HomeSort by relevance Sort by last modified time
    Searched refs:sock_file (Results 1 - 25 of 41) sorted by null

1 2

  /system/sepolicy/prebuilts/api/26.0/private/
isolated_app.te 86 neverallow isolated_app sdcard_type:{ devfile_class_set lnk_file sock_file fifo_file } *;
93 neverallow isolated_app webview_zygote_socket:sock_file write;
mls 59 mlsconstrain { file lnk_file sock_file } { open setattr unlink link rename }
71 mlsconstrain { file lnk_file sock_file chr_file blk_file } { read getattr execute }
79 mlsconstrain { file lnk_file sock_file chr_file blk_file } { write setattr append unlink link rename }
app_neverallows.te 30 neverallow all_untrusted_apps property_socket:sock_file write;
app.te 194 # hence no sock_file or connectto permission. This appears to be how
383 neverallow appdomain socket_device:sock_file write;
386 neverallow appdomain adbd_socket:sock_file write;
387 neverallow { appdomain -radio } rild_socket:sock_file write;
388 neverallow appdomain vold_socket:sock_file write;
389 neverallow appdomain zygote_socket:sock_file write;
priv_app.te 148 neverallow priv_app property_socket:sock_file write;
  /system/sepolicy/prebuilts/api/27.0/private/
mls 59 mlsconstrain { file lnk_file sock_file } { open setattr unlink link rename }
71 mlsconstrain { file lnk_file sock_file chr_file blk_file } { read getattr execute }
79 mlsconstrain { file lnk_file sock_file chr_file blk_file } { write setattr append unlink link rename }
isolated_app.te 101 neverallow isolated_app sdcard_type:{ devfile_class_set lnk_file sock_file fifo_file } *;
108 neverallow isolated_app webview_zygote_socket:sock_file write;
app_neverallows.te 35 neverallow { all_untrusted_apps -mediaprovider } property_socket:sock_file write;
priv_app.te 139 neverallow priv_app property_socket:sock_file write;
  /system/sepolicy/prebuilts/api/28.0/private/
mls 59 mlsconstrain { file lnk_file sock_file } { open setattr unlink link rename }
71 mlsconstrain { file lnk_file sock_file chr_file blk_file } { read getattr execute }
79 mlsconstrain { file lnk_file sock_file chr_file blk_file } { write setattr append unlink link rename }
isolated_app.te 104 neverallow isolated_app sdcard_type:{ devfile_class_set lnk_file sock_file fifo_file } *;
111 neverallow isolated_app webview_zygote:sock_file write;
app_neverallows.te 36 neverallow { all_untrusted_apps -mediaprovider } property_socket:sock_file write;
priv_app.te 181 neverallow priv_app property_socket:sock_file write;
  /system/sepolicy/private/
mls 59 mlsconstrain { file lnk_file sock_file } { open setattr unlink link rename }
71 mlsconstrain { file lnk_file sock_file chr_file blk_file } { read getattr execute }
79 mlsconstrain { file lnk_file sock_file chr_file blk_file } { write setattr append unlink link rename }
isolated_app.te 104 neverallow isolated_app sdcard_type:{ devfile_class_set lnk_file sock_file fifo_file } *;
111 neverallow isolated_app webview_zygote:sock_file write;
app_neverallows.te 36 neverallow { all_untrusted_apps -mediaprovider } property_socket:sock_file write;
priv_app.te 181 neverallow priv_app property_socket:sock_file write;
  /system/sepolicy/prebuilts/api/28.0/public/
te_macros 134 allow $1 pdx_$2_endpoint_socket_type:sock_file rw_file_perms;
283 # allow clientdomain property_socket:sock_file write;
291 allow $1 $2_socket:sock_file write;
320 allow $1 $2_socket:sock_file write;
509 allow $1 tombstoned_crash_socket:sock_file write;
  /system/sepolicy/public/
te_macros 134 allow $1 pdx_$2_endpoint_socket_type:sock_file rw_file_perms;
283 # allow clientdomain property_socket:sock_file write;
291 allow $1 $2_socket:sock_file write;
320 allow $1 $2_socket:sock_file write;
509 allow $1 tombstoned_crash_socket:sock_file write;
  /system/sepolicy/prebuilts/api/26.0/public/
te_macros 130 allow $1 pdx_$2_endpoint_socket_type:sock_file rw_file_perms;
262 # allow clientdomain property_socket:sock_file write;
279 allow $1 $2_socket:sock_file write;
308 allow $1 $2_socket:sock_file write;
477 allow $1 tombstoned_crash_socket:sock_file write;
  /external/selinux/libsepol/tests/policies/test-expander/
alias-base.conf 20 class sock_file
185 class sock_file
role-base.conf 20 class sock_file
185 class sock_file
user-base.conf 20 class sock_file
185 class sock_file
  /external/selinux/libsepol/tests/policies/test-hooks/
cmp_policy.conf 20 class sock_file
185 class sock_file
small-base.conf 20 class sock_file
185 class sock_file

Completed in 150 milliseconds

1 2