Searched refs:allow (Results 1 – 25 of 1402) sorted by relevance
12345678910>>...57
9 allow iorap_inode2filename iorapd:fd use;10 allow iorap_inode2filename iorapd:fifo_file { read write getattr };13 allow iorap_inode2filename self:capability dac_read_search;18 allow iorap_inode2filename apex_data_file:dir { getattr open read search };19 allow iorap_inode2filename apex_data_file:file { getattr };20 allow iorap_inode2filename apex_mnt_dir:dir { getattr open read search };21 allow iorap_inode2filename apex_mnt_dir:file { getattr };22 allow iorap_inode2filename apk_data_file:dir { getattr open read search };23 allow iorap_inode2filename apk_data_file:file { getattr };24 allow iorap_inode2filename app_data_file:dir { getattr open read search };[all …]
14 allow mediaserver proc:lnk_file getattr;17 allow mediaserver system_file:dir r_dir_perms;21 allow mediaserver self:process ptrace;29 allow mediaserver media_data_file:dir create_dir_perms;30 allow mediaserver media_data_file:file create_file_perms;31 allow mediaserver { app_data_file privapp_data_file }:file { append getattr ioctl lock map read wri…32 allow mediaserver sdcard_type:file write;33 allow mediaserver gpu_device:chr_file rw_file_perms;34 allow mediaserver video_device:dir r_dir_perms;35 allow mediaserver video_device:chr_file rw_file_perms;[all …]
9 allow iorap_inode2filename iorapd:fd use;10 allow iorap_inode2filename iorapd:fifo_file { read write getattr };13 allow iorap_inode2filename self:capability dac_read_search;18 allow iorap_inode2filename apex_data_file:dir { getattr open read search };19 allow iorap_inode2filename apex_data_file:file { getattr };20 allow iorap_inode2filename apex_mnt_dir:dir { getattr open read search };21 allow iorap_inode2filename apex_mnt_dir:file { getattr };22 allow iorap_inode2filename apk_data_file:dir { getattr open read search };23 allow iorap_inode2filename apk_data_file:file { getattr };24 allow iorap_inode2filename app_data_file_type:dir { getattr open read search };[all …]
15 allow mediaserver proc:lnk_file getattr;18 allow mediaserver system_file:dir r_dir_perms;22 allow mediaserver self:process ptrace;30 allow mediaserver media_data_file:dir create_dir_perms;31 allow mediaserver media_data_file:file create_file_perms;32 allow mediaserver { app_data_file privapp_data_file }:file { append getattr ioctl lock map read wri…33 allow mediaserver sdcard_type:file write;34 allow mediaserver gpu_device:chr_file rw_file_perms;35 allow mediaserver video_device:dir r_dir_perms;36 allow mediaserver video_device:chr_file rw_file_perms;[all …]
12 allow shell pstorefs:dir search;13 allow shell pstorefs:file r_file_perms;16 allow shell rootfs:dir r_dir_perms;19 allow shell anr_data_file:dir r_dir_perms;20 allow shell anr_data_file:file r_file_perms;23 allow shell shell_data_file:dir create_dir_perms;24 allow shell shell_data_file:file create_file_perms;25 allow shell shell_data_file:file rx_file_perms;26 allow shell shell_data_file:lnk_file create_file_perms;29 allow shell shell_test_data_file:dir create_dir_perms;[all …]
11 allow dumpstate self:global_capability_class_set { setuid setgid sys_resource };16 allow dumpstate self:global_capability_class_set {28 allow dumpstate system_file:file execute_no_trans;29 not_full_treble(`allow dumpstate vendor_file:file execute_no_trans;')30 allow dumpstate toolbox_exec:file rx_file_perms;33 allow dumpstate system_file:dir r_dir_perms;36 allow dumpstate self:global_capability_class_set { dac_override dac_read_search chown fowner fsetid…37 allow dumpstate anr_data_file:dir rw_dir_perms;38 allow dumpstate anr_data_file:file create_file_perms;42 allow dumpstate system_data_file:file r_file_perms;[all …]
