OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
refs:allow
(Results
1 - 25
of
1150
) sorted by null
1
2
3
4
5
6
7
8
9
10
11
>>
/external/sepolicy/
system_server.te
11
allow
system_server self:process execmem;
12
allow
system_server ashmem_device:chr_file execute;
13
allow
system_server system_server_tmpfs:file execute;
16
allow
system_server dalvikcache_data_file:file execute;
19
allow
system_server resourcecache_data_file:file r_file_perms;
20
allow
system_server resourcecache_data_file:dir r_dir_perms;
23
allow
system_server self:process ptrace;
26
allow
system_server zygote:fd use;
27
allow
system_server zygote:process sigchld;
28
allow
system_server zygote_tmpfs:file read
[
all
...]
platform_app.te
12
allow
platform_app shell_data_file:dir search;
13
allow
platform_app shell_data_file:file { open getattr read };
16
allow
platform_app { apk_tmp_file apk_private_tmp_file }:dir rw_dir_perms;
17
allow
platform_app { apk_tmp_file apk_private_tmp_file }:file rw_file_perms;
18
allow
platform_app apk_private_data_file:dir search;
20
allow
platform_app asec_apk_file:dir create_dir_perms;
21
allow
platform_app asec_apk_file:file create_file_perms;
24
allow
platform_app media_rw_data_file:dir create_dir_perms;
25
allow
platform_app media_rw_data_file:file create_file_perms;
28
allow
platform_app cache_file:dir create_dir_perms
[
all
...]
system_app.te
12
allow
system_app system_app_data_file:dir create_dir_perms;
13
allow
system_app system_app_data_file:file create_file_perms;
16
allow
system_app keychain_data_file:dir r_dir_perms;
17
allow
system_app keychain_data_file:file r_file_perms;
21
allow
system_app system_data_file:dir create_dir_perms;
22
allow
system_app system_data_file:file create_file_perms;
23
allow
system_app misc_user_data_file:dir create_dir_perms;
24
allow
system_app misc_user_data_file:file create_file_perms;
31
allow
system_app wallpaper_file:file r_file_perms;
35
allow
system_app debug_prop:property_service set
[
all
...]
tee.te
10
allow
tee self:capability { dac_override };
11
allow
tee tee_device:chr_file rw_file_perms;
12
allow
tee tee_data_file:dir rw_dir_perms;
13
allow
tee tee_data_file:file create_file_perms;
14
allow
tee self:netlink_socket create_socket_perms;
unconfined.te
19
allow
unconfineddomain self:capability ~{ sys_ptrace sys_rawio mknod sys_module audit_write audit_control linux_immutable };
20
allow
unconfineddomain self:capability2 ~{ mac_override mac_admin };
21
allow
unconfineddomain kernel:security ~{ load_policy setenforce setcheckreqprot setbool setsecparam };
22
allow
unconfineddomain kernel:system ~{ syslog_read syslog_mod syslog_console };
23
allow
unconfineddomain domain:fd *;
24
allow
unconfineddomain domain:dir r_dir_perms;
25
allow
unconfineddomain domain:lnk_file r_file_perms;
26
allow
unconfineddomain domain:{ fifo_file file } rw_file_perms;
27
allow
unconfineddomain domain:{
45
allow
unconfineddomain domain:ipc_class_set *
[
all
...]
untrusted_app.te
30
allow
untrusted_app app_data_file:file { rx_file_perms execmod };
32
allow
untrusted_app tun_device:chr_file rw_file_perms;
35
allow
untrusted_app asec_apk_file:file r_file_perms;
37
allow
untrusted_app asec_public_file:file { execute execmod };
39
#
Allow
the allocation and use of ptys
47
allow
untrusted_app shell_data_file:file r_file_perms;
48
allow
untrusted_app shell_data_file:dir r_dir_perms;
50
# b/18504118:
Allow
reads from /data/anr/traces.txt
56
allow
untrusted_app anr_data_file:file r_file_perms;
64
allow
untrusted_app mtp_device:chr_file rw_file_perms
[
all
...]
app.te
11
allow
appdomain self:process execmem;
12
allow
appdomain ashmem_device:chr_file execute;
15
allow
appdomain zygote:fd use;
19
allow
appdomain zygote_exec:file rx_file_perms;
22
allow
appdomain self:process ptrace;
25
allow
appdomain zygote_tmpfs:file read;
28
allow
appdomain zygote:process sigchld;
31
allow
appdomain shell:process sigchld;
32
allow
appdomain adbd:process sigchld;
35
allow
appdomain devpts:chr_file { getattr read write ioctl }
[
all
...]
isolated_app.te
17
# granted via app.te.
Allow
execute.
18
# Needed to
allow
dlopen() from Chrome renderer processes.
