HomeSort by relevance Sort by last modified time
    Searched refs:allow (Results 1 - 25 of 1150) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/sepolicy/
system_server.te 11 allow system_server self:process execmem;
12 allow system_server ashmem_device:chr_file execute;
13 allow system_server system_server_tmpfs:file execute;
16 allow system_server dalvikcache_data_file:file execute;
19 allow system_server resourcecache_data_file:file r_file_perms;
20 allow system_server resourcecache_data_file:dir r_dir_perms;
23 allow system_server self:process ptrace;
26 allow system_server zygote:fd use;
27 allow system_server zygote:process sigchld;
28 allow system_server zygote_tmpfs:file read
    [all...]
platform_app.te 12 allow platform_app shell_data_file:dir search;
13 allow platform_app shell_data_file:file { open getattr read };
16 allow platform_app { apk_tmp_file apk_private_tmp_file }:dir rw_dir_perms;
17 allow platform_app { apk_tmp_file apk_private_tmp_file }:file rw_file_perms;
18 allow platform_app apk_private_data_file:dir search;
20 allow platform_app asec_apk_file:dir create_dir_perms;
21 allow platform_app asec_apk_file:file create_file_perms;
24 allow platform_app media_rw_data_file:dir create_dir_perms;
25 allow platform_app media_rw_data_file:file create_file_perms;
28 allow platform_app cache_file:dir create_dir_perms
    [all...]
system_app.te 12 allow system_app system_app_data_file:dir create_dir_perms;
13 allow system_app system_app_data_file:file create_file_perms;
16 allow system_app keychain_data_file:dir r_dir_perms;
17 allow system_app keychain_data_file:file r_file_perms;
21 allow system_app system_data_file:dir create_dir_perms;
22 allow system_app system_data_file:file create_file_perms;
23 allow system_app misc_user_data_file:dir create_dir_perms;
24 allow system_app misc_user_data_file:file create_file_perms;
31 allow system_app wallpaper_file:file r_file_perms;
35 allow system_app debug_prop:property_service set
    [all...]
tee.te 10 allow tee self:capability { dac_override };
11 allow tee tee_device:chr_file rw_file_perms;
12 allow tee tee_data_file:dir rw_dir_perms;
13 allow tee tee_data_file:file create_file_perms;
14 allow tee self:netlink_socket create_socket_perms;
unconfined.te 19 allow unconfineddomain self:capability ~{ sys_ptrace sys_rawio mknod sys_module audit_write audit_control linux_immutable };
20 allow unconfineddomain self:capability2 ~{ mac_override mac_admin };
21 allow unconfineddomain kernel:security ~{ load_policy setenforce setcheckreqprot setbool setsecparam };
22 allow unconfineddomain kernel:system ~{ syslog_read syslog_mod syslog_console };
23 allow unconfineddomain domain:fd *;
24 allow unconfineddomain domain:dir r_dir_perms;
25 allow unconfineddomain domain:lnk_file r_file_perms;
26 allow unconfineddomain domain:{ fifo_file file } rw_file_perms;
27 allow unconfineddomain domain:{
45 allow unconfineddomain domain:ipc_class_set *
    [all...]
untrusted_app.te 30 allow untrusted_app app_data_file:file { rx_file_perms execmod };
32 allow untrusted_app tun_device:chr_file rw_file_perms;
35 allow untrusted_app asec_apk_file:file r_file_perms;
37 allow untrusted_app asec_public_file:file { execute execmod };
39 # Allow the allocation and use of ptys
47 allow untrusted_app shell_data_file:file r_file_perms;
48 allow untrusted_app shell_data_file:dir r_dir_perms;
50 # b/18504118: Allow reads from /data/anr/traces.txt
56 allow untrusted_app anr_data_file:file r_file_perms;
64 allow untrusted_app mtp_device:chr_file rw_file_perms
    [all...]
app.te 11 allow appdomain self:process execmem;
12 allow appdomain ashmem_device:chr_file execute;
15 allow appdomain zygote:fd use;
19 allow appdomain zygote_exec:file rx_file_perms;
22 allow appdomain self:process ptrace;
25 allow appdomain zygote_tmpfs:file read;
28 allow appdomain zygote:process sigchld;
31 allow appdomain shell:process sigchld;
32 allow appdomain adbd:process sigchld;
35 allow appdomain devpts:chr_file { getattr read write ioctl }
    [all...]
isolated_app.te 17 # granted via app.te. Allow execute.
18 # Needed to allow dlopen() from Chrome renderer processes.
