Home
last modified time | relevance | path

Searched refs:allow (Results 1 – 25 of 278) sorted by relevance

12345678910>>...12

/hardware/google/pixel-sepolicy/pixelstats/
Dpixelstats_vendor.te11 allow pixelstats_vendor sysfs_batteryinfo:file w_file_perms;
12 allow pixelstats_vendor self:netlink_kobject_uevent_socket create_socket_perms_no_ioctl;
14 allow pixelstats_vendor mnt_vendor_file:dir search;
15 allow pixelstats_vendor sysfs_scsi_devices_0000:dir search;
16 allow pixelstats_vendor sysfs_scsi_devices_0000:file rw_file_perms;
17 allow pixelstats_vendor sysfs_fs_f2fs:dir search;
18 allow pixelstats_vendor sysfs_fs_f2fs:file rw_file_perms;
22 allow pixelstats_vendor fwk_stats_service:service_manager find;
27 allow pixelstats_vendor kernel:dir search;
28 allow pixelstats_vendor kernel:file r_file_perms;
[all …]
/hardware/google/pixel-sepolicy/wifi_perf_diag/
Dwifi_perf_diag.te10 allow wifi_perf_diag wifi_logging_data_file:dir create_dir_perms;
11 allow wifi_perf_diag wifi_logging_data_file:file create_file_perms;
12 allow wifi_perf_diag vendor_shell_exec:file execute_no_trans;
13 allow wifi_perf_diag wifi_perf_diag_exec:file execute_no_trans;
14 allow wifi_perf_diag self:capability net_admin;
15 allow wifi_perf_diag self:udp_socket ioctl;
19 allow wifi_perf_diag device:dir rw_dir_perms;
20 allow wifi_perf_diag device:file rw_file_perms;
21 allow wifi_perf_diag init:dir search;
22 allow wifi_perf_diag init:file r_file_perms;
[all …]
/hardware/google/pixel-sepolicy/ramdump/
Dramdump.te10 allow ramdump self:capability { sys_admin sys_rawio };
12 allow ramdump ramdump_vendor_data_file:dir create_dir_perms;
13 allow ramdump ramdump_vendor_data_file:file create_file_perms;
14 allow ramdump proc_cmdline:file r_file_perms;
16 allow ramdump block_device:dir search;
17 allow ramdump misc_block_device:blk_file rw_file_perms;
18 allow ramdump userdata_block_device:blk_file rw_file_perms;
24 allow ramdump rootfs:file r_file_perms;
32 allow ramdump fwk_stats_hwservice:hwservice_manager find;
34 allow ramdump fwk_stats_service:service_manager find;
[all …]
/hardware/google/pixel-sepolicy/power-libperfmgr/
Dhal_power_default.te3 allow hal_power_default sysfs_devices_system_cpu:file rw_file_perms;
4 allow hal_power_default latency_device:chr_file rw_file_perms;
5 allow hal_power_default cgroup:file r_file_perms;
14 allow hal_power_default appdomain:process { getsched setsched };
15 allow hal_power_default self:capability sys_nice;
18 allow hal_power_default surfaceflinger:process setsched;
21 allow hal_power_default hal_graphics_composer_default:process setsched;
24 allow hal_power_default system_server:process setsched;
27 allow hal_power_default proc_stat:file r_file_perms;
28 allow hal_power_default proc_vendor_sched:dir r_dir_perms;
[all …]
/hardware/google/pixel-sepolicy/hardware_info_app/
Dhardware_info_app.te4 allow hardware_info_app app_api_service:service_manager find;
7 allow hardware_info_app sysfs_scsi_devices_0000:dir search;
8 allow hardware_info_app sysfs_scsi_devices_0000:file r_file_perms;
11 allow hardware_info_app sysfs_pixelstats:file r_file_perms;
14 allow hardware_info_app sysfs_batteryinfo:dir search;
15 allow hardware_info_app sysfs_batteryinfo:file r_file_perms;
18 allow hardware_info_app sysfs_display:dir search;
19 allow hardware_info_app sysfs_display:file r_file_perms;
22 allow hardware_info_app sysfs_soc:file r_file_perms;
23 allow hardware_info_app sysfs_chip_id:file r_file_perms;
[all …]
/hardware/google/pixel-sepolicy/wifi_diagnostic/
Dwifi_diagnostic.te10 allow wifi_diagnostic wifi_logging_data_file:dir create_dir_perms;
11 allow wifi_diagnostic wifi_logging_data_file:file create_file_perms;
12 allow wifi_diagnostic vendor_shell_exec:file execute_no_trans;
13 allow wifi_diagnostic wifi_diagnostic_exec:file execute_no_trans;
14 allow wifi_diagnostic self:capability net_admin;
15 allow wifi_diagnostic self:udp_socket ioctl;
19 allow wifi_diagnostic self:capability { setgid setuid };
20 allow wifi_diagnostic wpa_data_file:dir w_dir_perms;