6 allow vold cache_file:dir r_dir_perms;7 allow vold cache_file:file { getattr read };8 allow vold cache_file:lnk_file r_file_perms;15 allow vold sysfs:file w_file_perms;16 allow vold sysfs_usb:file w_file_perms;17 allow vold sysfs_zram_uevent:file w_file_perms;20 allow vold proc_meminfo:file r_file_perms;23 allow vold file_contexts_file:file r_file_perms;26 allow vold self:process setexec;29 allow vold shell_exec:file rx_file_perms;[all …]
16 allow mediaserver proc:lnk_file getattr;19 allow mediaserver system_file:dir r_dir_perms;23 allow mediaserver self:process ptrace;31 allow mediaserver media_data_file:dir create_dir_perms;32 allow mediaserver media_data_file:file create_file_perms;33 allow mediaserver app_data_file:dir search;34 allow mediaserver app_data_file:file rw_file_perms;35 allow mediaserver sdcard_type:file write;36 allow mediaserver gpu_device:chr_file rw_file_perms;37 allow mediaserver video_device:dir r_dir_perms;[all …]
14 allow platform_app shell_data_file:dir search;15 allow platform_app shell_data_file:file { open getattr read };16 allow platform_app icon_file:file { open getattr read };19 allow platform_app { apk_tmp_file apk_private_tmp_file }:dir rw_dir_perms;20 allow platform_app { apk_tmp_file apk_private_tmp_file }:file rw_file_perms;21 allow platform_app apk_private_data_file:dir search;23 allow platform_app asec_apk_file:dir create_dir_perms;24 allow platform_app asec_apk_file:file create_file_perms;27 allow platform_app media_rw_data_file:dir create_dir_perms;28 allow platform_app media_rw_data_file:file create_file_perms;[all …]
8 allow rild self:netlink_route_socket nlmsg_write;9 allow rild kernel:system module_request;10 allow rild self:capability { setpcap setgid setuid net_admin net_raw };11 allow rild alarm_device:chr_file rw_file_perms;12 allow rild cgroup:dir create_dir_perms;13 allow rild cgroup:{ file lnk_file } r_file_perms;14 allow rild radio_device:chr_file rw_file_perms;15 allow rild radio_device:blk_file r_file_perms;16 allow rild mtd_device:dir search;17 allow rild efs_file:dir create_dir_perms;[all …]
15 allow platform_app shell_data_file:dir search;16 allow platform_app shell_data_file:file { open getattr read };17 allow platform_app icon_file:file { open getattr read };20 allow platform_app { apk_tmp_file apk_private_tmp_file }:dir rw_dir_perms;21 allow platform_app { apk_tmp_file apk_private_tmp_file }:file rw_file_perms;22 allow platform_app apk_private_data_file:dir search;24 allow platform_app asec_apk_file:dir create_dir_perms;25 allow platform_app asec_apk_file:file create_file_perms;28 allow platform_app media_rw_data_file:dir create_dir_perms;29 allow platform_app media_rw_data_file:file create_file_perms;[all …]
20 <allow own="org.chromium.UpdateEngine" />21 <allow send_destination="org.chromium.UpdateEngine" />24 <allow send_destination="org.chromium.UpdateEngine"27 <allow send_destination="org.chromium.UpdateEngine"30 <allow send_destination="org.chromium.UpdateEngine"33 <allow send_destination="org.chromium.UpdateEngine"36 <allow send_destination="org.chromium.UpdateEngine"39 <allow send_destination="org.chromium.UpdateEngine"42 <allow send_destination="org.chromium.UpdateEngine"45 <allow send_destination="org.chromium.UpdateEngine"[all …]
6 allow vold cache_file:dir r_dir_perms;7 allow vold cache_file:file { getattr read };8 allow vold cache_file:lnk_file r_file_perms;14 allow vold sysfs:file w_file_perms; # writing to /sys/*/uevent during coldboot.15 allow vold sysfs_dm:file w_file_perms;16 allow vold sysfs_usb:file w_file_perms;17 allow vold sysfs_zram_uevent:file w_file_perms;21 allow vold {31 allow vold file_contexts_file:file r_file_perms;34 allow vold self:process setexec;[all …]