20 allow isolated_app app_data_file:file execute;
  /external/wpa_supplicant_8/wpa_supplicant/dbus/
dbus-wpa_supplicant.conf 6 <allow own="fi.epitest.hostap.WPASupplicant"/>
8 <allow send_destination="fi.epitest.hostap.WPASupplicant"/>
9 <allow send_interface="fi.epitest.hostap.WPASupplicant"/>
11 <allow own="fi.w1.wpa_supplicant1"/>
13 <allow send_destination="fi.w1.wpa_supplicant1"/>
14 <allow send_interface="fi.w1.wpa_supplicant1"/>
15 <allow receive_sender="fi.w1.wpa_supplicant1" receive_type="signal"/>
  /external/libsepol/tests/policies/test-deps/
modreq-role-global.conf 12 allow role_req_r user_r;
modreq-bool-global.conf 14 allow a_t b_t : file { read write };
modreq-obj-global.conf 12 allow mod_foo_t mod_bar_t : sem { create destroy };
modreq-perm-global.conf 10 allow a_t b_t: msg { send receive };
modreq-role-opt.conf 16 allow role_req_r user_r;
modreq-type-global.conf 12 allow test_t type_req_t : file { read write };
modreq-type-opt.conf 15 allow type_req_t file_t : file { read write };
module.conf 15 allow system_t file_t : file { read write };
19 allow sysadm_t file_t : file { read write };
modreq-bool-opt.conf 20 allow a_t b_t : file { read write };
  /device/asus/grouper/sepolicy/
sensors_config.te 11 allow sensors_config shell_exec:file rx_file_perms;
12 allow sensors_config system_file:file execute_no_trans;
15 allow sensors_config sensors_data_file:dir mounton;
16 allow sensors_config sdcard_external:filesystem { mount unmount };
17 allow sensors_config { sdcard_external block_device }:dir search;
20 allow sensors_config sdcard_external:file r_file_perms;
23 allow sensors_config self:capability { chown fowner };
25 # Checked as a side effect on the chmod (don't allow)
29 allow sensors_config self:capability sys_admin;
31 # Tries to delete /data/calibration (don't allow)
    [all...]
  /external/dnsmasq/dbus/
dnsmasq.conf 6 <allow own="uk.org.thekelleys.dnsmasq"/>
7 <allow send_destination="uk.org.thekelleys.dnsmasq"/>
  /external/nist-sip/java/gov/nist/javax/sip/parser/
AllowParser.java 33 * Parser for Allow header.
45 * @param allow the header to parse
47 public AllowParser(String allow) {
48 super(allow);
60 * parse the Allow String header
71 headerName(TokenTypes.ALLOW);
73 Allow allow = new Allow(); local
74 allow.setHeaderName(SIPHeaderNames.ALLOW)
    [all...]
  /packages/experimental/SELinux/CTS/src/
example_input_policy.conf     [all...]
  /external/chromium_org/chrome/browser/chromeos/dbus/
org.chromium.LibCrosService.conf 12 <allow own="org.chromium.LibCrosService"/>
13 <allow receive_sender="org.chromium.LibCrosService"/>
14 <allow send_destination="org.chromium.LibCrosService"/>
19 <allow send_destination="org.chromium.LibCrosService"/>
24 <allow send_destination="org.chromium.LibCrosService"/>
29 <allow send_destination="org.chromium.LibCrosService"/>
34 <allow send_destination="org.chromium.LibCrosService"/>
  /external/libsepol/tests/policies/test-cond/
refpolicy-base.conf 977 allow bin_t fs_t:filesystem associate;
978 allow bin_t noxattrfs:filesystem associate;
980 allow sbin_t fs_t:filesystem associate;
981 allow sbin_t noxattrfs:filesystem associate;
983 allow ls_exec_t fs_t:filesystem associate;
984 allow ls_exec_t noxattrfs:filesystem associate;
987 allow shell_exec_t fs_t:filesystem associate;
988 allow shell_exec_t noxattrfs:filesystem associate;
990 allow chroot_exec_t fs_t:filesystem associate;
991 allow chroot_exec_t noxattrfs:filesystem associate
    [all...]
  /external/chromium_org/chrome/browser/download/
download_resource_throttle.cc 63 void DownloadResourceThrottle::ContinueDownload(bool allow) {
65 request_allowed_ = allow;
67 if (allow) {
77 if (allow) {

Completed in 322 milliseconds

1 2 3 4 5 6 7 8 91011>>