Searched refs:allow (Results 1 – 25 of 1250) sorted by relevance
12345678910>>...50
8 allow hal_dumpstate_impl vendor_shell_exec:file rx_file_perms;9 allow hal_dumpstate_impl vendor_toolbox_exec:file rx_file_perms;12 allow hal_dumpstate_impl sysfs_touch:dir r_dir_perms;13 allow hal_dumpstate_impl sysfs_touch:file rw_file_perms;14 allow hal_dumpstate_impl proc_touch:file rw_file_perms;16 allow hal_dumpstate_impl debugfs_f2fs:dir r_dir_perms;17 allow hal_dumpstate_impl debugfs_f2fs:file r_file_perms;18 allow hal_dumpstate_impl debugfs_ufs:dir r_dir_perms;19 allow hal_dumpstate_impl debugfs_ufs:file r_file_perms;20 allow hal_dumpstate_impl debugfs_ipc:dir r_dir_perms;[all …]
2 allow hal_camera_default hal_graphics_mapper_hwservice:hwservice_manager find;3 allow hal_camera_default sysfs_soc:dir search;4 allow hal_camera_default sysfs_soc:file r_file_perms;5 allow hal_camera_default airbrush_device:chr_file rw_file_perms;6 allow hal_camera_default ipu_device:chr_file rw_file_perms;7 allow hal_camera_default airbrush_sm_device:chr_file getattr;8 allow hal_camera_default gpu_device:chr_file rw_file_perms;11 allow hal_camera_default laser_device:chr_file rw_file_perms;12 allow hal_camera_default sysfs_camera:dir search;13 allow hal_camera_default sysfs_camera:file rw_file_perms;[all …]
16 allow google_camera_app privapp_data_file:file { r_file_perms execute };17 allow google_camera_app app_data_file:file { r_file_perms execute };21 allow google_camera_app app_data_file:{ lnk_file sock_file fifo_file } create_file_perms;26 allow google_camera_app system_app_data_file:file { read write getattr };28 allow google_camera_app audioserver_service:service_manager find;29 allow google_camera_app cameraserver_service:service_manager find;30 allow google_camera_app drmserver_service:service_manager find;31 allow google_camera_app mediaserver_service:service_manager find;32 allow google_camera_app mediaextractor_service:service_manager find;33 allow google_camera_app mediametrics_service:service_manager find;[all …]
7 allow hal_dumpstate_impl shell_data_file:file getattr;10 allow hal_dumpstate_impl vendor_shell_exec:file rx_file_perms;11 allow hal_dumpstate_impl vendor_toolbox_exec:file rx_file_perms;14 allow hal_dumpstate_impl proc_bldrlog:file r_file_perms;20 allow hal_dumpstate_impl sysfs_touch:dir r_dir_perms;21 allow hal_dumpstate_impl sysfs_touch:file rw_file_perms;22 allow hal_dumpstate_impl proc_touch:file rw_file_perms;25 allow hal_dumpstate_impl debugfs_dma_buf:file r_file_perms;29 allow hal_dumpstate_impl block_device:dir r_dir_perms;32 allow hal_dumpstate_impl debugfs_pmic:dir r_dir_perms;[all …]
7 allow hal_dumpstate_impl proc_bldrlog:file r_file_perms;13 allow hal_dumpstate_impl sysfs_display:dir r_dir_perms;14 allow hal_dumpstate_impl sysfs_display:file r_file_perms;17 allow hal_dumpstate_impl sysfs_touch:dir r_dir_perms;18 allow hal_dumpstate_impl sysfs_touch:file rw_file_perms;19 allow hal_dumpstate_impl proc_touch:file rw_file_perms;22 allow hal_dumpstate_impl vendor_shell_exec:file rx_file_perms;23 allow hal_dumpstate_impl vendor_toolbox_exec:file rx_file_perms;26 allow hal_dumpstate_impl debugfs_dma_buf:file r_file_perms;32 allow hal_dumpstate_impl debugfs_icnss:dir r_dir_perms;[all …]
