Searched refs:allow (Results 1 – 25 of 278) sorted by relevance
12345678910>>...12
11 allow pixelstats_vendor sysfs_batteryinfo:file w_file_perms;12 allow pixelstats_vendor self:netlink_kobject_uevent_socket create_socket_perms_no_ioctl;14 allow pixelstats_vendor mnt_vendor_file:dir search;15 allow pixelstats_vendor sysfs_scsi_devices_0000:dir search;16 allow pixelstats_vendor sysfs_scsi_devices_0000:file rw_file_perms;17 allow pixelstats_vendor sysfs_fs_f2fs:dir search;18 allow pixelstats_vendor sysfs_fs_f2fs:file rw_file_perms;22 allow pixelstats_vendor fwk_stats_service:service_manager find;27 allow pixelstats_vendor kernel:dir search;28 allow pixelstats_vendor kernel:file r_file_perms;[all …]
10 allow wifi_perf_diag wifi_logging_data_file:dir create_dir_perms;11 allow wifi_perf_diag wifi_logging_data_file:file create_file_perms;12 allow wifi_perf_diag vendor_shell_exec:file execute_no_trans;13 allow wifi_perf_diag wifi_perf_diag_exec:file execute_no_trans;14 allow wifi_perf_diag self:capability net_admin;15 allow wifi_perf_diag self:udp_socket ioctl;19 allow wifi_perf_diag device:dir rw_dir_perms;20 allow wifi_perf_diag device:file rw_file_perms;21 allow wifi_perf_diag init:dir search;22 allow wifi_perf_diag init:file r_file_perms;[all …]
10 allow ramdump self:capability { sys_admin sys_rawio };12 allow ramdump ramdump_vendor_data_file:dir create_dir_perms;13 allow ramdump ramdump_vendor_data_file:file create_file_perms;14 allow ramdump proc_cmdline:file r_file_perms;16 allow ramdump block_device:dir search;17 allow ramdump misc_block_device:blk_file rw_file_perms;18 allow ramdump userdata_block_device:blk_file rw_file_perms;24 allow ramdump rootfs:file r_file_perms;32 allow ramdump fwk_stats_hwservice:hwservice_manager find;34 allow ramdump fwk_stats_service:service_manager find;[all …]
3 allow hal_power_default sysfs_devices_system_cpu:file rw_file_perms;4 allow hal_power_default latency_device:chr_file rw_file_perms;5 allow hal_power_default cgroup:file r_file_perms;14 allow hal_power_default appdomain:process { getsched setsched };15 allow hal_power_default self:capability sys_nice;18 allow hal_power_default surfaceflinger:process setsched;21 allow hal_power_default hal_graphics_composer_default:process setsched;24 allow hal_power_default system_server:process setsched;27 allow hal_power_default proc_stat:file r_file_perms;28 allow hal_power_default proc_vendor_sched:dir r_dir_perms;[all …]
4 allow hardware_info_app app_api_service:service_manager find;7 allow hardware_info_app sysfs_scsi_devices_0000:dir search;8 allow hardware_info_app sysfs_scsi_devices_0000:file r_file_perms;11 allow hardware_info_app sysfs_pixelstats:file r_file_perms;14 allow hardware_info_app sysfs_batteryinfo:dir search;15 allow hardware_info_app sysfs_batteryinfo:file r_file_perms;18 allow hardware_info_app sysfs_display:dir search;19 allow hardware_info_app sysfs_display:file r_file_perms;22 allow hardware_info_app sysfs_soc:file r_file_perms;23 allow hardware_info_app sysfs_chip_id:file r_file_perms;[all …]
