OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
refs:allow
(Results
1 - 25
of
1066
) sorted by null
1
2
3
4
5
6
7
8
9
10
11
>>
/system/update_engine/
UpdateEngine.conf
5
<
allow
own="org.chromium.UpdateEngine" />
6
<
allow
send_destination="org.chromium.UpdateEngine" />
9
<
allow
send_destination="org.chromium.UpdateEngine"
12
<
allow
send_destination="org.chromium.UpdateEngine"
15
<
allow
send_destination="org.chromium.UpdateEngine"
18
<
allow
send_destination="org.chromium.UpdateEngine"
21
<
allow
send_destination="org.chromium.UpdateEngine"
24
<
allow
send_destination="org.chromium.UpdateEngine"
27
<
allow
send_destination="org.chromium.UpdateEngine"
30
<
allow
send_destination="org.chromium.UpdateEngine
[
all
...]
/external/wpa_supplicant_8/wpa_supplicant/dbus/
dbus-wpa_supplicant.conf
6
<
allow
own="fi.epitest.hostap.WPASupplicant"/>
8
<
allow
send_destination="fi.epitest.hostap.WPASupplicant"/>
9
<
allow
send_interface="fi.epitest.hostap.WPASupplicant"/>
11
<
allow
own="fi.w1.wpa_supplicant1"/>
13
<
allow
send_destination="fi.w1.wpa_supplicant1"/>
14
<
allow
send_interface="fi.w1.wpa_supplicant1"/>
15
<
allow
receive_sender="fi.w1.wpa_supplicant1" receive_type="signal"/>
/system/sepolicy/prebuilts/api/26.0/private/
untrusted_app_all.te
25
allow
untrusted_app_all apk_data_file:file execmod;
29
allow
untrusted_app_all app_data_file:file { rx_file_perms execmod };
32
allow
untrusted_app_all asec_apk_file:file r_file_perms;
33
allow
untrusted_app_all asec_apk_file:dir r_dir_perms;
35
allow
untrusted_app_all asec_public_file:file { execute execmod };
41
allow
untrusted_app_all shell_data_file:file r_file_perms;
42
allow
untrusted_app_all shell_data_file:dir r_dir_perms;
47
allow
untrusted_app_all system_app_data_file:file { read write getattr };
55
allow
untrusted_app_all media_rw_data_file:dir create_dir_perms;
56
allow
untrusted_app_all media_rw_data_file:file create_file_perms
[
all
...]
untrusted_v2_app.te
14
allow
untrusted_v2_app system_app_data_file:file { read write getattr };
17
allow
untrusted_v2_app media_rw_data_file:dir create_dir_perms;
18
allow
untrusted_v2_app media_rw_data_file:file create_file_perms;
22
allow
untrusted_v2_app mnt_media_rw_file:dir search;
24
#
allow
cts to query all services
25
allow
untrusted_v2_app servicemanager:service_manager list;
27
allow
untrusted_v2_app audioserver_service:service_manager find;
28
allow
untrusted_v2_app cameraserver_service:service_manager find;
29
allow
untrusted_v2_app drmserver_service:service_manager find;
30
allow
untrusted_v2_app mediaserver_service:service_manager find
[
all
...]
platform_app.te
15
allow
platform_app shell_data_file:dir search;
16
allow
platform_app shell_data_file:file { open getattr read };
17
allow
platform_app icon_file:file { open getattr read };
20
allow
platform_app { apk_tmp_file apk_private_tmp_file }:dir rw_dir_perms;
21
allow
platform_app { apk_tmp_file apk_private_tmp_file }:file rw_file_perms;
22
allow
platform_app apk_private_data_file:dir search;
24
allow
platform_app asec_apk_file:dir create_dir_perms;
25
allow
platform_app asec_apk_file:file create_file_perms;
28
allow
platform_app media_rw_data_file:dir create_dir_perms;
29
allow
platform_app media_rw_data_file:file create_file_perms
[
all
...]
priv_app.te
13
#
Allow
the allocation and use of ptys
18
allow
priv_app self:process ptrace;
22
allow
priv_app app_data_file:file execute;
24
allow
priv_app audioserver_service:service_manager find;
25
allow
priv_app cameraserver_service:service_manager find;
26
allow
priv_app drmserver_service:service_manager find;
27
allow
priv_app mediacodec_service:service_manager find;
28
allow
priv_app mediametrics_service:service_manager find;
29
allow
priv_app mediadrmserver_service:service_manager find;
30
allow
priv_app mediacasserver_service:service_manager find
[
all
...]
