/external/selinux/policycoreutils/sepolicy/ |
sepolicy-transition.8 | 14 sepolicy transition will show all domains that a give SELinux source domain can transition to, including the entrypoint. 16 If a target domain is given, sepolicy transition will examine policy for all transition paths from the source domain to the target domain, and will list the 17 paths. If a transition is possible, this tool will print out all transition paths from the source domain to the target domain 25 Specify the source SELinux domain type. 28 Specify the target SELinux domain type.
|
sepolicy-communicate.8 | 11 Use sepolicy communicate to examine SELinux Policy to if a source SELinux Domain can communicate with a target SELinux Domain. 12 The default command looks to see if there are any file types that the source domain can write, which the target domain can read. 17 Specify the SELinux class which the source domain will attempt to communicate with the target domain. (Default file) 23 Specify the source SELinux domain type. 26 Specify the list of accesses used by the source SELinux domain type to communicate with the target domain. Default Open, Write. 29 Specify the target SELinux domain type [all...] |
/device/huawei/angler/sepolicy/ |
kernel.te | 2 allow kernel domain:process setsched;
|
te_macros | 3 # Allow client domain to connecto and send 4 # via a local socket to the qmux domain. 5 # Also allow the client domain to remove
|
irqbalance.te | 1 type irqbalance, domain, domain_deprecated;
|
nanoapp_cmd.te | 1 type nanoapp_cmd, domain;
|
sensortool.te | 1 type sensortool, domain, domain_deprecated;
|
ssr_setup.te | 1 type ssr_setup, domain, domain_deprecated;
|
/device/lge/bullhead/sepolicy/ |
kernel.te | 2 allow kernel domain:process setsched;
|
te_macros | 3 # Allow client domain to connecto and send 4 # via a local socket to the qmux domain. 5 # Also allow the client domain to remove
|
msm_irqbalanced.te | 1 type msm_irqbalanced, domain, domain_deprecated;
|
nanoapp_cmd.te | 1 type nanoapp_cmd, domain;
|
/device/htc/flounder/sepolicy/ |
te_macros | 3 # Allow client domain to connecto and send 4 # via a local socket to the qmux domain. 5 # Also allow the client domain to remove
|
/device/moto/shamu/sepolicy/ |
te_macros | 3 # Allow client domain to connecto and send 4 # via a local socket to the qmux domain. 5 # Also allow the client domain to remove
|
irsc_util.te | 2 type irsc_util, domain, domain_deprecated;
|
/packages/services/Car/car_product/sepolicy/ |
te_macros | 3 # Allow client domain to connecto and send 4 # via a local socket to the qmux domain. 5 # Also allow the client domain to remove
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/unit/swf/ |
test_layer2_domain.py | 2 from boto.swf.layer2 import Domain, ActivityType, WorkflowType, WorkflowExecution 11 self.domain = Domain(name='test-domain', description='My test domain') 12 self.domain.aws_access_key_id = 'inheritable access key' 13 self.domain.aws_secret_access_key = 'inheritable secret key' 14 self.domain.region = 'test-region' 17 self.assertEquals('test-domain', self.domain.name [all...] |
/external/selinux/policycoreutils/sepolicy/sepolicy/templates/ |
network.py | 108 ## <param name="domain"> 110 ## Domain allowed access. 127 ## <param name="domain"> 129 ## Domain allowed access. 146 ## <param name="domain"> 148 ## Domain to not audit. 165 ## <param name="domain"> 167 ## Domain allowed access. 184 ## <param name="domain"> 186 ## Domain to not audit [all...] |
/system/sepolicy/ |
domain.te | 4 allow domain init:process sigchld; 6 # Intra-domain accesses. 7 allow domain self:process { 24 allow domain self:fd use; 25 allow domain proc:dir r_dir_perms; 26 allow domain proc_net:dir search; 27 r_dir_file(domain, self) 28 allow domain self:{ fifo_file file } rw_file_perms; 29 allow domain self:unix_dgram_socket { create_socket_perms sendto }; 30 allow domain self:unix_stream_socket { create_stream_socket_perms connectto } [all...] |
mediaextractor.te | 2 type mediaextractor, domain, domain_deprecated; 21 # domain transition 25 neverallow mediaextractor domain:{ tcp_socket udp_socket rawip_socket } *;
|
/build/target/board/generic/sepolicy/ |
qemud.te | 2 type qemud, domain, domain_deprecated;
|
/development/ndk/platforms/android-9/arch-x86/include/machine/ |
internal_types.h | 2 /* Public domain */
|
/device/google/dragon/sepolicy/ |
seapp_contexts | 1 user=_app seinfo=google name=com.google.android.crashuploader domain=crash_collector_app type=app_data_file levelFrom=user
|
/external/avahi/avahi-compat-howl/ |
.gitignore | 2 browse-domain-test
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/cloudsearch/ |
layer2.py | 26 from boto.cloudsearch.domain import Domain 50 Return a list of :class:`boto.cloudsearch.domain.Domain` 51 objects for each domain defined in the current account. 54 return [Domain(self.layer1, data) for data in domain_data] 58 Create a new CloudSearch domain and return the corresponding 59 :class:`boto.cloudsearch.domain.Domain` object. 62 return Domain(self.layer1, data [all...] |