21 allow wifi_diagnostic wpa_data_file:sock_file { create setattr write unlink };
22 allow wifi_diagnostic hal_wifi_supplicant_default:unix_dgram_socket sendto;
[all …]
/hardware/google/pixel-sepolicy/vibrator/cs40l26/
Dhal_vibrator_default.te1 allow hal_vibrator_default input_device:dir r_dir_perms;
2 allow hal_vibrator_default input_device:chr_file rw_file_perms;
3 allow hal_vibrator_default sysfs_vibrator:dir search;
4 allow hal_vibrator_default sysfs_vibrator:file rw_file_perms;
6 allow hal_vibrator_default audio_device:dir search;
7 allow hal_vibrator_default proc_asound:dir search;
8 allow hal_vibrator_default proc_asound:file r_file_perms;
9 allow hal_vibrator_default vibrator_snd_device:chr_file rw_file_perms;
10 allow hal_vibrator_default vibrator_snd_device:dir search;
12 allow hal_vibrator_default mnt_vendor_file:dir search;
[all …]
/hardware/google/pixel-sepolicy/vibrator/cs40l25/
Dhal_vibrator_default.te1 allow hal_vibrator_default sysfs_leds:dir search;
3 allow hal_vibrator_default mnt_vendor_file:dir search;
4 allow hal_vibrator_default persist_file:dir search;
6 allow hal_vibrator_default vibrator_snd_device:chr_file rw_file_perms;
7 allow hal_vibrator_default vibrator_snd_device:dir search;
8 allow hal_vibrator_default audio_device:dir search;
9 allow hal_vibrator_default proc_asound:dir search;
10 allow hal_vibrator_default proc_asound:file r_file_perms;
20 allow hal_vibrator_default fwk_stats_service:service_manager find;
/hardware/google/pixel-sepolicy/sscoredump/
Dsscoredump.te8 allow sscoredump device:dir r_dir_perms;
9 allow sscoredump sscoredump_device:chr_file rw_file_perms;
10 allow sscoredump sscoredump_vendor_data_crashinfo_file:dir create_dir_perms;
11 allow sscoredump sscoredump_vendor_data_crashinfo_file:file create_file_perms;
12 allow sscoredump sysfs_sscoredump_subsystem_report_count:file r_file_perms;
15 allow sscoredump sysfs_sscoredump_level:file rw_file_perms;
16 allow sscoredump sscoredump_vendor_data_coredump_file:dir create_dir_perms;
17 allow sscoredump sscoredump_vendor_data_coredump_file:file create_file_perms;
/hardware/google/pixel-sepolicy/wifi_sniffer/
Dwifi_sniffer.te10 allow wifi_sniffer self:capability { net_admin net_raw };
11 allow wifi_sniffer sysfs_wifi_conmode:file rw_file_perms;
15 allow wifi_sniffer self:netlink_generic_socket create_socket_perms;
19 allow wifi_sniffer self:packet_socket create_socket_perms;
21 allow wifi_sniffer self:unix_dgram_socket ioctl;
23 allow wifi_sniffer sysfs_net:dir search;
24 allow wifi_sniffer sysfs_net:file r_file_perms;
25 allow wifi_sniffer tcpdump_exec:file rx_file_perms;
26 allow wifi_sniffer wifi_logging_data_file:file create_file_perms;
27 allow wifi_sniffer wifi_logging_data_file:dir create_dir_perms;
/hardware/google/pixel-sepolicy/mm/gki/
Dvendor_init.te1 allow vendor_init proc_watermark_boost_factor:file w_file_perms;
2 allow vendor_init proc_lowmem_reserve_ratio:file w_file_perms;
3 allow vendor_init proc_min_free_kbytes:file w_file_perms;
5 allow vendor_init debugfs_tracing_instances:dir create_dir_perms;
6 allow vendor_init debugfs_tracing_instances:file w_file_perms;
Dinit-mm-logging.sh.te10 allow init-mm-logging-sh vendor_toolbox_exec:file rx_file_perms;
11 allow init-mm-logging-sh proc_vmstat:file r_file_perms;
12 allow init-mm-logging-sh mm_logd_vendor_data_file:dir create_dir_perms;
13 allow init-mm-logging-sh mm_logd_vendor_data_file:file create_file_perms;
15 allow init-mm-logging-sh kernel:dir r_dir_perms;
16 allow init-mm-logging-sh kernel:file r_file_perms;
17 allow init-mm-logging-sh proc_stat:file r_file_perms;
/hardware/google/pixel-sepolicy/confirmationui_hal/
Dhal_confirmationui.te1 allow hal_confirmationui_server tee_device:chr_file rw_file_perms;
2 allow hal_confirmationui_server ion_device:chr_file r_file_perms;
4 allow hal_confirmationui_server hal_tui_comm_hwservice:hwservice_manager find;
10 allow hal_confirmationui_server input_device:chr_file rw_file_perms;
11 allow hal_confirmationui_server input_device:dir r_dir_perms;
/hardware/google/pixel-sepolicy/mm/
