OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
refs:sock_file
(Results
1 - 25
of
41
) sorted by null
1
2
/system/sepolicy/prebuilts/api/26.0/private/
isolated_app.te
86
neverallow isolated_app sdcard_type:{ devfile_class_set lnk_file
sock_file
fifo_file } *;
93
neverallow isolated_app webview_zygote_socket:
sock_file
write;
mls
59
mlsconstrain { file lnk_file
sock_file
} { open setattr unlink link rename }
71
mlsconstrain { file lnk_file
sock_file
chr_file blk_file } { read getattr execute }
79
mlsconstrain { file lnk_file
sock_file
chr_file blk_file } { write setattr append unlink link rename }
app_neverallows.te
30
neverallow all_untrusted_apps property_socket:
sock_file
write;
app.te
194
# hence no
sock_file
or connectto permission. This appears to be how
383
neverallow appdomain socket_device:
sock_file
write;
386
neverallow appdomain adbd_socket:
sock_file
write;
387
neverallow { appdomain -radio } rild_socket:
sock_file
write;
388
neverallow appdomain vold_socket:
sock_file
write;
389
neverallow appdomain zygote_socket:
sock_file
write;
priv_app.te
148
neverallow priv_app property_socket:
sock_file
write;
/system/sepolicy/prebuilts/api/27.0/private/
mls
59
mlsconstrain { file lnk_file
sock_file
} { open setattr unlink link rename }
71
mlsconstrain { file lnk_file
sock_file
chr_file blk_file } { read getattr execute }
79
mlsconstrain { file lnk_file
sock_file
chr_file blk_file } { write setattr append unlink link rename }
isolated_app.te
101
neverallow isolated_app sdcard_type:{ devfile_class_set lnk_file
sock_file
fifo_file } *;
108
neverallow isolated_app webview_zygote_socket:
sock_file
write;
app_neverallows.te
35
neverallow { all_untrusted_apps -mediaprovider } property_socket:
sock_file
write;
priv_app.te
139
neverallow priv_app property_socket:
sock_file
write;
/system/sepolicy/prebuilts/api/28.0/private/
mls
59
mlsconstrain { file lnk_file
sock_file
} { open setattr unlink link rename }
71
mlsconstrain { file lnk_file
sock_file
chr_file blk_file } { read getattr execute }
79
mlsconstrain { file lnk_file
sock_file
chr_file blk_file } { write setattr append unlink link rename }
isolated_app.te
104
neverallow isolated_app sdcard_type:{ devfile_class_set lnk_file
sock_file
fifo_file } *;
111
neverallow isolated_app webview_zygote:
sock_file
write;
app_neverallows.te
36
neverallow { all_untrusted_apps -mediaprovider } property_socket:
sock_file
write;
priv_app.te
181
neverallow priv_app property_socket:
sock_file
write;
/system/sepolicy/private/
mls
59
mlsconstrain { file lnk_file
sock_file
} { open setattr unlink link rename }
71
mlsconstrain { file lnk_file
sock_file
chr_file blk_file } { read getattr execute }
79
mlsconstrain { file lnk_file
sock_file
chr_file blk_file } { write setattr append unlink link rename }
isolated_app.te
104
neverallow isolated_app sdcard_type:{ devfile_class_set lnk_file
sock_file
fifo_file } *;
111
neverallow isolated_app webview_zygote:
sock_file
write;
app_neverallows.te
36
neverallow { all_untrusted_apps -mediaprovider } property_socket:
sock_file
write;
priv_app.te
181
neverallow priv_app property_socket:
sock_file
write;
/system/sepolicy/prebuilts/api/28.0/public/
te_macros
134
allow $1 pdx_$2_endpoint_socket_type:
sock_file
rw_file_perms;
283
# allow clientdomain property_socket:
sock_file
write;
291
allow $1 $2_socket:
sock_file
write;
320
allow $1 $2_socket:
sock_file
write;
509
allow $1 tombstoned_crash_socket:
sock_file
write;
/system/sepolicy/public/
te_macros
134
allow $1 pdx_$2_endpoint_socket_type:
sock_file
rw_file_perms;
283
# allow clientdomain property_socket:
sock_file
write;
291
allow $1 $2_socket:
sock_file
write;
320
allow $1 $2_socket:
sock_file
write;
509
allow $1 tombstoned_crash_socket:
sock_file
write;
/system/sepolicy/prebuilts/api/26.0/public/
te_macros
130
allow $1 pdx_$2_endpoint_socket_type:
sock_file
rw_file_perms;
262
# allow clientdomain property_socket:
sock_file
write;
279
allow $1 $2_socket:
sock_file
write;
308
allow $1 $2_socket:
sock_file
write;
477
allow $1 tombstoned_crash_socket:
sock_file
write;
/external/selinux/libsepol/tests/policies/test-expander/
alias-base.conf
20
class
sock_file
185
class
sock_file
role-base.conf
20
class
sock_file
185
class
sock_file
user-base.conf
20
class
sock_file
185
class
sock_file
/external/selinux/libsepol/tests/policies/test-hooks/
cmp_policy.conf
20
class
sock_file
185
class
sock_file
small-base.conf
20
class
sock_file
185
class
sock_file
Completed in 150 milliseconds
1
2