Lines Matching refs:unconfineddomain
19 allow unconfineddomain self:capability ~{ sys_ptrace sys_rawio mknod sys_module audit_write audit_control linux_immutable };
20 allow unconfineddomain self:capability2 ~{ mac_override mac_admin };
21 allow unconfineddomain kernel:security ~{ load_policy setenforce setcheckreqprot setbool setsecparam };
22 allow unconfineddomain kernel:system ~{ syslog_read syslog_mod syslog_console };
23 allow unconfineddomain domain:fd *;
24 allow unconfineddomain domain:dir r_dir_perms;
25 allow unconfineddomain domain:lnk_file r_file_perms;
26 allow unconfineddomain domain:{ fifo_file file } rw_file_perms;
27 allow unconfineddomain domain:{
45 allow unconfineddomain domain:ipc_class_set *;
46 allow unconfineddomain domain:key *;
47 allow unconfineddomain {fs_type -contextmount_type -sdcard_type}:{ dir lnk_file sock_file fifo_file } ~relabelto;
48 allow unconfineddomain dev_type:{ dir lnk_file sock_file fifo_file } ~relabelto;
49 allow unconfineddomain {
59 allow unconfineddomain exec_type:dir r_dir_perms;
60 allow unconfineddomain exec_type:file { r_file_perms execute };
61 allow unconfineddomain exec_type:lnk_file r_file_perms;
62 allow unconfineddomain system_file:dir r_dir_perms;
63 allow unconfineddomain system_file:file { r_file_perms execute };
64 allow unconfineddomain system_file:lnk_file r_file_perms;
65 allow unconfineddomain {
73 allow unconfineddomain {dev_type -kmem_device}:{ chr_file file } ~{entrypoint execute_no_trans execmod execute relabelto};
74 allow unconfineddomain {
84 allow unconfineddomain rootfs:file execute;
85 allow unconfineddomain contextmount_type:dir r_dir_perms;
86 allow unconfineddomain contextmount_type:notdevfile_class_set r_file_perms;
87 allow unconfineddomain node_type:node *;
88 allow unconfineddomain netif_type:netif *;
89 allow unconfineddomain domain:peer recv;
90 allow unconfineddomain { domain -init }:binder { call transfer set_context_mgr };