
6 allow init-qcom-ipastart-sh vendor_shell_exec:file rx_file_perms;
7 allow init-qcom-ipastart-sh vendor_toolbox_exec:file rx_file_perms;
10 allow init-qcom-ipastart-sh ipa_dev:chr_file w_file_perms;
/device/google/marlin/sepolicy/
Dinit.te2 allow init tmpfs:lnk_file create;
5 allowxperm init self:udp_socket ioctl { SIOCSIFFLAGS };
7 allow init proc_kernel_sched:file w_file_perms;
8 allow init sysfs_type:lnk_file read;
10 allow init firmware_file:dir mounton;
11 allow init persist_file:dir mounton;
12 allow init userdata_block_device:blk_file { write };
14 allow init debugfs_sps:dir search;
15 allow init debugfs_sps:file w_file_perms;
Dinit-devstart-sh.te1 type init-qcom-devstart-sh, domain;
2 type init-qcom-devstart-sh_exec, exec_type, vendor_file_type, file_type;
4 init_daemon_domain(init-qcom-devstart-sh)
7 allow init-qcom-devstart-sh vendor_shell_exec:file rx_file_perms;
9 allow init-qcom-devstart-sh vendor_toolbox_exec:file rx_file_perms;
11 allow init-qcom-devstart-sh vendor_file:file rx_file_perms;
14 set_prop(init-qcom-devstart-sh, system_prop)
17 allow init-qcom-devstart-sh sysfs_msm_subsys:file w_file_perms;
/device/generic/qemu/
Dqemu_base.mk40 init \
41 init.environ.rc \
42 init.rc \
80 system/core/rootdir/init.usb.rc:root/init.usb.rc \
81 system/core/rootdir/init.usb.configfs.rc:root/init.usb.configfs.rc \
87 device/generic/goldfish/init.goldfish.rc:root/init.goldfish.rc \
88 device/generic/goldfish/init.goldfish.sh:system/etc/init.goldfish.sh \
/device/asus/fugu/sepolicy/
Dinit-fugu-countrycode-sh.te1 type init-fugu-countrycode-sh, domain;
2 type init-fugu-countrycode-sh_exec, exec_type, file_type;
4 init_daemon_domain(init-fugu-countrycode-sh)
6 allow init-fugu-countrycode-sh shell_exec:file rx_file_perms;
9 allow init-fugu-countrycode-sh toolbox_exec:file rx_file_perms;
11 set_prop(init-fugu-countrycode-sh, countrycode_prop)
12 allow init-fugu-countrycode-sh efs_file:file { open read };
13 allow init-fugu-countrycode-sh efs_file:dir search;
Dinit.te2 allow init proc:dir mounton;
3 allow init binfmt_miscfs:file w_file_perms;
4 allow init tmpfs:lnk_file create_file_perms;
5 allow init sepfs:file w_file_perms;
/device/google/muskie/
Ddevice-common.mk61 …$(LOCAL_PATH)/init.logging.userdebug.rc:$(TARGET_COPY_OUT_VENDOR)/etc/init/init.$(PRODUCT_HARDWARE…
64 …$(LOCAL_PATH)/init.logging.rc:$(TARGET_COPY_OUT_VENDOR)/etc/init/init.$(PRODUCT_HARDWARE).logging.…
68 $(LOCAL_PATH)/init-common.rc:$(TARGET_COPY_OUT_VENDOR)/etc/init/init-$(PRODUCT_HARDWARE).rc \
69 …$(LOCAL_PATH)/init.common.usb.rc:$(TARGET_COPY_OUT_VENDOR)/etc/init/hw/init.$(PRODUCT_HARDWARE).us…
70 $(LOCAL_PATH)/init.insmod.cfg:$(TARGET_COPY_OUT_VENDOR)/etc/init.insmod.cfg
/device/google/taimen/
Ddevice.mk39 …device/google/taimen/init-taimen.rc:$(TARGET_COPY_OUT_VENDOR)/etc/init/init-$(PRODUCT_HARDWARE).rc…
40 …device/google/taimen/init.taimen.usb.rc:$(TARGET_COPY_OUT_VENDOR)/etc/init/hw/init.$(PRODUCT_HARDW…
47 device/google/taimen/init.insmod.cfg:$(TARGET_COPY_OUT_VENDOR)/etc/init.insmod.cfg \
48 … device/google/taimen/init.insmod_charger.cfg:$(TARGET_COPY_OUT_VENDOR)/etc/init.insmod_charger.cfg
52 …device/google/taimen/init.logging.rc:$(TARGET_COPY_OUT_VENDOR)/etc/init/init.$(PRODUCT_HARDWARE).l…
/device/linaro/hikey/sepolicy/
Dinit.te1 # init.hikey.usb.rc writes to /config/* to set up USB
2 allow init configfs:dir create_dir_perms;
3 allow init configfs:file write;
4 allow init configfs:lnk_file { create unlink };
6 allow init tmpfs:lnk_file create;
/device/google/dragon/sepolicy/
Dinit.te1 allow init tmpfs:lnk_file create_file_perms;
4 allow init sysfs:lnk_file setattr;
7 dontaudit init sysfs_devices_system_cpu:dir write;
9 allow init { cache_file storage_file }:dir mounton;
12 allow init configfs:{ file lnk_file } create_file_perms;
/device/linaro/hikey/hikey/
Ddevice-hikey.mk20 device/linaro/hikey/init.common.rc:root/init.hikey.rc \
21 device/linaro/hikey/init.hikey.power.rc:root/init.hikey.power.rc \
22 device/linaro/hikey/init.common.usb.rc:root/init.hikey.usb.rc \
/device/linaro/hikey/hikey960/
Ddevice-hikey960.mk21 device/linaro/hikey/init.common.rc:root/init.hikey960.rc \
22 device/linaro/hikey/init.hikey960.power.rc:root/init.hikey960.power.rc \
23 device/linaro/hikey/init.common.usb.rc:root/init.hikey960.usb.rc \

12345678910>>...13