3 allow dump_power vendor_toolbox_exec:file execute_no_trans;4 allow dump_power sysfs_acpm_stats:dir r_dir_perms;5 allow dump_power sysfs_acpm_stats:file r_file_perms;6 allow dump_power sysfs_cpu:file r_file_perms;7 allow dump_power sysfs_bcl:dir r_dir_perms;8 allow dump_power sysfs_bcl:file r_file_perms;9 allow dump_power sysfs_odpm:dir r_dir_perms;10 allow dump_power sysfs_odpm:file r_file_perms;11 allow dump_power logbuffer_device:chr_file r_file_perms;12 allow dump_power sysfs_batteryinfo:dir r_dir_perms;[all …]
1 allow hal_fingerprint_default fingerprint_device:chr_file rw_file_perms;2 allow hal_fingerprint_default tee_device:chr_file rw_file_perms;3 allow hal_fingerprint_default self:netlink_socket create_socket_perms_no_ioctl;4 allow hal_fingerprint_default dmabuf_system_heap_device:chr_file r_file_perms;6 allow hal_fingerprint_default fwk_stats_service:service_manager find;11 # allow fingerprint to access power hal18 allow hal_fingerprint_default mfg_data_block_device:blk_file rw_file_perms;19 allow hal_fingerprint_default block_device:dir search;22 allow hal_fingerprint_default fwk_sensor_hwservice:hwservice_manager find;25 allow hal_fingerprint_default sysfs_display:file rw_file_perms;[all …]
1 # allow HWC to access power hal7 allow hal_graphics_composer_default sysfs_display:dir search;8 allow hal_graphics_composer_default sysfs_display:file rw_file_perms;10 # allow HWC to r/w backlight11 allow hal_graphics_composer_default sysfs_leds:dir r_dir_perms;12 allow hal_graphics_composer_default sysfs_leds:file rw_file_perms;15 allow hal_graphics_composer_default self:netlink_kobject_uevent_socket create_socket_perms_no_ioctl;21 # allow HWC to get device_config_surface_flinger_native_boot_prop for adpf flags26 # allow HWC/libdisplaycolor to read calibration data27 allow hal_graphics_composer_default mnt_vendor_file:dir search;[all …]
1 allow hal_fingerprint_default fingerprint_device:chr_file rw_file_perms;2 allow hal_fingerprint_default tee_device:chr_file rw_file_perms;3 allow hal_fingerprint_default self:netlink_socket create_socket_perms_no_ioctl;4 allow hal_fingerprint_default dmabuf_system_heap_device:chr_file r_file_perms;6 allow hal_fingerprint_default fwk_stats_service:service_manager find;10 # allow fingerprint to access power hal17 allow hal_fingerprint_default mfg_data_block_device:blk_file rw_file_perms;18 allow hal_fingerprint_default block_device:dir search;21 allow hal_fingerprint_default fwk_sensor_hwservice:hwservice_manager find;24 allow hal_fingerprint_default sysfs_display:file rw_file_perms;[all …]
2 allow dump_gs101 sysfs_pixel_stat:dir r_dir_perms;3 allow dump_gs101 sysfs_pixel_stat:file r_file_perms;4 allow dump_gs101 vendor_toolbox_exec:file execute_no_trans;5 allow dump_gs101 vendor_camera_data_file:dir r_dir_perms;6 allow dump_gs101 vendor_camera_data_file:file r_file_perms;7 allow dump_gs101 sysfs_acpm_stats:dir r_dir_perms;8 allow dump_gs101 sysfs_acpm_stats:file r_file_perms;9 allow dump_gs101 sysfs_batteryinfo:dir r_dir_perms;10 allow dump_gs101 sysfs_bcl:dir r_dir_perms;11 allow dump_gs101 sysfs_bcl:file r_file_perms;[all …]
12 allow cbd self:capability { setgid setuid };14 allow cbd mnt_vendor_file:dir r_dir_perms;16 allow cbd kmsg_device:chr_file rw_file_perms;18 allow cbd vendor_shell_exec:file execute_no_trans;19 allow cbd vendor_toolbox_exec:file execute_no_trans;22 allow cbd block_device:dir search;23 allow cbd modem_block_device:blk_file r_file_perms;26 allow cbd sysfs_chosen:file r_file_perms;27 allow cbd sysfs_chosen:dir r_dir_perms;29 allow cbd radio_device:chr_file rw_file_perms;[all …]