/system/sepolicy/prebuilts/api/27.0/private/
untrusted_app_all.te
25
allow
untrusted_app_all apk_data_file:file execmod;
29
allow
untrusted_app_all app_data_file:file { rx_file_perms execmod };
32
allow
untrusted_app_all asec_apk_file:file r_file_perms;
33
allow
untrusted_app_all asec_apk_file:dir r_dir_perms;
35
allow
untrusted_app_all asec_public_file:file { execute execmod };
41
allow
untrusted_app_all shell_data_file:file r_file_perms;
42
allow
untrusted_app_all shell_data_file:dir r_dir_perms;
44
#
Allow
to read staged apks.
45
allow
untrusted_app_all { apk_tmp_file apk_private_tmp_file }:file {read getattr};
50
allow
untrusted_app_all system_app_data_file:file { read write getattr }
[
all
...]
untrusted_v2_app.te
14
allow
untrusted_v2_app system_app_data_file:file { read write getattr };
17
allow
untrusted_v2_app media_rw_data_file:dir create_dir_perms;
18
allow
untrusted_v2_app media_rw_data_file:file create_file_perms;
22
allow
untrusted_v2_app mnt_media_rw_file:dir search;
24
#
allow
cts to query all services
25
allow
untrusted_v2_app servicemanager:service_manager list;
27
allow
untrusted_v2_app audioserver_service:service_manager find;
28
allow
untrusted_v2_app cameraserver_service:service_manager find;
29
allow
untrusted_v2_app drmserver_service:service_manager find;
30
allow
untrusted_v2_app mediaserver_service:service_manager find
[
all
...]
mediaprovider.te
13
allow
mediaprovider cache_file:dir create_dir_perms;
14
allow
mediaprovider cache_file:file create_file_perms;
15
# /cache is a symlink to /data/cache on some devices.
Allow
reading the link.
16
allow
mediaprovider cache_file:lnk_file r_file_perms;
18
allow
mediaprovider app_api_service:service_manager find;
19
allow
mediaprovider audioserver_service:service_manager find;
20
allow
mediaprovider drmserver_service:service_manager find;
21
allow
mediaprovider mediaserver_service:service_manager find;
22
allow
mediaprovider surfaceflinger_service:service_manager find;
24
#
Allow
MediaProvider to read/write cached ringtones (opened by system)
[
all
...]
platform_app.te
15
allow
platform_app shell_data_file:dir search;
16
allow
platform_app shell_data_file:file { open getattr read };
17
allow
platform_app icon_file:file { open getattr read };
20
allow
platform_app { apk_tmp_file apk_private_tmp_file }:dir rw_dir_perms;
21
allow
platform_app { apk_tmp_file apk_private_tmp_file }:file rw_file_perms;
22
allow
platform_app apk_private_data_file:dir search;
24
allow
platform_app asec_apk_file:dir create_dir_perms;
25
allow
platform_app asec_apk_file:file create_file_perms;
28
allow
platform_app media_rw_data_file:dir create_dir_perms;
29
allow
platform_app media_rw_data_file:file create_file_perms
[
all
...]
priv_app.te
13
#
Allow
the allocation and use of ptys
18
allow
priv_app self:process ptrace;
22
allow
priv_app app_data_file:file execute;
24
allow
priv_app audioserver_service:service_manager find;
25
allow
priv_app cameraserver_service:service_manager find;
26
allow
priv_app drmserver_service:service_manager find;
27
allow
priv_app mediacodec_service:service_manager find;
28
allow
priv_app mediametrics_service:service_manager find;
29
allow
priv_app mediadrmserver_service:service_manager find;
30
allow
priv_app mediaextractor_service:service_manager find
[
all
...]