Dinit-mm-logging.sh.te10 allow init-mm-logging-sh vendor_toolbox_exec:file rx_file_perms;
11 allow init-mm-logging-sh proc_vmstat:file r_file_perms;
12 allow init-mm-logging-sh mm_logd_vendor_data_file:dir create_dir_perms;
13 allow init-mm-logging-sh mm_logd_vendor_data_file:file create_file_perms;
15 allow init-mm-logging-sh kernel:dir r_dir_perms;
16 allow init-mm-logging-sh kernel:file r_file_perms;
17 allow init-mm-logging-sh proc_stat:file r_file_perms;
/hardware/google/pixel-sepolicy/debugpolicy/
Dinit_dpm.te7 allow init_dpm vendor_toolbox_exec:file execute_no_trans;
8 allow init_dpm sysfs_dpm:file r_file_perms;
9 allow init_dpm block_device:dir search;
10 allow init_dpm dpm_block_device:blk_file rw_file_perms;
11 allow init_dpm custom_ab_block_device:blk_file rw_file_perms;
/hardware/google/pixel-sepolicy/logger_app/
Dlogger_app.te7 allow logger_app app_api_service:service_manager find;
8 allow logger_app tcpdump_vendor_data_file:dir create_dir_perms;
9 allow logger_app tcpdump_vendor_data_file:file create_file_perms;
11 allow logger_app wifi_logging_data_file:dir create_dir_perms;
12 allow logger_app wifi_logging_data_file:file create_file_perms;
/hardware/google/pixel-sepolicy/rebalance_interrupts/
Drebalance_interrupts.te7 allow rebalance_interrupts_vendor sysfs_irq:dir r_dir_perms;
8 allow rebalance_interrupts_vendor sysfs_irq:file r_file_perms;
9 allow rebalance_interrupts_vendor proc_irq:dir r_dir_perms;
10 allow rebalance_interrupts_vendor proc_irq:file { rw_file_perms setattr };
11 allow rebalance_interrupts_vendor self:capability { chown setuid setgid };
/hardware/google/pixel-sepolicy/googlebattery/
Dhal_googlebattery.te9 allow hal_googlebattery sysfs_batteryinfo:file rw_file_perms;
10 allow hal_googlebattery self:netlink_kobject_uevent_socket create_socket_perms_no_ioctl;
11 allow hal_googlebattery sysfs_chargelevel:file rw_file_perms;
19 allow hal_googlebattery dumpstate:fd use;
20 allow hal_googlebattery dumpstate:fifo_file write;
/hardware/google/pixel-sepolicy/common/vendor/
Dte_macros12 allow $1 dumpstate:fd use;
13 allow $1 dumpstate:fifo_file { write getattr };
14 allow $1 hal_dumpstate_default:fd use;
15 allow hal_dumpstate_default $1:process { sigkill signal };
16 allow $1 shell_data_file:file { write getattr };
/hardware/google/pixel-sepolicy/citadel/
Dinit_citadel.te10 allow init_citadel citadeld_service:service_manager find;
13 allow init_citadel vendor_toolbox_exec:file rx_file_perms;
16 allow init_citadel citadel_updater_exec:file rx_file_perms;
17 allow init_citadel citadel_device:chr_file rw_file_perms;
Dcitadeld.te7 allow citadeld citadel_device:chr_file rw_file_perms;
12 allow citadeld hal_power_stats_vendor_service:service_manager find;
17 allow citadeld fwk_stats_hwservice:hwservice_manager find;
19 allow citadeld fwk_stats_service:service_manager find;
Dhal_rebootescrow_citadel.te8 allow hal_rebootescrow_citadel citadeld_service:service_manager find;
14 allow hal_rebootescrow_citadel hal_rebootescrow_citadel_data_file:dir create_dir_perms;
15 allow hal_rebootescrow_citadel hal_rebootescrow_citadel_data_file:file create_file_perms;
/hardware/google/pixel-sepolicy/vibrator/drv2624/
Dhal_vibrator_default.te1 allow hal_vibrator_default sysfs_leds:dir search;
3 allow hal_vibrator_default mnt_vendor_file:dir search;
4 allow hal_vibrator_default persist_file:dir search;
/hardware/google/pixel-sepolicy/fingerprint-extension/system_ext/private/
Dinit-fingerprint-extension.te7 allow init-fingerprint-extension shell_exec:file rx_file_perms;
8 allow init-fingerprint-extension system_file:file execute_no_trans;
9allow init-fingerprint-extension toolbox_exec:file {execute read open execute_no_trans map getattr…
10 allow init-fingerprint-extension activity_service:service_manager find;
/hardware/google/pixel-sepolicy/flipendo/
Dflipendo.te6 allow flipendo fwk_stats_service:service_manager find;
11 allow flipendo app_api_service:service_manager find;
14 allow flipendo color_display_service:service_manager find;

12345678910>>...12