3 allow hal_camera_default self:global_capability_class_set sys_nice;4 allow hal_camera_default kernel:process setsched;9 allow hal_camera_default lwis_device:chr_file rw_file_perms;10 allow hal_camera_default gpu_device:chr_file rw_file_perms;11 allow hal_camera_default sysfs_chip_id:file r_file_perms;15 allow hal_camera_default dmabuf_system_heap_device:chr_file r_file_perms;16 allow hal_camera_default tee_device:chr_file rw_file_perms;21 allow hal_camera_default edgetpu_device:chr_file rw_file_perms;22 allow hal_camera_default sysfs_edgetpu:dir r_dir_perms;23 allow hal_camera_default sysfs_edgetpu:file r_file_perms;[all …]
11 allow cbd self:capability { setgid setuid };13 allow cbd mnt_vendor_file:dir r_dir_perms;15 allow cbd kmsg_device:chr_file rw_file_perms;17 allow cbd vendor_shell_exec:file execute_no_trans;18 allow cbd vendor_toolbox_exec:file execute_no_trans;21 allow cbd block_device:dir search;22 allow cbd modem_block_device:blk_file r_file_perms;25 allow cbd sysfs_chosen:file r_file_perms;26 allow cbd sysfs_chosen:dir r_dir_perms;28 allow cbd radio_device:chr_file rw_file_perms;[all …]
1 # allow HWC to access power hal6 # allow HWC to access vendor_displaycolor_service14 allow hal_graphics_composer_default sysfs_display:dir search;15 allow hal_graphics_composer_default sysfs_display:file rw_file_perms;18 # allow HWC to access vendor log file19 allow hal_graphics_composer_default vendor_log_file:dir create_dir_perms;20 allow hal_graphics_composer_default vendor_log_file:file create_file_perms;22 allow hal_graphics_composer_default persist_display_file:file create_file_perms;23 allow hal_graphics_composer_default persist_display_file:dir rw_dir_perms;26 # allow HWC/libdisplaycolor to read calibration data[all …]
3 allow dump_power_gs201 sysfs_acpm_stats:dir r_dir_perms;4 allow dump_power_gs201 sysfs_acpm_stats:file r_file_perms;5 allow dump_power_gs201 sysfs_cpu:file r_file_perms;6 allow dump_power_gs201 vendor_toolbox_exec:file execute_no_trans;7 allow dump_power_gs201 logbuffer_device:chr_file r_file_perms;8 allow dump_power_gs201 mitigation_vendor_data_file:dir r_dir_perms;9 allow dump_power_gs201 sysfs:dir r_dir_perms;10 allow dump_power_gs201 sysfs_batteryinfo:dir r_dir_perms;11 allow dump_power_gs201 sysfs_batteryinfo:file r_file_perms;12 allow dump_power_gs201 sysfs_bcl:dir r_dir_perms;[all …]
6 allow pixelstats_vendor sysfs_scsi_devices_0000:file rw_file_perms;7 allow pixelstats_vendor sysfs_pixelstats:file r_file_perms;10 allow pixelstats_vendor sysfs_wlc:dir search;11 allow pixelstats_vendor sysfs_wlc:file rw_file_perms;15 allow pixelstats_vendor fwk_sensor_hwservice:hwservice_manager find;17 allow pixelstats_vendor fwk_sensor_service:service_manager find;21 allow pixelstats_vendor battery_history_device:chr_file r_file_perms;22 allow pixelstats_vendor logbuffer_device:chr_file r_file_perms;28 allow pixelstats_vendor sysfs_pca:file rw_file_perms;32 allow pixelstats_vendor sysfs_thermal:lnk_file r_file_perms;[all …]
