Searched refs:allow (Results 1 – 25 of 1226) sorted by relevance
12345678910>>...50
9 allow iorap_inode2filename iorapd:fd use;10 allow iorap_inode2filename iorapd:fifo_file { read write getattr };13 allow iorap_inode2filename self:capability dac_read_search;18 allow iorap_inode2filename apex_data_file:dir { getattr open read search };19 allow iorap_inode2filename apex_data_file:file { getattr };20 allow iorap_inode2filename apex_mnt_dir:dir { getattr open read search };21 allow iorap_inode2filename apex_mnt_dir:file { getattr };22 allow iorap_inode2filename apk_data_file:dir { getattr open read search };23 allow iorap_inode2filename apk_data_file:file { getattr };24 allow iorap_inode2filename app_data_file:dir { getattr open read search };[all …]
14 allow mediaserver proc:lnk_file getattr;17 allow mediaserver system_file:dir r_dir_perms;21 allow mediaserver self:process ptrace;29 allow mediaserver media_data_file:dir create_dir_perms;30 allow mediaserver media_data_file:file create_file_perms;31 allow mediaserver { app_data_file privapp_data_file }:file { append getattr ioctl lock map read wri…32 allow mediaserver sdcard_type:file write;33 allow mediaserver gpu_device:chr_file rw_file_perms;34 allow mediaserver video_device:dir r_dir_perms;35 allow mediaserver video_device:chr_file rw_file_perms;[all …]
4 allow sdcardd cgroup:dir create_dir_perms;5 allow sdcardd fuse_device:chr_file rw_file_perms;6 allow sdcardd rootfs:dir mounton; # TODO: deprecated in M7 allow sdcardd sdcardfs:filesystem remount;8 allow sdcardd tmpfs:dir r_dir_perms;9 allow sdcardd mnt_media_rw_file:dir r_dir_perms;10 allow sdcardd storage_file:dir search;11 allow sdcardd storage_stub_file:dir { search mounton };12 allow sdcardd sdcard_type:filesystem { mount unmount };13 allow sdcardd self:global_capability_class_set { setuid setgid dac_override dac_read_search sys_adm…[all …]
6 allow vold cache_file:dir r_dir_perms;7 allow vold cache_file:file { getattr read };8 allow vold cache_file:lnk_file r_file_perms;15 allow vold sysfs:file w_file_perms;16 allow vold sysfs_usb:file w_file_perms;17 allow vold sysfs_zram_uevent:file w_file_perms;20 allow vold proc_meminfo:file r_file_perms;23 allow vold file_contexts_file:file r_file_perms;26 allow vold self:process setexec;29 allow vold shell_exec:file rx_file_perms;[all …]
16 allow mediaserver proc:lnk_file getattr;19 allow mediaserver system_file:dir r_dir_perms;23 allow mediaserver self:process ptrace;31 allow mediaserver media_data_file:dir create_dir_perms;32 allow mediaserver media_data_file:file create_file_perms;33 allow mediaserver app_data_file:dir search;34 allow mediaserver app_data_file:file rw_file_perms;35 allow mediaserver sdcard_type:file write;36 allow mediaserver gpu_device:chr_file rw_file_perms;37 allow mediaserver video_device:dir r_dir_perms;[all …]
12 allow shell pstorefs:dir search;13 allow shell pstorefs:file r_file_perms;16 allow shell rootfs:dir r_dir_perms;19 allow shell anr_data_file:dir r_dir_perms;20 allow shell anr_data_file:file r_file_perms;23 allow shell shell_data_file:dir create_dir_perms;24 allow shell shell_data_file:file create_file_perms;25 allow shell shell_data_file:file rx_file_perms;26 allow shell shell_data_file:lnk_file create_file_perms;29 allow shell profman_dump_data_file:dir { search getattr write remove_name };[all …]
8 allow rild self:netlink_route_socket nlmsg_write;9 allow rild kernel:system module_request;10 allow rild self:capability { setpcap setgid setuid net_admin net_raw };11 allow rild alarm_device:chr_file rw_file_perms;12 allow rild cgroup:dir create_dir_perms;13 allow rild cgroup:{ file lnk_file } r_file_perms;14 allow rild radio_device:chr_file rw_file_perms;15 allow rild radio_device:blk_file r_file_perms;16 allow rild mtd_device:dir search;17 allow rild efs_file:dir create_dir_perms;[all …]
