HomeSort by relevance Sort by last modified time
    Searched refs:allow (Results 1 - 25 of 1066) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /system/update_engine/
UpdateEngine.conf 5 <allow own="org.chromium.UpdateEngine" />
6 <allow send_destination="org.chromium.UpdateEngine" />
9 <allow send_destination="org.chromium.UpdateEngine"
12 <allow send_destination="org.chromium.UpdateEngine"
15 <allow send_destination="org.chromium.UpdateEngine"
18 <allow send_destination="org.chromium.UpdateEngine"
21 <allow send_destination="org.chromium.UpdateEngine"
24 <allow send_destination="org.chromium.UpdateEngine"
27 <allow send_destination="org.chromium.UpdateEngine"
30 <allow send_destination="org.chromium.UpdateEngine
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/dbus/
dbus-wpa_supplicant.conf 6 <allow own="fi.epitest.hostap.WPASupplicant"/>
8 <allow send_destination="fi.epitest.hostap.WPASupplicant"/>
9 <allow send_interface="fi.epitest.hostap.WPASupplicant"/>
11 <allow own="fi.w1.wpa_supplicant1"/>
13 <allow send_destination="fi.w1.wpa_supplicant1"/>
14 <allow send_interface="fi.w1.wpa_supplicant1"/>
15 <allow receive_sender="fi.w1.wpa_supplicant1" receive_type="signal"/>
  /system/sepolicy/prebuilts/api/26.0/private/
untrusted_app_all.te 25 allow untrusted_app_all apk_data_file:file execmod;
29 allow untrusted_app_all app_data_file:file { rx_file_perms execmod };
32 allow untrusted_app_all asec_apk_file:file r_file_perms;
33 allow untrusted_app_all asec_apk_file:dir r_dir_perms;
35 allow untrusted_app_all asec_public_file:file { execute execmod };
41 allow untrusted_app_all shell_data_file:file r_file_perms;
42 allow untrusted_app_all shell_data_file:dir r_dir_perms;
47 allow untrusted_app_all system_app_data_file:file { read write getattr };
55 allow untrusted_app_all media_rw_data_file:dir create_dir_perms;
56 allow untrusted_app_all media_rw_data_file:file create_file_perms
    [all...]
untrusted_v2_app.te 14 allow untrusted_v2_app system_app_data_file:file { read write getattr };
17 allow untrusted_v2_app media_rw_data_file:dir create_dir_perms;
18 allow untrusted_v2_app media_rw_data_file:file create_file_perms;
22 allow untrusted_v2_app mnt_media_rw_file:dir search;
24 # allow cts to query all services
25 allow untrusted_v2_app servicemanager:service_manager list;
27 allow untrusted_v2_app audioserver_service:service_manager find;
28 allow untrusted_v2_app cameraserver_service:service_manager find;
29 allow untrusted_v2_app drmserver_service:service_manager find;
30 allow untrusted_v2_app mediaserver_service:service_manager find
    [all...]
platform_app.te 15 allow platform_app shell_data_file:dir search;
16 allow platform_app shell_data_file:file { open getattr read };
17 allow platform_app icon_file:file { open getattr read };
20 allow platform_app { apk_tmp_file apk_private_tmp_file }:dir rw_dir_perms;
21 allow platform_app { apk_tmp_file apk_private_tmp_file }:file rw_file_perms;
22 allow platform_app apk_private_data_file:dir search;
24 allow platform_app asec_apk_file:dir create_dir_perms;
25 allow platform_app asec_apk_file:file create_file_perms;
28 allow platform_app media_rw_data_file:dir create_dir_perms;
29 allow platform_app media_rw_data_file:file create_file_perms
    [all...]
priv_app.te 13 # Allow the allocation and use of ptys
18 allow priv_app self:process ptrace;
22 allow priv_app app_data_file:file execute;
24 allow priv_app audioserver_service:service_manager find;
25 allow priv_app cameraserver_service:service_manager find;
26 allow priv_app drmserver_service:service_manager find;
27 allow priv_app mediacodec_service:service_manager find;
28 allow priv_app mediametrics_service:service_manager find;
29 allow priv_app mediadrmserver_service:service_manager find;
30 allow priv_app mediacasserver_service:service_manager find
    [all...]
