HomeSort by relevance Sort by last modified time
    Searched refs:sock_file (Results 1 - 19 of 19) sorted by null

  /external/sepolicy/
unconfined.te 47 allow unconfineddomain {fs_type -contextmount_type -sdcard_type}:{ dir lnk_file sock_file fifo_file } ~relabelto;
48 allow unconfineddomain dev_type:{ dir lnk_file sock_file fifo_file } ~relabelto;
58 }:{ dir lnk_file sock_file fifo_file } ~relabelto;
untrusted_app.te 85 neverallow untrusted_app property_socket:sock_file write;
mls 67 mlsconstrain { file lnk_file sock_file chr_file blk_file } { read getattr execute }
75 mlsconstrain { file lnk_file sock_file chr_file blk_file } { write setattr append unlink link rename }
system_server.te 156 allow system_server mdns_socket:sock_file rw_file_perms;
167 allow system_server adbd_socket:sock_file rw_file_perms;
288 type_transition system_server wifi_data_file:sock_file system_wpa_socket;
289 type_transition system_server wpa_socket:sock_file system_wpa_socket;
291 allow system_server system_wpa_socket:sock_file create_file_perms;
294 allow system_server wpa_socket:sock_file unlink;
297 type_transition system_server system_data_file:sock_file system_ndebug_socket "ndebugsocket";
298 allow system_server system_ndebug_socket:sock_file create_file_perms;
app.te 103 # hence no sock_file or connectto permission. This appears to be how
248 neverallow appdomain socket_device:sock_file write;
251 neverallow appdomain adbd_socket:sock_file write;
252 neverallow appdomain installd_socket:sock_file write;
254 property_socket:sock_file write;
255 neverallow { appdomain -radio } rild_socket:sock_file write;
256 neverallow appdomain vold_socket:sock_file write;
257 neverallow appdomain zygote_socket:sock_file write;
access_vectors 196 class sock_file
  /cts/tools/selinux/src/
example_input_policy.conf 24 class sock_file
374 class sock_file
    [all...]
  /external/libsepol/tests/policies/test-expander/
alias-base.conf 20 class sock_file
185 class sock_file
role-base.conf 20 class sock_file
185 class sock_file
user-base.conf 20 class sock_file
185 class sock_file
small-base.conf 20 class sock_file
185 class sock_file
  /external/libsepol/tests/policies/test-hooks/
cmp_policy.conf 20 class sock_file
185 class sock_file
small-base.conf 20 class sock_file
185 class sock_file
  /external/libsepol/tests/policies/test-deps/
base-metreq.conf 20 class sock_file
185 class sock_file
base-notmetreq.conf 20 class sock_file
184 class sock_file
small-base.conf 20 class sock_file
185 class sock_file
  /external/libsepol/tests/policies/test-linker/
small-base.conf 20 class sock_file
185 class sock_file
  /external/libsepol/tests/policies/test-cond/
refpolicy-base.conf 12 class sock_file
180 class sock_file
616 mlsconstrain { dir lnk_file chr_file blk_file sock_file fifo_file } { relabelfrom }
618 mlsconstrain { dir lnk_file chr_file blk_file sock_file fifo_file } { create relabelto }
    [all...]
  /cts/tools/selinux/test/
policy_test.conf 2235 allow init {fs_type dev_type file_type}:{ dir { { chr_file blk_file } { file lnk_file sock_file fifo_file } } } relabelto;

Completed in 48 milliseconds