Home
last modified time | relevance | path

Searched refs:allow (Results 1 – 25 of 721) sorted by relevance

12345678910>>...29

/device/google/crosshatch-sepolicy/vendor/qcom/common/
Dhal_dumpstate_impl.te8 allow hal_dumpstate_impl vendor_shell_exec:file rx_file_perms;
9 allow hal_dumpstate_impl vendor_toolbox_exec:file rx_file_perms;
12 allow hal_dumpstate_impl debugfs_tracing_instances:dir search;
13 allow hal_dumpstate_impl debugfs_tracing_instances:file r_file_perms;
16 allow hal_dumpstate_impl sysfs_usb_device:dir r_dir_perms;
17 allow hal_dumpstate_impl sysfs_usb_device:file r_file_perms;
18 allow hal_dumpstate_impl ssr_log_file:dir search;
19 allow hal_dumpstate_impl ssr_log_file:file r_file_perms;
20 allow hal_dumpstate_impl tcpdump_vendor_data_file:dir create_dir_perms;
21 allow hal_dumpstate_impl tcpdump_vendor_data_file:file create_file_perms;
[all …]
Dhal_camera.te1 allow hal_camera self:capability sys_nice;
4 #allow hal_camera camera:unix_dgram_socket sendto;
5 #allow hal_camera camera_data_file:sock_file write;
6 #allow hal_camera camera_device:chr_file rw_file_perms;
8 allow hal_camera gpu_device:chr_file rw_file_perms;
11 allow hal_camera input_device:dir r_dir_perms;
12 allow hal_camera input_device:chr_file r_file_perms;
16 #allow hal_camera sysfs_enable_ps_sensor:file w_file_perms;
19 allow hal_camera system_file:dir r_dir_perms;
21 allow hal_camera qdisplay_service:service_manager find;
[all …]
Dueventd.te1 allow ueventd sysfs_thermal:file w_file_perms;
2 allow ueventd sysfs_leds:file w_file_perms;
3 allow ueventd sysfs_camera:file w_file_perms;
4 allow ueventd sysfs_easel:file w_file_perms;
5 allow ueventd sysfs_fingerprint:file w_file_perms;
6 allow ueventd sysfs_graphics:file w_file_perms;
7 allow ueventd sysfs_laser:file w_file_perms;
8 allow ueventd sysfs_rmtfs:file w_file_perms;
9 allow ueventd sysfs_scsi_devices_0000:file write;
10 allow ueventd sysfs_soc:file w_file_perms;
[all …]
Dhal_graphics_composer_default.te3 allow hal_graphics_composer_default qdisplay_service:service_manager { add find };
5 allow hal_graphics_composer_default sysfs_camera:dir search;
6 allow hal_graphics_composer_default sysfs_camera:file r_file_perms;
7 allow hal_graphics_composer_default sysfs_msm_subsys:dir search;
8 allow hal_graphics_composer_default sysfs_msm_subsys:file r_file_perms;
9 allow hal_graphics_composer_default sysfs_mdss_mdp_caps:file r_file_perms;
10 allow hal_graphics_composer_default persist_file:dir search;
13 allow hal_graphics_composer_default diag_device:chr_file rw_file_perms;
17 allow hal_graphics_composer_default mnt_vendor_file:dir search;
18 allow hal_graphics_composer_default mnt_vendor_file:file r_file_perms;
[all …]
Dnetmgrd.te9 allow netmgrd netmgrd_socket:dir w_dir_perms;
10 allow netmgrd netmgrd_socket:sock_file create_file_perms;
11 allow netmgrd self:netlink_xfrm_socket { create_socket_perms_no_ioctl nlmsg_write };
12 allow netmgrd self:netlink_generic_socket create_socket_perms_no_ioctl;
13 allow netmgrd self:netlink_route_socket nlmsg_write;
14 allow netmgrd self:netlink_socket create_socket_perms_no_ioctl;
15 allow netmgrd self:socket create_socket_perms;
19 allow netmgrd sysfs_net:dir r_dir_perms;
20 allow netmgrd sysfs_net:file rw_file_perms;