/system/sepolicy/prebuilts/api/28.0/private/
untrusted_app_all.te
25
allow
untrusted_app_all apk_data_file:file execmod;
29
allow
untrusted_app_all app_data_file:file { rx_file_perms execmod };
32
allow
untrusted_app_all asec_apk_file:file r_file_perms;
33
allow
untrusted_app_all asec_apk_file:dir r_dir_perms;
35
allow
untrusted_app_all asec_public_file:file { execute execmod };
41
allow
untrusted_app_all shell_data_file:file r_file_perms;
42
allow
untrusted_app_all shell_data_file:dir r_dir_perms;
44
#
Allow
traceur to pass file descriptors through a content provider to untrusted apps
46
allow
untrusted_app_all trace_data_file:file { getattr read };
53
#
Allow
to read staged apks
[
all
...]
untrusted_v2_app.te
14
allow
untrusted_v2_app system_app_data_file:file { read write getattr };
17
allow
untrusted_v2_app media_rw_data_file:dir create_dir_perms;
18
allow
untrusted_v2_app media_rw_data_file:file create_file_perms;
22
allow
untrusted_v2_app mnt_media_rw_file:dir search;
24
#
allow
cts to query all services
25
allow
untrusted_v2_app servicemanager:service_manager list;
27
allow
untrusted_v2_app audioserver_service:service_manager find;
28
allow
untrusted_v2_app cameraserver_service:service_manager find;
29
allow
untrusted_v2_app drmserver_service:service_manager find;
30
allow
untrusted_v2_app mediaserver_service:service_manager find
[
all
...]
platform_app.te
14
allow
platform_app shell_data_file:dir search;
15
allow
platform_app shell_data_file:file { open getattr read };
16
allow
platform_app icon_file:file { open getattr read };
19
allow
platform_app { apk_tmp_file apk_private_tmp_file }:dir rw_dir_perms;
20
allow
platform_app { apk_tmp_file apk_private_tmp_file }:file rw_file_perms;
21
allow
platform_app apk_private_data_file:dir search;
23
allow
platform_app asec_apk_file:dir create_dir_perms;
24
allow
platform_app asec_apk_file:file create_file_perms;
27
allow
platform_app media_rw_data_file:dir create_dir_perms;
28
allow
platform_app media_rw_data_file:file create_file_perms
[
all
...]
priv_app.te
13
#
Allow
the allocation and use of ptys
18
allow
priv_app self:process ptrace;
22
allow
priv_app app_data_file:file execute;
24
allow
priv_app app_api_service:service_manager find;
25
allow
priv_app audioserver_service:service_manager find;
26
allow
priv_app cameraserver_service:service_manager find;
27
allow
priv_app drmserver_service:service_manager find;
28
allow
priv_app mediacodec_service:service_manager find;
29
allow
priv_app mediadrmserver_service:service_manager find;
30
allow
priv_app mediaextractor_service:service_manager find
[
all
...]
/system/sepolicy/private/
untrusted_app_all.te
25
allow
untrusted_app_all apk_data_file:file execmod;
29
allow
untrusted_app_all app_data_file:file { rx_file_perms execmod };
32
allow
untrusted_app_all asec_apk_file:file r_file_perms;
33
allow
untrusted_app_all asec_apk_file:dir r_dir_perms;
35
allow
untrusted_app_all asec_public_file:file { execute execmod };
41
allow
untrusted_app_all shell_data_file:file r_file_perms;
42
allow
untrusted_app_all shell_data_file:dir r_dir_perms;
44
#
Allow
traceur to pass file descriptors through a content provider to untrusted apps
46
allow
untrusted_app_all trace_data_file:file { getattr read };
53
#
Allow
to read staged apks
[
all
...]
untrusted_v2_app.te
14
allow
untrusted_v2_app system_app_data_file:file { read write getattr };
17
allow
untrusted_v2_app media_rw_data_file:dir create_dir_perms;
18
allow
untrusted_v2_app media_rw_data_file:file create_file_perms;
22
allow
untrusted_v2_app mnt_media_rw_file:dir search;
24
#
allow
cts to query all services
25
allow
untrusted_v2_app servicemanager:service_manager list;
27
allow
untrusted_v2_app audioserver_service:service_manager find;
28
allow
untrusted_v2_app cameraserver_service:service_manager find;
29
allow
untrusted_v2_app drmserver_service:service_manager find;
30
allow
untrusted_v2_app mediaserver_service:service_manager find
[
all
...]
platform_app.te
14
allow
platform_app shell_data_file:dir search;
15
allow
platform_app shell_data_file:file { open getattr read };
16
allow
platform_app icon_file:file { open getattr read };
19
allow
platform_app { apk_tmp_file apk_private_tmp_file }:dir rw_dir_perms;
20
allow
platform_app { apk_tmp_file apk_private_tmp_file }:file rw_file_perms;
21
allow
platform_app apk_private_data_file:dir search;
23
allow
platform_app asec_apk_file:dir create_dir_perms;
24
allow
platform_app asec_apk_file:file create_file_perms;
27
allow
platform_app media_rw_data_file:dir create_dir_perms;
28
allow
platform_app media_rw_data_file:file create_file_perms
[
all
...]