  /system/sepolicy/prebuilts/api/27.0/private/
untrusted_app_all.te 25 allow untrusted_app_all apk_data_file:file execmod;
29 allow untrusted_app_all app_data_file:file { rx_file_perms execmod };
32 allow untrusted_app_all asec_apk_file:file r_file_perms;
33 allow untrusted_app_all asec_apk_file:dir r_dir_perms;
35 allow untrusted_app_all asec_public_file:file { execute execmod };
41 allow untrusted_app_all shell_data_file:file r_file_perms;
42 allow untrusted_app_all shell_data_file:dir r_dir_perms;
44 # Allow to read staged apks.
45 allow untrusted_app_all { apk_tmp_file apk_private_tmp_file }:file {read getattr};
50 allow untrusted_app_all system_app_data_file:file { read write getattr }
    [all...]
untrusted_v2_app.te 14 allow untrusted_v2_app system_app_data_file:file { read write getattr };
17 allow untrusted_v2_app media_rw_data_file:dir create_dir_perms;
18 allow untrusted_v2_app media_rw_data_file:file create_file_perms;
22 allow untrusted_v2_app mnt_media_rw_file:dir search;
24 # allow cts to query all services
25 allow untrusted_v2_app servicemanager:service_manager list;
27 allow untrusted_v2_app audioserver_service:service_manager find;
28 allow untrusted_v2_app cameraserver_service:service_manager find;
29 allow untrusted_v2_app drmserver_service:service_manager find;
30 allow untrusted_v2_app mediaserver_service:service_manager find
    [all...]
mediaprovider.te 13 allow mediaprovider cache_file:dir create_dir_perms;
14 allow mediaprovider cache_file:file create_file_perms;
15 # /cache is a symlink to /data/cache on some devices. Allow reading the link.
16 allow mediaprovider cache_file:lnk_file r_file_perms;
18 allow mediaprovider app_api_service:service_manager find;
19 allow mediaprovider audioserver_service:service_manager find;
20 allow mediaprovider drmserver_service:service_manager find;
21 allow mediaprovider mediaserver_service:service_manager find;
22 allow mediaprovider surfaceflinger_service:service_manager find;
24 # Allow MediaProvider to read/write cached ringtones (opened by system)
    [all...]
platform_app.te 15 allow platform_app shell_data_file:dir search;
16 allow platform_app shell_data_file:file { open getattr read };
17 allow platform_app icon_file:file { open getattr read };
20 allow platform_app { apk_tmp_file apk_private_tmp_file }:dir rw_dir_perms;
21 allow platform_app { apk_tmp_file apk_private_tmp_file }:file rw_file_perms;
22 allow platform_app apk_private_data_file:dir search;
24 allow platform_app asec_apk_file:dir create_dir_perms;
25 allow platform_app asec_apk_file:file create_file_perms;
28 allow platform_app media_rw_data_file:dir create_dir_perms;
29 allow platform_app media_rw_data_file:file create_file_perms
    [all...]
priv_app.te 13 # Allow the allocation and use of ptys
18 allow priv_app self:process ptrace;
22 allow priv_app app_data_file:file execute;
24 allow priv_app audioserver_service:service_manager find;
25 allow priv_app cameraserver_service:service_manager find;
26 allow priv_app drmserver_service:service_manager find;
27 allow priv_app mediacodec_service:service_manager find;
28 allow priv_app mediametrics_service:service_manager find;
29 allow priv_app mediadrmserver_service:service_manager find;
30 allow priv_app mediaextractor_service:service_manager find
    [all...]
  /system/sepolicy/prebuilts/api/28.0/private/
untrusted_app_all.te 25 allow untrusted_app_all apk_data_file:file execmod;
29 allow untrusted_app_all app_data_file:file { rx_file_perms execmod };
32 allow untrusted_app_all asec_apk_file:file r_file_perms;
33 allow untrusted_app_all asec_apk_file:dir r_dir_perms;
35 allow untrusted_app_all asec_public_file:file { execute execmod };
41 allow untrusted_app_all shell_data_file:file r_file_perms;
42 allow untrusted_app_all shell_data_file:dir r_dir_perms;
44 # Allow traceur to pass file descriptors through a content provider to untrusted apps
46 allow untrusted_app_all trace_data_file:file { getattr read };
53 # Allow to read staged apks
    [all...]
