Lines Matching refs:allow
11 allow dumpstate self:global_capability_class_set { setuid setgid sys_resource };
16 allow dumpstate self:global_capability_class_set {
28 allow dumpstate system_file:file execute_no_trans;
29 not_full_treble(`allow dumpstate vendor_file:file execute_no_trans;')
30 allow dumpstate toolbox_exec:file rx_file_perms;
33 allow dumpstate system_file:dir r_dir_perms;
36 allow dumpstate self:global_capability_class_set { dac_override dac_read_search chown fowner fsetid…
37 allow dumpstate anr_data_file:dir rw_dir_perms;
38 allow dumpstate anr_data_file:file create_file_perms;
42 allow dumpstate system_data_file:file r_file_perms;
45 allow dumpstate { privapp_data_file app_data_file }:file append;
48 allow dumpstate self:global_capability2_class_set syslog;
49 allow dumpstate kernel:system syslog_read;
52 allow dumpstate pstorefs:dir r_dir_perms;
53 allow dumpstate pstorefs:file r_file_perms;
56 allow dumpstate domain:process getattr;
59 allow dumpstate { appdomain system_server zygote }:process signal;
62 allow dumpstate {
105 allow dumpstate sysfs_type:dir r_dir_perms;
107 allow dumpstate {
117 allow dumpstate debugfs:file r_file_perms;
120 allow dumpstate debugfs_mmc:file r_file_perms;
124 allow dumpstate {
133 allow dumpstate fuse_device:chr_file getattr;
134 allow dumpstate { dm_device cache_block_device }:blk_file getattr;
135 allow dumpstate { cache_file rootfs }:lnk_file { getattr read };
162 allow dumpstate self:global_capability_class_set sys_ptrace;
166 allow dumpstate shell_data_file:dir create_dir_perms;
167 allow dumpstate shell_data_file:file create_file_perms;
170 allow dumpstate shell_exec:file rx_file_perms;
174 allow dumpstate zygote_exec:file rx_file_perms;
177 allow dumpstate bluetooth_data_file:dir search;
178 allow dumpstate bluetooth_logs_data_file:dir r_dir_perms;
179 allow dumpstate bluetooth_logs_data_file:file r_file_perms;
182 allow dumpstate nfc_logs_data_file:dir r_dir_perms;
183 allow dumpstate nfc_logs_data_file:file r_file_perms;
186 allow dumpstate gpu_device:chr_file rw_file_perms;
194 allow dumpstate {
211 allow dumpstate net_data_file:dir search;
212 allow dumpstate net_data_file:file r_file_perms;
215 allow dumpstate self:netlink_tcpdiag_socket { create_socket_perms_no_ioctl nlmsg_read };
218 allow dumpstate tombstone_data_file:dir r_dir_perms;
219 allow dumpstate tombstone_data_file:file r_file_perms;
222 allow dumpstate cache_recovery_file:dir r_dir_perms;
223 allow dumpstate cache_recovery_file:file r_file_perms;
226 allow dumpstate recovery_data_file:dir r_dir_perms;
227 allow dumpstate recovery_data_file:file r_file_perms;
230 allow dumpstate update_engine_log_data_file:dir r_dir_perms;
231 allow dumpstate update_engine_log_data_file:file r_file_perms;
235 allow dumpstate { user_profile_root_file user_profile_data_file}:dir r_dir_perms;
236 allow dumpstate user_profile_data_file:file r_file_perms;
240 allow dumpstate misc_logd_file:dir r_dir_perms;
241 allow dumpstate misc_logd_file:file r_file_perms;
244 allow dumpstate prereboot_data_file:dir r_dir_perms;
245 allow dumpstate prereboot_data_file:file r_file_perms;
247 allow dumpstate app_fuse_file:dir r_dir_perms;
248 allow dumpstate overlayfs_file:dir r_dir_perms;
250 allow dumpstate {
273 allow dumpstate servicemanager:service_manager list;
274 allow dumpstate hwservicemanager:hwservice_manager list;
276 allow dumpstate devpts:chr_file rw_file_perms;
284 allow dumpstate media_rw_data_file:dir getattr;
285 allow dumpstate proc_interrupts:file r_file_perms;
286 allow dumpstate proc_zoneinfo:file r_file_perms;
292 allow dumpstate ion_device:chr_file r_file_perms;
295 allow dumpstate proc_stat:file r_file_perms;
297 allow dumpstate proc_pressure_cpu:file r_file_perms;
298 allow dumpstate proc_pressure_mem:file r_file_perms;
299 allow dumpstate proc_pressure_io:file r_file_perms;
302 allow dumpstate proc_pid_max:file r_file_perms;
311 allow dumpstate self:netlink_xfrm_socket { create_socket_perms_no_ioctl nlmsg_read };
314 allow dumpstate self:netlink_socket create_socket_perms_no_ioctl;
316 allow dumpstate self:netlink_generic_socket create_socket_perms_no_ioctl;
319 allow dumpstate { domain pdx_channel_socket_type pdx_endpoint_socket_type }:socket_class_set getatt…
322 allow dumpstate linkerconfig_file:dir { read open };
345 allow hal_rebootescrow_server dumpstate:fifo_file write;
346 allow hal_rebootescrow_server dumpstate:fd use;
349 allow hal_authsecret_server dumpstate:fifo_file write;
350 allow hal_authsecret_server dumpstate:fd use;
353 allow hal_keymint_server dumpstate:fifo_file write;
354 allow hal_keymint_server dumpstate:fd use;
357 allow hal_memtrack_server dumpstate:fifo_file write;
358 allow hal_memtrack_server dumpstate:fd use;
361 allow hal_oemlock_server dumpstate:fifo_file write;
362 allow hal_oemlock_server dumpstate:fd use;
365 allow hal_weaver_server dumpstate:fifo_file write;
366 allow hal_weaver_server dumpstate:fd use;
369 allow dumpstate snapshotctl_log_data_file:dir r_dir_perms;
370 allow dumpstate snapshotctl_log_data_file:file r_file_perms;
373 allow dumpstate binderfs_logs:dir r_dir_perms;
374 allow dumpstate binderfs_logs:file r_file_perms;
375 allow dumpstate binderfs_logs_proc:file r_file_perms;
377 allow dumpstate apex_info_file:file getattr;