10 allow wifi_diagnostic wifi_logging_data_file:dir create_dir_perms;11 allow wifi_diagnostic wifi_logging_data_file:file create_file_perms;12 allow wifi_diagnostic vendor_shell_exec:file execute_no_trans;13 allow wifi_diagnostic wifi_diagnostic_exec:file execute_no_trans;14 allow wifi_diagnostic self:capability net_admin;15 allow wifi_diagnostic self:udp_socket ioctl;19 allow wifi_diagnostic self:capability { setgid setuid };20 allow wifi_diagnostic wpa_data_file:dir w_dir_perms;21 allow wifi_diagnostic wpa_data_file:sock_file { create setattr write unlink };22 allow wifi_diagnostic hal_wifi_supplicant_default:unix_dgram_socket sendto;[all …]
1 allow hal_vibrator_default input_device:dir r_dir_perms;2 allow hal_vibrator_default input_device:chr_file rw_file_perms;3 allow hal_vibrator_default sysfs_vibrator:dir search;4 allow hal_vibrator_default sysfs_vibrator:file rw_file_perms;6 allow hal_vibrator_default audio_device:dir search;7 allow hal_vibrator_default proc_asound:dir search;8 allow hal_vibrator_default proc_asound:file r_file_perms;9 allow hal_vibrator_default vibrator_snd_device:chr_file rw_file_perms;10 allow hal_vibrator_default vibrator_snd_device:dir search;12 allow hal_vibrator_default mnt_vendor_file:dir search;[all …]
1 allow hal_vibrator_default sysfs_leds:dir search;3 allow hal_vibrator_default mnt_vendor_file:dir search;4 allow hal_vibrator_default persist_file:dir search;6 allow hal_vibrator_default vibrator_snd_device:chr_file rw_file_perms;7 allow hal_vibrator_default vibrator_snd_device:dir search;8 allow hal_vibrator_default audio_device:dir search;9 allow hal_vibrator_default proc_asound:dir search;10 allow hal_vibrator_default proc_asound:file r_file_perms;20 allow hal_vibrator_default fwk_stats_service:service_manager find;
8 allow sscoredump device:dir r_dir_perms;9 allow sscoredump sscoredump_device:chr_file rw_file_perms;10 allow sscoredump sscoredump_vendor_data_crashinfo_file:dir create_dir_perms;11 allow sscoredump sscoredump_vendor_data_crashinfo_file:file create_file_perms;12 allow sscoredump sysfs_sscoredump_subsystem_report_count:file r_file_perms;15 allow sscoredump sysfs_sscoredump_level:file rw_file_perms;16 allow sscoredump sscoredump_vendor_data_coredump_file:dir create_dir_perms;17 allow sscoredump sscoredump_vendor_data_coredump_file:file create_file_perms;
10 allow wifi_sniffer self:capability { net_admin net_raw };11 allow wifi_sniffer sysfs_wifi_conmode:file rw_file_perms;15 allow wifi_sniffer self:netlink_generic_socket create_socket_perms;19 allow wifi_sniffer self:packet_socket create_socket_perms;21 allow wifi_sniffer self:unix_dgram_socket ioctl;23 allow wifi_sniffer sysfs_net:dir search;24 allow wifi_sniffer sysfs_net:file r_file_perms;25 allow wifi_sniffer tcpdump_exec:file rx_file_perms;26 allow wifi_sniffer wifi_logging_data_file:file create_file_perms;27 allow wifi_sniffer wifi_logging_data_file:dir create_dir_perms;
1 allow vendor_init proc_watermark_boost_factor:file w_file_perms;2 allow vendor_init proc_lowmem_reserve_ratio:file w_file_perms;3 allow vendor_init proc_min_free_kbytes:file w_file_perms;5 allow vendor_init debugfs_tracing_instances:dir create_dir_perms;6 allow vendor_init debugfs_tracing_instances:file w_file_perms;
10 allow init-mm-logging-sh vendor_toolbox_exec:file rx_file_perms;11 allow init-mm-logging-sh proc_vmstat:file r_file_perms;12 allow init-mm-logging-sh mm_logd_vendor_data_file:dir create_dir_perms;13 allow init-mm-logging-sh mm_logd_vendor_data_file:file create_file_perms;15 allow init-mm-logging-sh kernel:dir r_dir_perms;16 allow init-mm-logging-sh kernel:file r_file_perms;17 allow init-mm-logging-sh proc_stat:file r_file_perms;