untrusted_v2_app.te 14 allow untrusted_v2_app system_app_data_file:file { read write getattr };
17 allow untrusted_v2_app media_rw_data_file:dir create_dir_perms;
18 allow untrusted_v2_app media_rw_data_file:file create_file_perms;
22 allow untrusted_v2_app mnt_media_rw_file:dir search;
24 # allow cts to query all services
25 allow untrusted_v2_app servicemanager:service_manager list;
27 allow untrusted_v2_app audioserver_service:service_manager find;
28 allow untrusted_v2_app cameraserver_service:service_manager find;
29 allow untrusted_v2_app drmserver_service:service_manager find;
30 allow untrusted_v2_app mediaserver_service:service_manager find
    [all...]
platform_app.te 14 allow platform_app shell_data_file:dir search;
15 allow platform_app shell_data_file:file { open getattr read };
16 allow platform_app icon_file:file { open getattr read };
19 allow platform_app { apk_tmp_file apk_private_tmp_file }:dir rw_dir_perms;
20 allow platform_app { apk_tmp_file apk_private_tmp_file }:file rw_file_perms;
21 allow platform_app apk_private_data_file:dir search;
23 allow platform_app asec_apk_file:dir create_dir_perms;
24 allow platform_app asec_apk_file:file create_file_perms;
27 allow platform_app media_rw_data_file:dir create_dir_perms;
28 allow platform_app media_rw_data_file:file create_file_perms
    [all...]
priv_app.te 13 # Allow the allocation and use of ptys
18 allow priv_app self:process ptrace;
22 allow priv_app app_data_file:file execute;
24 allow priv_app app_api_service:service_manager find;
25 allow priv_app audioserver_service:service_manager find;
26 allow priv_app cameraserver_service:service_manager find;
27 allow priv_app drmserver_service:service_manager find;
28 allow priv_app mediacodec_service:service_manager find;
29 allow priv_app mediadrmserver_service:service_manager find;
30 allow priv_app mediaextractor_service:service_manager find
    [all...]
  /system/sepolicy/private/
untrusted_app_all.te 25 allow untrusted_app_all apk_data_file:file execmod;
29 allow untrusted_app_all app_data_file:file { rx_file_perms execmod };
32 allow untrusted_app_all asec_apk_file:file r_file_perms;
33 allow untrusted_app_all asec_apk_file:dir r_dir_perms;
35 allow untrusted_app_all asec_public_file:file { execute execmod };
41 allow untrusted_app_all shell_data_file:file r_file_perms;
42 allow untrusted_app_all shell_data_file:dir r_dir_perms;
44 # Allow traceur to pass file descriptors through a content provider to untrusted apps
46 allow untrusted_app_all trace_data_file:file { getattr read };
53 # Allow to read staged apks
    [all...]
untrusted_v2_app.te 14 allow untrusted_v2_app system_app_data_file:file { read write getattr };
17 allow untrusted_v2_app media_rw_data_file:dir create_dir_perms;
18 allow untrusted_v2_app media_rw_data_file:file create_file_perms;
22 allow untrusted_v2_app mnt_media_rw_file:dir search;
24 # allow cts to query all services
25 allow untrusted_v2_app servicemanager:service_manager list;
27 allow untrusted_v2_app audioserver_service:service_manager find;
28 allow untrusted_v2_app cameraserver_service:service_manager find;
29 allow untrusted_v2_app drmserver_service:service_manager find;
30 allow untrusted_v2_app mediaserver_service:service_manager find
    [all...]
platform_app.te 14 allow platform_app shell_data_file:dir search;
15 allow platform_app shell_data_file:file { open getattr read };
16 allow platform_app icon_file:file { open getattr read };
19 allow platform_app { apk_tmp_file apk_private_tmp_file }:dir rw_dir_perms;
20 allow platform_app { apk_tmp_file apk_private_tmp_file }:file rw_file_perms;
21 allow platform_app apk_private_data_file:dir search;
23 allow platform_app asec_apk_file:dir create_dir_perms;
24 allow platform_app asec_apk_file:file create_file_perms;
27 allow platform_app media_rw_data_file:dir create_dir_perms;
28 allow platform_app media_rw_data_file:file create_file_perms
    [all...]