20
allow
isolated_app app_data_file:file execute;
/external/wpa_supplicant_8/wpa_supplicant/dbus/
dbus-wpa_supplicant.conf
6
<
allow
own="fi.epitest.hostap.WPASupplicant"/>
8
<
allow
send_destination="fi.epitest.hostap.WPASupplicant"/>
9
<
allow
send_interface="fi.epitest.hostap.WPASupplicant"/>
11
<
allow
own="fi.w1.wpa_supplicant1"/>
13
<
allow
send_destination="fi.w1.wpa_supplicant1"/>
14
<
allow
send_interface="fi.w1.wpa_supplicant1"/>
15
<
allow
receive_sender="fi.w1.wpa_supplicant1" receive_type="signal"/>
/external/libsepol/tests/policies/test-deps/
modreq-role-global.conf
12
allow
role_req_r user_r;
modreq-bool-global.conf
14
allow
a_t b_t : file { read write };
modreq-obj-global.conf
12
allow
mod_foo_t mod_bar_t : sem { create destroy };
modreq-perm-global.conf
10
allow
a_t b_t: msg { send receive };
modreq-role-opt.conf
16
allow
role_req_r user_r;
modreq-type-global.conf
12
allow
test_t type_req_t : file { read write };
modreq-type-opt.conf
15
allow
type_req_t file_t : file { read write };
module.conf
15
allow
system_t file_t : file { read write };
19
allow
sysadm_t file_t : file { read write };
modreq-bool-opt.conf
20
allow
a_t b_t : file { read write };
/device/asus/grouper/sepolicy/
sensors_config.te
11
allow
sensors_config shell_exec:file rx_file_perms;
12
allow
sensors_config system_file:file execute_no_trans;
15
allow
sensors_config sensors_data_file:dir mounton;
16
allow
sensors_config sdcard_external:filesystem { mount unmount };
17
allow
sensors_config { sdcard_external block_device }:dir search;
20
allow
sensors_config sdcard_external:file r_file_perms;
23
allow
sensors_config self:capability { chown fowner };
25
# Checked as a side effect on the chmod (don't
allow
)
29
allow
sensors_config self:capability sys_admin;
31
# Tries to delete /data/calibration (don't
allow
)
[
all
...]
/external/dnsmasq/dbus/
dnsmasq.conf
6
<
allow
own="uk.org.thekelleys.dnsmasq"/>
7
<
allow
send_destination="uk.org.thekelleys.dnsmasq"/>
/external/nist-sip/java/gov/nist/javax/sip/parser/
AllowParser.java
33
* Parser for
Allow
header.
45
* @param
allow
the header to parse
47
public AllowParser(String
allow
) {
48
super(
allow
);
60
* parse the
Allow
String header
71
headerName(TokenTypes.
ALLOW
);
73
Allow
allow
= new
Allow
();
local
74
allow
.setHeaderName(SIPHeaderNames.ALLOW)
[
all
...]
/packages/experimental/SELinux/CTS/src/
example_input_policy.conf
[
all
...]
/external/chromium_org/chrome/browser/chromeos/dbus/
org.chromium.LibCrosService.conf
12
<
allow
own="org.chromium.LibCrosService"/>
13
<
allow
receive_sender="org.chromium.LibCrosService"/>
14
<
allow
send_destination="org.chromium.LibCrosService"/>
19
<
allow
send_destination="org.chromium.LibCrosService"/>
24
<
allow
send_destination="org.chromium.LibCrosService"/>
29
<
allow
send_destination="org.chromium.LibCrosService"/>
34
<
allow
send_destination="org.chromium.LibCrosService"/>
/external/libsepol/tests/policies/test-cond/
refpolicy-base.conf
977
allow
bin_t fs_t:filesystem associate;
978
allow
bin_t noxattrfs:filesystem associate;
980
allow
sbin_t fs_t:filesystem associate;
981
allow
sbin_t noxattrfs:filesystem associate;
983
allow
ls_exec_t fs_t:filesystem associate;
984
allow
ls_exec_t noxattrfs:filesystem associate;
987
allow
shell_exec_t fs_t:filesystem associate;
988
allow
shell_exec_t noxattrfs:filesystem associate;
990
allow
chroot_exec_t fs_t:filesystem associate;
991
allow
chroot_exec_t noxattrfs:filesystem associate
[
all
...]
/external/chromium_org/chrome/browser/download/
download_resource_throttle.cc
63
void DownloadResourceThrottle::ContinueDownload(bool
allow
) {
65
request_allowed_ =
allow
;
67
if (
allow
) {
77
if (
allow
) {
Completed in 322 milliseconds
1
2
3
4
5
6
7
8
9
10
11
>>