OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
refs:sock_file
(Results
1 - 19
of
19
) sorted by null
/external/sepolicy/
unconfined.te
47
allow unconfineddomain {fs_type -contextmount_type -sdcard_type}:{ dir lnk_file
sock_file
fifo_file } ~relabelto;
48
allow unconfineddomain dev_type:{ dir lnk_file
sock_file
fifo_file } ~relabelto;
58
}:{ dir lnk_file
sock_file
fifo_file } ~relabelto;
untrusted_app.te
85
neverallow untrusted_app property_socket:
sock_file
write;
mls
67
mlsconstrain { file lnk_file
sock_file
chr_file blk_file } { read getattr execute }
75
mlsconstrain { file lnk_file
sock_file
chr_file blk_file } { write setattr append unlink link rename }
system_server.te
156
allow system_server mdns_socket:
sock_file
rw_file_perms;
167
allow system_server adbd_socket:
sock_file
rw_file_perms;
288
type_transition system_server wifi_data_file:
sock_file
system_wpa_socket;
289
type_transition system_server wpa_socket:
sock_file
system_wpa_socket;
291
allow system_server system_wpa_socket:
sock_file
create_file_perms;
294
allow system_server wpa_socket:
sock_file
unlink;
297
type_transition system_server system_data_file:
sock_file
system_ndebug_socket "ndebugsocket";
298
allow system_server system_ndebug_socket:
sock_file
create_file_perms;
app.te
103
# hence no
sock_file
or connectto permission. This appears to be how
248
neverallow appdomain socket_device:
sock_file
write;
251
neverallow appdomain adbd_socket:
sock_file
write;
252
neverallow appdomain installd_socket:
sock_file
write;
254
property_socket:
sock_file
write;
255
neverallow { appdomain -radio } rild_socket:
sock_file
write;
256
neverallow appdomain vold_socket:
sock_file
write;
257
neverallow appdomain zygote_socket:
sock_file
write;
access_vectors
196
class
sock_file
/cts/tools/selinux/src/
example_input_policy.conf
24
class
sock_file
374
class
sock_file
[
all
...]
/external/libsepol/tests/policies/test-expander/
alias-base.conf
20
class
sock_file
185
class
sock_file
role-base.conf
20
class
sock_file
185
class
sock_file
user-base.conf
20
class
sock_file
185
class
sock_file
small-base.conf
20
class
sock_file
185
class
sock_file
/external/libsepol/tests/policies/test-hooks/
cmp_policy.conf
20
class
sock_file
185
class
sock_file
small-base.conf
20
class
sock_file
185
class
sock_file
/external/libsepol/tests/policies/test-deps/
base-metreq.conf
20
class
sock_file
185
class
sock_file
base-notmetreq.conf
20
class
sock_file
184
class
sock_file
small-base.conf
20
class
sock_file
185
class
sock_file
/external/libsepol/tests/policies/test-linker/
small-base.conf
20
class
sock_file
185
class
sock_file
/external/libsepol/tests/policies/test-cond/
refpolicy-base.conf
12
class
sock_file
180
class
sock_file
616
mlsconstrain { dir lnk_file chr_file blk_file
sock_file
fifo_file } { relabelfrom }
618
mlsconstrain { dir lnk_file chr_file blk_file
sock_file
fifo_file } { create relabelto }
[
all
...]
/cts/tools/selinux/test/
policy_test.conf
2235
allow init {fs_type dev_type file_type}:{ dir { { chr_file blk_file } { file lnk_file
sock_file
fifo_file } } } relabelto;
Completed in 48 milliseconds