11 allow cbd mnt_vendor_file:dir r_dir_perms;13 allow cbd kmsg_device:chr_file rw_file_perms;15 allow cbd vendor_shell_exec:file execute_no_trans;16 allow cbd vendor_toolbox_exec:file execute_no_trans;19 allow cbd block_device:dir search;20 allow cbd modem_block_device:blk_file r_file_perms;23 allow cbd sysfs_chosen:file r_file_perms;24 allow cbd sysfs_chosen:dir r_dir_perms;26 allow cbd radio_device:chr_file rw_file_perms;28 allow cbd proc_cmdline:file r_file_perms;[all …]
10 allow cbd mnt_vendor_file:dir r_dir_perms;12 allow cbd kmsg_device:chr_file rw_file_perms;14 allow cbd vendor_shell_exec:file execute_no_trans;15 allow cbd vendor_toolbox_exec:file execute_no_trans;18 allow cbd block_device:dir search;19 allow cbd modem_block_device:blk_file r_file_perms;22 allow cbd sysfs_chosen:file r_file_perms;23 allow cbd sysfs_chosen:dir r_dir_perms;25 allow cbd radio_device:chr_file rw_file_perms;27 allow cbd proc_cmdline:file r_file_perms;[all …]
1 allow hal_graphics_composer_default video_device:chr_file rw_file_perms;4 allow hal_graphics_composer_default self:netlink_kobject_uevent_socket create_socket_perms_no_ioctl;8 allow hal_graphics_composer_default vendor_log_file:dir create_dir_perms;11 allow hal_graphics_composer_default persist_display_file:file create_file_perms;12 allow hal_graphics_composer_default persist_display_file:dir rw_dir_perms;15 # allow HWC/libdisplaycolor to read calibration data16 allow hal_graphics_composer_default mnt_vendor_file:dir search;17 allow hal_graphics_composer_default persist_file:dir search;18 allow hal_graphics_composer_default persist_display_file:file r_file_perms;19 allow hal_graphics_composer_default persist_display_file:dir search;[all …]
1 allow tee self:capability { chown setgid setuid sys_admin sys_rawio };3 allow tee device:dir r_dir_perms;7 allow tee block_device:dir { getattr search };8 allow tee ssd_block_device:blk_file rw_file_perms;9 allow tee sg_device:chr_file { rw_file_perms setattr };10 allow tee qsee_ipc_irq_spss_device:chr_file rw_file_perms;11 allow tee mnt_vendor_file:dir search;12 allow tee persist_file:dir search;13 allow tee persist_file:lnk_file read;14 allow tee persist_drm_file:dir create_dir_perms;[all …]
1 # allow run xtest as shell3 allow shell tee_exec:file { getattr execute read open execute_no_trans };4 ## allow shell tee_data_file:file { create write open getattr unlink read };5 ## allow shell tee_data_file:dir { write add_name remove_name rename search };6 ## allow shell tee_data_file:chr_file { read write open ioctl };7 allow tee console_device:chr_file { getattr read write ioctl };8 allow tee shell:fd { use };10 ## allow tee tee_data_file:dir { create rmdir rename };11 #allow tee system_data_file:file { append }; #write open12 allow tee system_data_file:dir { getattr }; # open write[all …]
10 # allow fingerprint to access file11 allow hal_fingerprint_capacitance fingerprint_device:chr_file rw_file_perms;12 allow hal_fingerprint_capacitance tee_device:chr_file rw_file_perms;13 allow hal_fingerprint_capacitance sysfs_fingerprint:dir r_dir_perms;14 allow hal_fingerprint_capacitance sysfs_fingerprint:file rw_file_perms;16 # allow fingerprint to access power hal19 # allow fingerprint to find fwk service20 allow hal_fingerprint_capacitance fwk_stats_service:service_manager find;22 # allow fingerprint to access sysfs_leds23 allow hal_fingerprint_capacitance sysfs_leds:dir search;[all …]