priv_app.te 13 # Allow the allocation and use of ptys
18 allow priv_app self:process ptrace;
22 allow priv_app app_data_file:file execute;
24 allow priv_app app_api_service:service_manager find;
25 allow priv_app audioserver_service:service_manager find;
26 allow priv_app cameraserver_service:service_manager find;
27 allow priv_app drmserver_service:service_manager find;
28 allow priv_app mediacodec_service:service_manager find;
29 allow priv_app mediadrmserver_service:service_manager find;
30 allow priv_app mediaextractor_service:service_manager find
    [all...]
  /device/google/vrservices/vrcore/sepolicy/
vrcore_app.te 15 allow vrcore_app audioserver_service:service_manager find;
16 allow vrcore_app cameraserver_service:service_manager find;
17 allow vrcore_app drmserver_service:service_manager find;
18 allow vrcore_app mediaserver_service:service_manager find;
19 allow vrcore_app mediaextractor_service:service_manager find;
20 allow vrcore_app mediametrics_service:service_manager find;
21 allow vrcore_app mediadrmserver_service:service_manager find;
22 allow vrcore_app nfc_service:service_manager find;
23 allow vrcore_app radio_service:service_manager find;
24 allow vrcore_app surfaceflinger_service:service_manager find
    [all...]
  /system/sepolicy/prebuilts/api/28.0/public/
te_macros 3 # Allow a transition from olddomain to newdomain
11 allow $1 $2:file { getattr open read execute map };
12 allow $1 $3:process transition;
14 allow $3 $2:file { entrypoint open read execute getattr map };
16 ifelse($1, `init', `', `allow $3 $1:process sigchld;')
20 allow $1 $3:process { siginh rlimitinh };
29 # Allow the necessary permissions.
37 # Allow domain to create a file labeled file_type in a
44 # Allow the domain to add entries to the directory.
45 allow $1 $2:dir ra_dir_perms
    [all...]
  /system/sepolicy/public/
te_macros 3 # Allow a transition from olddomain to newdomain
11 allow $1 $2:file { getattr open read execute map };
12 allow $1 $3:process transition;
14 allow $3 $2:file { entrypoint open read execute getattr map };
16 ifelse($1, `init', `', `allow $3 $1:process sigchld;')
20 allow $1 $3:process { siginh rlimitinh };
29 # Allow the necessary permissions.
37 # Allow domain to create a file labeled file_type in a
44 # Allow the domain to add entries to the directory.
45 allow $1 $2:dir ra_dir_perms
    [all...]
  /external/dhcpcd-6.8.2/dbus/
dhcpcd-dbus.conf 6 <allow own="org.chromium.dhcpcd"/>
7 <allow send_interface="org.chromium.dhcpcd" />
8 <allow send_destination="org.chromium.dhcpcd" />
11 <allow own="org.chromium.dhcpcd"/>
12 <allow send_interface="org.chromium.dhcpcd" />
13 <allow send_destination="org.chromium.dhcpcd" />
17 <allow send_interface="org.chromium.dhcpcd" />
18 <allow send_interface="org.freedesktop.DBus.Introspectable" />
19 <allow send_destination="org.chromium.dhcpcd" />
  /system/sepolicy/vendor/
tee.te 7 allow tee self:global_capability_class_set { dac_override };
8 allow tee tee_device:chr_file rw_file_perms;
9 allow tee tee_data_file:dir rw_dir_perms;
10 allow tee tee_data_file:file create_file_perms;
11 allow tee self:netlink_socket create_socket_perms_no_ioctl;
12 allow tee self:netlink_generic_socket create_socket_perms_no_ioctl;
13 allow tee ion_device:chr_file r_file_perms;
16 allow tee system_data_file:file { getattr read };
17 allow tee system_data_file:lnk_file { getattr read };
  /external/adhd/dbus-config/
org.chromium.cras.conf 6 <allow send_destination="org.chromium.cras" />
10 <allow own="org.chromium.cras" />

Completed in 255 milliseconds

1 2 3 4 5 6 7 8 91011>>