HomeSort by relevance Sort by last modified time
    Searched full:domain (Results 1 - 25 of 6195) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /build/target/board/generic_x86/sepolicy/
domain.te 1 allow domain cpuctl_device:dir search;
  /device/asus/flo/sepolicy/
domain.te 2 allow domain diag_device:chr_file rw_file_perms;
te_macros 3 # Allow client domain to connecto and send
4 # via a local socket to the qmux domain.
5 # Also allow the client domain to remove
  /device/lge/hammerhead/sepolicy/
domain.te 2 allow domain diag_device:chr_file rw_file_perms;
vss.te 1 type vss, domain;
te_macros 3 # Allow client domain to connecto and send
4 # via a local socket to the qmux domain.
5 # Also allow the client domain to remove
  /device/moto/shamu/sepolicy/
domain.te 2 allow domain diag_device:chr_file rw_file_perms;
cnd.te 2 type cnd, domain;
5 # cnd is started by init, type transit from init domain to cnd domain
7 # associate netdomain as an attribute of cnd domain
te_macros 3 # Allow client domain to connecto and send
4 # via a local socket to the qmux domain.
5 # Also allow the client domain to remove
  /external/sepolicy/
roles 2 role r types domain;
domain.te 4 allow domain init:process sigchld;
7 allow domain kernel:fd use;
8 allow domain tmpfs:file { read getattr };
9 allow domain tmpfs:lnk_file { read getattr };
12 allow domain tmpfs:dir r_dir_perms;
14 # Intra-domain accesses.
15 allow domain self:process {
32 allow domain self:fd use;
33 allow domain self:dir r_dir_perms;
34 allow domain self:lnk_file r_file_perms
    [all...]
mdnsd.te 2 type mdnsd, domain, mlstrustedsubject;
su.te 5 # Domain used for su processes, as well as for adbd and adb shell
6 # after performing an adb root command. The domain definition is
8 type su, domain, mlstrustedsubject;
15 # Make sure that dumpstate runs the same from the "su" domain as
16 # from the "init" domain.
30 dontaudit su domain:process *;
31 dontaudit su domain:fd *;
32 dontaudit su domain:dir *;
33 dontaudit su domain:lnk_file *;
34 dontaudit su domain:{ fifo_file file } *
    [all...]
keystore.te 1 type keystore, domain;
26 neverallow { domain -keystore } keystore_data_file:dir ~{ open create read getattr setattr search relabelto ioctl };
27 neverallow { domain -keystore } keystore_data_file:notdevfile_class_set ~{ relabelto getattr };
29 neverallow { domain -keystore -init } keystore_data_file:dir *;
30 neverallow { domain -keystore -init } keystore_data_file:notdevfile_class_set *;
32 neverallow domain keystore:process ptrace;
  /external/llvm/test/Assembler/
2002-10-13-ConstantEncodingProblem.ll 4 %Domain = type { %Domain**, %Domain* }
5 @D = global %Domain zeroinitializer ; <%Domain*> [#uses=0]
  /build/target/board/generic/sepolicy/
domain.te 2 allow domain sysfs_writable:file rw_file_perms;
3 allow domain qemu_device:chr_file rw_file_perms;
qemud.te 2 type qemud, domain;
  /external/mdnsresponder/mDNSPosix/
nss_mdns.conf 4 domain local
5 domain 254.169.in-addr.arpa
6 domain 8.e.f.ip6.int
7 domain 9.e.f.ip6.int
8 domain a.e.f.ip6.int
9 domain b.e.f.ip6.int
10 domain 8.e.f.ip6.arpa
11 domain 9.e.f.ip6.arpa
12 domain a.e.f.ip6.arpa
13 domain b.e.f.ip6.arp
    [all...]
  /external/markdown/MarkdownTest/Tests_2004/
Yuri-Email.text 1 Lorem ipsum <yuri@domain.org>, etc.
4 * <yuri@domain.org>
  /external/selinux/policycoreutils/sepolicy/sepolicy/help/
booleans_more_show.txt 1 You are viewing the booleans page for the application domain.
  /external/selinux/policycoreutils/sepolicy/
sepolicy-transition.8 14 sepolicy transition will show all domains that a give SELinux source domain can transition to, including the entrypoint.
16 If a target domain is given, sepolicy transition will examine policy for all transition paths from the source domain to the target domain, and will list the
17 paths. If a transition is possible, this tool will print out all transition paths from the source domain to the target domain
25 Specify the source SELinux domain type.
28 Specify the target SELinux domain type.
sepolicy-communicate.8 11 Use sepolicy communicate to examine SELinux Policy to if a source SELinux Domain can communicate with a target SELinux Domain.
12 The default command looks to see if there are any file types that the source domain can write, which the target domain can read.
17 Specify the SELinux class which the source domain will attempt to communicate with the target domain. (Default file)
23 Specify the source SELinux domain type.
26 Specify the list of accesses used by the source SELinux domain type to communicate with the target domain. Default Open, Write.
29 Specify the target SELinux domain type
    [all...]
  /device/htc/flounder/sepolicy/
te_macros 3 # Allow client domain to connecto and send
4 # via a local socket to the qmux domain.
5 # Also allow the client domain to remove
  /external/selinux/policycoreutils/sepolicy/sepolicy/templates/
network.py 108 ## <param name="domain">
110 ## Domain allowed access.
127 ## <param name="domain">
129 ## Domain allowed access.
146 ## <param name="domain">
148 ## Domain to not audit.
165 ## <param name="domain">
167 ## Domain allowed access.
184 ## <param name="domain">
186 ## Domain to not audit
    [all...]
  /development/ndk/platforms/android-9/arch-x86/include/machine/
internal_types.h 2 /* Public domain */

Completed in 592 milliseconds

1 2 3 4 5 6 7 8 91011>>