21 allow netmgrd sysfs_soc:dir search;
[all …]
Dtee.te1 allow tee self:capability { chown setgid setuid sys_admin sys_rawio };
3 allow tee device:dir r_dir_perms;
13 allow tee hal_display_config_hwservice:hwservice_manager find;
14 allow tee hal_tui_comm_hwservice:hwservice_manager find;
15 allow tee qdisplay_service:service_manager find;
16 allow tee vendor_tui_data_file:file rw_file_perms;
17 allow tee vendor_tui_data_file:dir search;
19 allow tee block_device:dir { getattr search };
20 allow tee ssd_block_device:blk_file rw_file_perms;
21 allow tee sg_device:chr_file { rw_file_perms setattr };
[all …]
Dhardware_info_app.te6 allow hardware_info_app app_data_file:file execute;
9 allow hardware_info_app app_api_service:service_manager find;
12 allow hardware_info_app shell_data_file:dir search;
13 allow hardware_info_app shell_data_file:file { open read };
16 allow hardware_info_app sysfs_batteryinfo:dir search;
17 allow hardware_info_app sysfs_batteryinfo:file { getattr open read };
18 allow hardware_info_app sysfs_camera:dir search;
19 allow hardware_info_app sysfs_camera:file { getattr open read };
20 allow hardware_info_app sysfs_msm_subsys:dir search;
21 allow hardware_info_app sysfs_scsi_devices_0000:dir search;
[all …]
/device/google/coral-sepolicy/vendor/google/
Dhal_dumpstate_impl.te8 allow hal_dumpstate_impl vendor_shell_exec:file rx_file_perms;
9 allow hal_dumpstate_impl vendor_toolbox_exec:file rx_file_perms;
12 allow hal_dumpstate_impl sysfs_touch:dir r_dir_perms;
13 allow hal_dumpstate_impl sysfs_touch:file rw_file_perms;
14 allow hal_dumpstate_impl proc_touch:file rw_file_perms;
16 allow hal_dumpstate_impl debugfs_f2fs:dir r_dir_perms;
17 allow hal_dumpstate_impl debugfs_f2fs:file r_file_perms;
18 allow hal_dumpstate_impl debugfs_ufs:dir r_dir_perms;
19 allow hal_dumpstate_impl debugfs_ufs:file r_file_perms;
20 allow hal_dumpstate_impl debugfs_ipc:dir r_dir_perms;
[all …]
/device/google/bonito-sepolicy/vendor/qcom/common/
Dhal_dumpstate_impl.te8 allow hal_dumpstate_impl vendor_shell_exec:file rx_file_perms;
9 allow hal_dumpstate_impl vendor_toolbox_exec:file rx_file_perms;
12 allow hal_dumpstate_impl debugfs_tracing_instances:dir search;
13 allow hal_dumpstate_impl debugfs_tracing_instances:file r_file_perms;
18 allow hal_dumpstate_impl netmgr_data_file:dir r_dir_perms;
19 allow hal_dumpstate_impl netmgr_data_file:file r_file_perms;
20 allow hal_dumpstate_impl sysfs_usb_device:dir r_dir_perms;
21 allow hal_dumpstate_impl sysfs_usb_device:file r_file_perms;
22 allow hal_dumpstate_impl ssr_log_file:dir search;
23 allow hal_dumpstate_impl ssr_log_file:file r_file_perms;
[all …]
Dueventd.te1 allow ueventd sysfs_thermal:file w_file_perms;
2 allow ueventd sysfs_leds:file w_file_perms;
3 allow ueventd sysfs_camera:file w_file_perms;
4 allow ueventd sysfs_easel:file w_file_perms;
5 allow ueventd sysfs_fingerprint:file w_file_perms;
6 allow ueventd sysfs_graphics:file w_file_perms;
7 allow ueventd sysfs_laser:file w_file_perms;
8 allow ueventd sysfs_rmtfs:file w_file_perms;
9 allow ueventd sysfs_scsi_devices_0000:file write;
10 allow ueventd sysfs_soc:file w_file_perms;
[all …]
Dhal_camera.te1 allow hal_camera self:capability sys_nice;
4 #allow hal_camera camera:unix_dgram_socket sendto;
5 #allow hal_camera camera_data_file:sock_file write;