14 allow platform_app shell_data_file:dir search;15 allow platform_app shell_data_file:file { open getattr read };16 allow platform_app icon_file:file { open getattr read };19 allow platform_app { apk_tmp_file apk_private_tmp_file }:dir rw_dir_perms;20 allow platform_app { apk_tmp_file apk_private_tmp_file }:file rw_file_perms;21 allow platform_app apk_private_data_file:dir search;23 allow platform_app asec_apk_file:dir create_dir_perms;24 allow platform_app asec_apk_file:file create_file_perms;27 allow platform_app media_rw_data_file:dir create_dir_perms;28 allow platform_app media_rw_data_file:file create_file_perms;[all …]
15 allow system_server zygote_tmpfs:file read;18 allow system_server dalvikcache_data_file:dir r_dir_perms;19 allow system_server dalvikcache_data_file:file r_file_perms;23 with_asan(`allow system_server dalvikcache_data_file:lnk_file r_file_perms;')26 allow system_server resourcecache_data_file:file r_file_perms;27 allow system_server resourcecache_data_file:dir r_dir_perms;30 allow system_server self:process ptrace;33 allow system_server zygote:fd use;34 allow system_server zygote:process sigchld;37 allow system_server zygote:process sigkill;[all …]
15 allow platform_app shell_data_file:dir search;16 allow platform_app shell_data_file:file { open getattr read };17 allow platform_app icon_file:file { open getattr read };20 allow platform_app { apk_tmp_file apk_private_tmp_file }:dir rw_dir_perms;21 allow platform_app { apk_tmp_file apk_private_tmp_file }:file rw_file_perms;22 allow platform_app apk_private_data_file:dir search;24 allow platform_app asec_apk_file:dir create_dir_perms;25 allow platform_app asec_apk_file:file create_file_perms;28 allow platform_app media_rw_data_file:dir create_dir_perms;29 allow platform_app media_rw_data_file:file create_file_perms;[all …]
16 allow system_server zygote_tmpfs:file read;19 allow system_server dalvikcache_data_file:dir r_dir_perms;20 allow system_server dalvikcache_data_file:file { r_file_perms execute };27 allow system_server resourcecache_data_file:file r_file_perms;28 allow system_server resourcecache_data_file:dir r_dir_perms;31 allow system_server self:process ptrace;34 allow system_server reboot_data_file:file { rename r_file_perms unlink };35 allow system_server reboot_data_file:dir { write search open remove_name };38 allow system_server zygote:fd use;39 allow system_server zygote:process sigchld;[all …]
20 <allow own="org.chromium.UpdateEngine" />21 <allow send_destination="org.chromium.UpdateEngine" />24 <allow send_destination="org.chromium.UpdateEngine"27 <allow send_destination="org.chromium.UpdateEngine"30 <allow send_destination="org.chromium.UpdateEngine"33 <allow send_destination="org.chromium.UpdateEngine"36 <allow send_destination="org.chromium.UpdateEngine"39 <allow send_destination="org.chromium.UpdateEngine"42 <allow send_destination="org.chromium.UpdateEngine"45 <allow send_destination="org.chromium.UpdateEngine"[all …]
6 allow vold cache_file:dir r_dir_perms;7 allow vold cache_file:file { getattr read };8 allow vold cache_file:lnk_file r_file_perms;12 allow vold {24 allow vold {34 allow vold file_contexts_file:file r_file_perms;37 allow vold self:process setexec;40 allow vold e2fs_exec:file rx_file_perms;59 allow vold self:process setfscreate;60 allow vold system_file:file x_file_perms;[all …]
6 allow vold cache_file:dir r_dir_perms;7 allow vold cache_file:file { getattr read };8 allow vold cache_file:lnk_file r_file_perms;14 allow vold sysfs:file w_file_perms; # writing to /sys/*/uevent during coldboot.15 allow vold sysfs_dm:file w_file_perms;16 allow vold sysfs_usb:file w_file_perms;17 allow vold sysfs_zram_uevent:file w_file_perms;21 allow vold {31 allow vold file_contexts_file:file r_file_perms;34 allow vold self:process setexec;[all …]