priv_app.te
13
#
Allow
the allocation and use of ptys
18
allow
priv_app self:process ptrace;
22
allow
priv_app app_data_file:file execute;
24
allow
priv_app app_api_service:service_manager find;
25
allow
priv_app audioserver_service:service_manager find;
26
allow
priv_app cameraserver_service:service_manager find;
27
allow
priv_app drmserver_service:service_manager find;
28
allow
priv_app mediacodec_service:service_manager find;
29
allow
priv_app mediadrmserver_service:service_manager find;
30
allow
priv_app mediaextractor_service:service_manager find
[
all
...]
/device/google/vrservices/vrcore/sepolicy/
vrcore_app.te
15
allow
vrcore_app audioserver_service:service_manager find;
16
allow
vrcore_app cameraserver_service:service_manager find;
17
allow
vrcore_app drmserver_service:service_manager find;
18
allow
vrcore_app mediaserver_service:service_manager find;
19
allow
vrcore_app mediaextractor_service:service_manager find;
20
allow
vrcore_app mediametrics_service:service_manager find;
21
allow
vrcore_app mediadrmserver_service:service_manager find;
22
allow
vrcore_app nfc_service:service_manager find;
23
allow
vrcore_app radio_service:service_manager find;
24
allow
vrcore_app surfaceflinger_service:service_manager find
[
all
...]
/system/sepolicy/prebuilts/api/28.0/public/
te_macros
3
#
Allow
a transition from olddomain to newdomain
11
allow
$1 $2:file { getattr open read execute map };
12
allow
$1 $3:process transition;
14
allow
$3 $2:file { entrypoint open read execute getattr map };
16
ifelse($1, `init', `', `
allow
$3 $1:process sigchld;')
20
allow
$1 $3:process { siginh rlimitinh };
29
#
Allow
the necessary permissions.
37
#
Allow
domain to create a file labeled file_type in a
44
#
Allow
the domain to add entries to the directory.
45
allow
$1 $2:dir ra_dir_perms
[
all
...]
/system/sepolicy/public/
te_macros
3
#
Allow
a transition from olddomain to newdomain
11
allow
$1 $2:file { getattr open read execute map };
12
allow
$1 $3:process transition;
14
allow
$3 $2:file { entrypoint open read execute getattr map };
16
ifelse($1, `init', `', `
allow
$3 $1:process sigchld;')
20
allow
$1 $3:process { siginh rlimitinh };
29
#
Allow
the necessary permissions.
37
#
Allow
domain to create a file labeled file_type in a
44
#
Allow
the domain to add entries to the directory.
45
allow
$1 $2:dir ra_dir_perms
[
all
...]
/external/dhcpcd-6.8.2/dbus/
dhcpcd-dbus.conf
6
<
allow
own="org.chromium.dhcpcd"/>
7
<
allow
send_interface="org.chromium.dhcpcd" />
8
<
allow
send_destination="org.chromium.dhcpcd" />
11
<
allow
own="org.chromium.dhcpcd"/>
12
<
allow
send_interface="org.chromium.dhcpcd" />
13
<
allow
send_destination="org.chromium.dhcpcd" />
17
<
allow
send_interface="org.chromium.dhcpcd" />
18
<
allow
send_interface="org.freedesktop.DBus.Introspectable" />
19
<
allow
send_destination="org.chromium.dhcpcd" />
/system/sepolicy/vendor/
tee.te
7
allow
tee self:global_capability_class_set { dac_override };
8
allow
tee tee_device:chr_file rw_file_perms;
9
allow
tee tee_data_file:dir rw_dir_perms;
10
allow
tee tee_data_file:file create_file_perms;
11
allow
tee self:netlink_socket create_socket_perms_no_ioctl;
12
allow
tee self:netlink_generic_socket create_socket_perms_no_ioctl;
13
allow
tee ion_device:chr_file r_file_perms;
16
allow
tee system_data_file:file { getattr read };
17
allow
tee system_data_file:lnk_file { getattr read };
/external/adhd/dbus-config/
org.chromium.cras.conf
6
<
allow
send_destination="org.chromium.cras" />
10
<
allow
own="org.chromium.cras" />
Completed in 255 milliseconds
1
2
3
4
5
6
7
8
9
10
11
>>