6 #allow hal_camera camera_device:chr_file rw_file_perms;
8 allow hal_camera gpu_device:chr_file rw_file_perms;
11 allow hal_camera input_device:dir r_dir_perms;
12 allow hal_camera input_device:chr_file r_file_perms;
16 #allow hal_camera sysfs_enable_ps_sensor:file w_file_perms;
19 allow hal_camera system_file:dir r_dir_perms;
21 allow hal_camera qdisplay_service:service_manager find;
[all …]
Dhal_graphics_composer_default.te3 allow hal_graphics_composer_default qdisplay_service:service_manager { add find };
5 allow hal_graphics_composer_default sysfs_camera:dir search;
6 allow hal_graphics_composer_default sysfs_camera:file r_file_perms;
7 allow hal_graphics_composer_default sysfs_msm_subsys:dir search;
8 allow hal_graphics_composer_default sysfs_msm_subsys:file r_file_perms;
9 allow hal_graphics_composer_default sysfs_mdss_mdp_caps:file r_file_perms;
10 allow hal_graphics_composer_default mnt_vendor_file:dir search;
11 allow hal_graphics_composer_default persist_file:dir search;
14 allow hal_graphics_composer_default diag_device:chr_file rw_file_perms;
18 allow hal_graphics_composer_default mnt_vendor_file:dir search;
[all …]
Dnetmgrd.te9 allow netmgrd netmgrd_socket:dir w_dir_perms;
10 allow netmgrd netmgrd_socket:sock_file create_file_perms;
11 allow netmgrd self:netlink_xfrm_socket { create_socket_perms_no_ioctl nlmsg_write };
12 allow netmgrd self:netlink_generic_socket create_socket_perms_no_ioctl;
13 allow netmgrd self:netlink_route_socket nlmsg_write;
14 allow netmgrd self:netlink_socket create_socket_perms_no_ioctl;
15 allow netmgrd self:socket create_socket_perms;
19 allow netmgrd sysfs_net:dir r_dir_perms;
20 allow netmgrd sysfs_net:file rw_file_perms;
21 allow netmgrd sysfs_soc:dir search;
[all …]
Dsmlog_dump.te5 allow smlog_dump modem_dump_file:dir create_dir_perms;
6 allow smlog_dump modem_dump_file:file create_file_perms;
10 allow smlog_dump diag_device:chr_file rw_file_perms;
11 allow smlog_dump radio_vendor_data_file:file { append read write };
12 allow smlog_dump rild:fd use;
13 allow smlog_dump rild:fifo_file { read write };
14 allow smlog_dump rild:unix_stream_socket { read write };
15 allow smlog_dump rild:netlink_generic_socket { read write };
16 allow smlog_dump self:socket create_socket_perms;
18 allow smlog_dump sysfs:dir r_dir_perms;
[all …]
Dtee.te1 allow tee self:capability { chown setgid setuid sys_admin sys_rawio };
3 allow tee device:dir r_dir_perms;
13 allow tee hal_tui_comm_hwservice:hwservice_manager find;
14 allow tee qdisplay_service:service_manager find;
15 allow tee vendor_tui_data_file:file rw_file_perms;
16 allow tee vendor_tui_data_file:dir search;
18 allow tee block_device:dir { getattr search };
19 allow tee ssd_block_device:blk_file rw_file_perms;
20 allow tee sg_device:chr_file { rw_file_perms setattr };
22 allow tee mnt_vendor_file:dir r_dir_perms;
[all …]
/device/google/wahoo/sepolicy/vendor/
Dhal_dumpstate_impl.te8 allow hal_dumpstate_impl vendor_shell_exec:file rx_file_perms;
9 allow hal_dumpstate_impl vendor_toolbox_exec:file rx_file_perms;
12 allow hal_dumpstate_impl debugfs_tracing_instances:dir search;
13 allow hal_dumpstate_impl debugfs_tracing_instances:file r_file_perms;
18 allow hal_dumpstate_impl modem_dump_file:dir create_dir_perms;
