HomeSort by relevance Sort by last modified time
    Searched refs:connectto (Results 1 - 17 of 17) sorted by null

  /external/selinux/libsepol/tests/policies/test-expander/
alias-base.conf 207 connectto
251 connectto
role-base.conf 207 connectto
251 connectto
user-base.conf 207 connectto
251 connectto
small-base.conf 207 connectto
251 connectto
  /external/selinux/libsepol/tests/policies/test-hooks/
cmp_policy.conf 207 connectto
251 connectto
small-base.conf 207 connectto
251 connectto
  /system/sepolicy/
priv_app.te 125 neverallow priv_app init:unix_stream_socket connectto;
te_macros 125 # allow clientdomain init:unix_stream_socket connectto;
142 allow $1 $3:unix_stream_socket connectto;
untrusted_app.te 135 neverallow untrusted_app init:unix_stream_socket connectto;
access_vectors 187 connectto
247 connectto
mls 49 mlsconstrain unix_stream_socket { connectto }
app.te 161 # hence no sock_file or connectto permission. This appears to be how
263 allow appdomain adbd:unix_stream_socket connectto;
  /external/selinux/libsepol/tests/policies/test-deps/
base-metreq.conf 207 connectto
251 connectto
base-notmetreq.conf 206 connectto
250 connectto
small-base.conf 207 connectto
251 connectto
  /external/selinux/libsepol/tests/policies/test-linker/
small-base.conf 207 connectto
251 connectto
  /external/selinux/libsepol/tests/policies/test-cond/
refpolicy-base.conf 193 connectto
237 connectto
    [all...]

Completed in 1696 milliseconds