/device/htc/flounder/sepolicy/ |
radio.te | 8 allow radio su_exec:file getattr;
|
qmuxd.te | 10 allow qmuxd qmuxd_socket:sock_file { create setattr getattr unlink };
|
te_macros | 12 allow qmuxd $1_qmuxd_socket:sock_file { getattr unlink };
|
touch_fusion.te | 10 allow touch_fusion kmsg_device:chr_file { w_file_perms getattr };
|
/device/lge/mako/sepolicy/ |
surfaceflinger.te | 5 allow surfaceflinger shell_data_file:file { open getattr read };
|
bridge.te | 16 allow bridge sysfs_rmnet:file { open read write getattr };
|
qmux.te | 10 allow qmux qmuxd_socket:sock_file { create setattr getattr unlink };
|
te_macros | 12 allow qmux $1_qmuxd_socket:sock_file { getattr unlink };
|
/external/sepolicy/ |
global_macros | 21 define(`x_file_perms', `{ getattr execute execute_no_trans }') 22 define(`r_file_perms', `{ getattr open read ioctl lock }') 28 define(`link_file_perms', `{ getattr link unlink rename }') 31 define(`r_dir_perms', `{ open getattr read search ioctl }') 37 define(`r_ipc_perms', `{ getattr read associate unix_read }') 44 define(`rw_socket_perms', `{ ioctl read getattr write setattr lock append bind connect getopt setopt shutdown }')
|
drmserver.te | 23 allow drmserver app_data_file:file { read write getattr }; 24 allow drmserver sdcard_type:file { read write getattr }; 42 allow drmserver apk_data_file:file { read getattr }; 43 allow drmserver asec_apk_file:file { read getattr }; 46 allow drmserver radio_data_file:file { read getattr };
|
keystore.te | 11 allow keystore keystore_exec:file { getattr }; 21 neverallow { domain -keystore } keystore_data_file:dir ~{ open create read getattr setattr search relabelto }; 22 neverallow { domain -keystore } keystore_data_file:notdevfile_class_set ~{ relabelto getattr };
|
binderservicedomain.te | 5 allow binderservicedomain dumpstate:unix_stream_socket { read write getopt getattr }; 6 allow binderservicedomain shell_data_file:file { getattr write };
|
vdc.te | 17 allow vdc dumpstate:unix_stream_socket { read write getattr }; 20 allow vdc shell_data_file:file { write getattr };
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/plat-mac/lib-scriptpackages/Explorer/ |
__init__.py | 46 if not getattr(v, '_propdict', None): 49 for superclassname in getattr(v, '_superclassnames', []): 52 v._propdict.update(getattr(superclass, '_propdict', {})) 53 v._elemdict.update(getattr(superclass, '_elemdict', {})) 54 v._propdict.update(getattr(v, '_privpropdict', {})) 55 v._elemdict.update(getattr(v, '_privelemdict', {}))
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/plat-mac/lib-scriptpackages/Terminal/ |
__init__.py | 34 if not getattr(v, '_propdict', None): 37 for superclassname in getattr(v, '_superclassnames', []): 40 v._propdict.update(getattr(superclass, '_propdict', {})) 41 v._elemdict.update(getattr(superclass, '_elemdict', {})) 42 v._propdict.update(getattr(v, '_privpropdict', {})) 43 v._elemdict.update(getattr(v, '_privelemdict', {}))
|
/packages/experimental/SELinux/CTS/src/ |
example_input_policy.conf | 195 getattr 222 getattr 251 getattr 268 getattr 280 getattr 316 getattr 496 getattr 653 getattr 671 getattr 685 getattr [all...] |
/device/asus/flo/sepolicy/ |
bridge.te | 16 allow bridge sysfs_rmnet:file { open read write getattr };
|
qmux.te | 10 allow qmux qmuxd_socket:sock_file { create setattr getattr unlink };
|
te_macros | 12 allow qmux $1_qmuxd_socket:sock_file { getattr unlink };
|
/device/asus/grouper/sepolicy/ |
surfaceflinger.te | 4 allow surfaceflinger sysfs_devices_tegradc:lnk_file { open getattr read };
|
/device/lge/hammerhead/sepolicy/ |
bridge.te | 16 allow bridge sysfs_rmnet:file { open read write getattr };
|
te_macros | 12 allow qmux $1_qmuxd_socket:sock_file { getattr unlink };
|
/device/moto/shamu/sepolicy/ |
bridge.te | 16 allow bridge sysfs_rmnet:file { open read write getattr }
|
te_macros | 12 allow qmux $1_qmuxd_socket:sock_file { getattr unlink };
|
/external/chromium_org/third_party/cython/src/Cython/Compiler/ |
Future.py | 4 return getattr(__future__, name, object())
|