19 allow hal_dumpstate_impl modem_dump_file:file create_file_perms;
20 allow hal_dumpstate_impl radio_vendor_data_file:dir r_dir_perms;
21 allow hal_dumpstate_impl netmgr_data_file:dir r_dir_perms;
22 allow hal_dumpstate_impl radio_vendor_data_file:file r_file_perms;
23 allow hal_dumpstate_impl netmgr_data_file:file r_file_perms;
[all …]
Dsmlog_dump.te5 allow smlog_dump modem_dump_file:dir create_dir_perms;
6 allow smlog_dump modem_dump_file:file create_file_perms;
10 allow smlog_dump diag_device:chr_file rw_file_perms;
11 allow smlog_dump radio_vendor_data_file:file { append read write };
12 allow smlog_dump rild:fd use;
13 allow smlog_dump rild:fifo_file { read write };
14 allow smlog_dump rild:unix_stream_socket { read write };
15 allow smlog_dump rild:netlink_generic_socket { read write };
16 allow smlog_dump self:socket create_socket_perms;
18 allow smlog_dump sysfs:dir r_dir_perms;
[all …]
Dhal_graphics_composer_default.te3 allow hal_graphics_composer_default qdisplay_service:service_manager { add find };
5 allow hal_graphics_composer_default persist_display_file:dir search;
6 allow hal_graphics_composer_default persist_display_file:file r_file_perms;
8 allow hal_graphics_composer_default sysfs_camera:dir search;
9 allow hal_graphics_composer_default sysfs_camera:file r_file_perms;
10 allow hal_graphics_composer_default sysfs_msm_subsys:dir search;
11 allow hal_graphics_composer_default sysfs_msm_subsys:file r_file_perms;
12 allow hal_graphics_composer_default sysfs_mdss_mdp_caps:file r_file_perms;
13 allow hal_graphics_composer_default persist_file:dir search;
15 allow hal_graphics_composer_default hal_graphics_mapper_hwservice:hwservice_manager find;
[all …]
Dnetmgrd.te10 allow netmgrd netmgrd_socket:dir w_dir_perms;
11 allow netmgrd netmgrd_socket:sock_file create_file_perms;
12 allow netmgrd self:netlink_xfrm_socket { create_socket_perms_no_ioctl nlmsg_write };
13 allow netmgrd self:netlink_generic_socket create_socket_perms_no_ioctl;
14 allow netmgrd self:netlink_route_socket nlmsg_write;
15 allow netmgrd self:netlink_socket create_socket_perms_no_ioctl;
16 allow netmgrd self:socket create_socket_perms;
20 allow netmgrd sysfs_net:dir r_dir_perms;
21 allow netmgrd sysfs_net:file rw_file_perms;
22 allow netmgrd sysfs_soc:dir search;
[all …]
/device/google/coral-sepolicy/vendor/qcom/common/
Dtee.te1 allow tee self:capability { chown setgid setuid sys_admin sys_rawio };
3 allow tee device:dir r_dir_perms;
7 allow tee block_device:dir { getattr search };
8 allow tee ssd_block_device:blk_file rw_file_perms;
9 allow tee sg_device:chr_file { rw_file_perms setattr };
10 allow tee qsee_ipc_irq_spss_device:chr_file rw_file_perms;
11 allow tee mnt_vendor_file:dir search;
12 allow tee persist_file:dir search;
13 allow tee persist_file:lnk_file read;
14 allow tee persist_drm_file:dir create_dir_perms;
[all …]
Dhardware_info_app.te6 allow hardware_info_app app_data_file:file execute;
9 allow hardware_info_app app_api_service:service_manager find;
12 allow hardware_info_app shell_data_file:dir search;
13 allow hardware_info_app shell_data_file:file r_file_perms;
16 allow hardware_info_app sysfs_display:dir search;
17 allow hardware_info_app sysfs_display:file r_file_perms;
20 allow hardware_info_app sysfs_soc:dir search;