1 allow hal_confirmationui_server tee_device:chr_file rw_file_perms;2 allow hal_confirmationui_server ion_device:chr_file r_file_perms;4 allow hal_confirmationui_server hal_tui_comm_hwservice:hwservice_manager find;10 allow hal_confirmationui_server input_device:chr_file rw_file_perms;11 allow hal_confirmationui_server input_device:dir r_dir_perms;
7 allow init_dpm vendor_toolbox_exec:file execute_no_trans;8 allow init_dpm sysfs_dpm:file r_file_perms;9 allow init_dpm block_device:dir search;10 allow init_dpm dpm_block_device:blk_file rw_file_perms;11 allow init_dpm custom_ab_block_device:blk_file rw_file_perms;
7 allow logger_app app_api_service:service_manager find;8 allow logger_app tcpdump_vendor_data_file:dir create_dir_perms;9 allow logger_app tcpdump_vendor_data_file:file create_file_perms;11 allow logger_app wifi_logging_data_file:dir create_dir_perms;12 allow logger_app wifi_logging_data_file:file create_file_perms;
7 allow rebalance_interrupts_vendor sysfs_irq:dir r_dir_perms;8 allow rebalance_interrupts_vendor sysfs_irq:file r_file_perms;9 allow rebalance_interrupts_vendor proc_irq:dir r_dir_perms;10 allow rebalance_interrupts_vendor proc_irq:file { rw_file_perms setattr };11 allow rebalance_interrupts_vendor self:capability { chown setuid setgid };
9 allow hal_googlebattery sysfs_batteryinfo:file rw_file_perms;10 allow hal_googlebattery self:netlink_kobject_uevent_socket create_socket_perms_no_ioctl;11 allow hal_googlebattery sysfs_chargelevel:file rw_file_perms;19 allow hal_googlebattery dumpstate:fd use;20 allow hal_googlebattery dumpstate:fifo_file write;
12 allow $1 dumpstate:fd use;13 allow $1 dumpstate:fifo_file { write getattr };14 allow $1 hal_dumpstate_default:fd use;15 allow hal_dumpstate_default $1:process { sigkill signal };16 allow $1 shell_data_file:file { write getattr };
10 allow init_citadel citadeld_service:service_manager find;13 allow init_citadel vendor_toolbox_exec:file rx_file_perms;16 allow init_citadel citadel_updater_exec:file rx_file_perms;17 allow init_citadel citadel_device:chr_file rw_file_perms;
7 allow citadeld citadel_device:chr_file rw_file_perms;12 allow citadeld hal_power_stats_vendor_service:service_manager find;17 allow citadeld fwk_stats_hwservice:hwservice_manager find;19 allow citadeld fwk_stats_service:service_manager find;
8 allow hal_rebootescrow_citadel citadeld_service:service_manager find;14 allow hal_rebootescrow_citadel hal_rebootescrow_citadel_data_file:dir create_dir_perms;15 allow hal_rebootescrow_citadel hal_rebootescrow_citadel_data_file:file create_file_perms;
1 allow hal_vibrator_default sysfs_leds:dir search;3 allow hal_vibrator_default mnt_vendor_file:dir search;4 allow hal_vibrator_default persist_file:dir search;
7 allow init-fingerprint-extension shell_exec:file rx_file_perms;8 allow init-fingerprint-extension system_file:file execute_no_trans;9 …allow init-fingerprint-extension toolbox_exec:file {execute read open execute_no_trans map getattr…10 allow init-fingerprint-extension activity_service:service_manager find;
6 allow flipendo fwk_stats_service:service_manager find;11 allow flipendo app_api_service:service_manager find;14 allow flipendo color_display_service:service_manager find;