HomeSort by relevance Sort by last modified time
    Searched refs:tun_device (Results 1 - 8 of 8) sorted by null

  /system/sepolicy/prebuilts/api/26.0/private/
isolated_app.te 53 # Do not allow isolated_app to directly open tun_device
54 neverallow isolated_app tun_device:chr_file open;
app.te 323 # device traffic. Do not allow untrusted app to directly open tun_device
324 allow { appdomain -isolated_app -ephemeral_app } tun_device:chr_file { read write getattr ioctl append };
system_server.te 300 allow system_server tun_device:chr_file rw_file_perms;
file_contexts 159 /dev/tun u:object_r:tun_device:s0
  /system/sepolicy/private/
isolated_app.te 57 # Do not allow isolated_app to directly open tun_device
58 neverallow isolated_app tun_device:chr_file open;
app.te 331 # device traffic. Do not allow untrusted app to directly open tun_device
332 allow { appdomain -isolated_app -ephemeral_app } tun_device:chr_file { read write getattr ioctl append };
system_server.te 313 allow system_server tun_device:chr_file rw_file_perms;
file_contexts 161 /dev/tun u:object_r:tun_device:s0

Completed in 62 milliseconds