21 allow hardware_info_app sysfs_soc:file r_file_perms;
24 allow hardware_info_app sysfs_batteryinfo:dir search;
25 allow hardware_info_app sysfs_batteryinfo:file r_file_perms;
[all …]
/device/generic/goldfish/sepolicy/common/
Dgoldfish_setup.te9 allow goldfish_setup self:capability { fowner chown net_admin net_raw };
10 allow goldfish_setup self:udp_socket { create ioctl };
11 allow goldfish_setup vendor_toolbox_exec:file execute_no_trans;
12 allow goldfish_setup vendor_file:file execute_no_trans;
15 allow goldfish_setup vendor_shell_exec:file { rx_file_perms };
17 allow goldfish_setup goldfish_ip_exec:file execute_no_trans;
18 allow goldfish_setup goldfish_iw_exec:file execute_no_trans;
19 allow goldfish_setup mac80211_create_radios_exec:file execute_no_trans;
25 allow goldfish_setup self:netlink_route_socket { create nlmsg_write setopt bind getattr read write …
26 allow goldfish_setup self:netlink_generic_socket create_socket_perms_no_ioctl;
[all …]
/device/linaro/poplar/sepolicy/
Dtee.te1 # allow run xtest as shell
3 allow shell tee_exec:file { getattr execute read open execute_no_trans };
4 ## allow shell tee_data_file:file { create write open getattr unlink read };
5 ## allow shell tee_data_file:dir { write add_name remove_name rename search };
6 ## allow shell tee_data_file:chr_file { read write open ioctl };
7 allow tee console_device:chr_file { getattr read write ioctl };
8 allow tee shell:fd { use };
10 ## allow tee tee_data_file:dir { create rmdir rename };
11 #allow tee system_data_file:file { append }; #write open
12 allow tee system_data_file:dir { getattr }; # open write
[all …]
Dhal_graphics_composer_default.te1 allow hal_graphics_composer_default init:unix_stream_socket { connectto };
2 allow hal_graphics_composer_default property_socket:sock_file { write };
4 allow hal_graphics_composer_default hi_vfmw_device:chr_file { read write open ioctl getattr};
5 allow hal_graphics_composer_default hi_mem_device:chr_file { open read write};
6 allow hal_graphics_composer_default graphics_device:chr_file { read write};
8 allow hal_graphics_composer_default hi_gfx2d_device:chr_file { read write open ioctl };
9 allow hal_graphics_composer_default hi_vo_device:chr_file { read write open ioctl };
10 allow hal_graphics_composer_default mmz_userdev_device:chr_file { read write open ioctl };
11 allow hal_graphics_composer_default hi_vdec_device:chr_file { read write open ioctl };
12 allow hal_graphics_composer_default hi_pq_device:chr_file { read write open ioctl};
[all …]
/device/google/bonito-sepolicy/vendor/google/
Dhal_health_default.te7 allow hal_health_default sysfs_wlc:dir r_dir_perms;
9 allow hal_health_default hal_pixelstats_hwservice:hwservice_manager find;
10 allow hal_health_default pixelstats_system:binder call;
11 allow hal_health_default fwk_stats_hwservice:hwservice_manager find;
13 allow hal_health_default persist_file:dir search;
14 allow hal_health_default persist_battery_file:file create_file_perms;
15 allow hal_health_default persist_battery_file:dir rw_dir_perms;
16 allow hal_health_default sysfs_batteryinfo:dir search;
17 allow hal_health_default sysfs_batteryinfo:file rw_file_perms;
18 allow hal_health_default sysfs_mmc:dir search;
[all …]

12345678910>>...29