OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:domains
(Results
76 - 100
of
985
) sorted by null
1
2
3
4
5
6
7
8
9
10
11
>>
/system/netd/server/
ResolverController.h
69
std::vector<std::string>*
domains
, __res_params* params,
75
const std::vector<std::string>&
domains
, const std::vector<int32_t>& params,
80
std::vector<std::string>*
domains
, std::vector<int32_t>* params,
/system/sepolicy/prebuilts/api/28.0/public/
domain.te
1
# Rules for all
domains
.
67
# /dev/binder can be accessed by non-vendor
domains
and by apps
168
# All
domains
are allowed to open and read directories
182
# All
domains
get access to /vendor/etc
187
# Allow all
domains
to be able to follow /system/vendor and/or
196
# Allow reading and executing out of /vendor to all vendor
domains
260
# Restrict all
domains
to a whitelist for common socket types. Additional
261
# ioctl commands may be added to individual
domains
, but this sets safe
306
# Limit device node creation to these whitelisted
domains
.
315
# Limit raw I/O to these whitelisted
domains
. Do not apply to debug builds
[
all
...]
hal_wifi_supplicant.te
8
# in addition to ioctls whitelisted for all
domains
, grant hal_wifi_supplicant priv_sock_ioctls.
servicemanager.te
9
# created by other
domains
. It never passes its own references
tzdatacheck.te
10
# clear that only these
domains
should modify the actual time zone rules data.
/system/sepolicy/public/
domain.te
1
# Rules for all
domains
.
67
# /dev/binder can be accessed by non-vendor
domains
and by apps
168
# All
domains
are allowed to open and read directories
182
# All
domains
get access to /vendor/etc
187
# Allow all
domains
to be able to follow /system/vendor and/or
196
# Allow reading and executing out of /vendor to all vendor
domains
260
# Restrict all
domains
to a whitelist for common socket types. Additional
261
# ioctl commands may be added to individual
domains
, but this sets safe
306
# Limit device node creation to these whitelisted
domains
.
315
# Limit raw I/O to these whitelisted
domains
. Do not apply to debug builds
[
all
...]
hal_wifi_supplicant.te
8
# in addition to ioctls whitelisted for all
domains
, grant hal_wifi_supplicant priv_sock_ioctls.
/external/autotest/client/site_tests/policy_PluginsAllowedForUrls/
control.sitenotallowed_block
18
policy PluginsAllowedForUrls contains URLs whose
domains
do not match the page
/external/autotest/client/site_tests/policy_PluginsBlockedForUrls/
control.sitenotblocked_run
18
policy PluginsBlockedForUrls contains URLs whose
domains
do not match the page
/external/libjpeg-turbo/release/
Distribution.xml
7
<
domains
/external/selinux/libselinux/man/man3/
is_context_customizable.3
14
administrators set on files, usually to allow certain
domains
to share the file content. restorecon and setfiles, by default, leave these context in place.
/external/selinux/python/sepolicy/
sepolicy-manpage.8
16
Generate Man Pages for All
Domains
sepolicy-transition.8
14
sepolicy transition will show all
domains
that a give SELinux source domain can transition to, including the entrypoint.
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/include/cloog/
union_domain.h
24
* A structure representing the input
domains
and scattering functions.
/system/sepolicy/prebuilts/api/26.0/private/
binderservicedomain.te
1
# Rules common to all binder service
domains
logpersist.te
3
# android debug log storage in logpersist
domains
(eng and userdebug only)
/system/sepolicy/prebuilts/api/26.0/public/
servicemanager.te
9
# created by other
domains
. It never passes its own references
/system/sepolicy/prebuilts/api/27.0/private/
binderservicedomain.te
1
# Rules common to all binder service
domains
logpersist.te
3
# android debug log storage in logpersist
domains
(eng and userdebug only)
/system/sepolicy/prebuilts/api/27.0/public/
servicemanager.te
9
# created by other
domains
. It never passes its own references
tzdatacheck.te
10
# clear that only these
domains
should modify the actual time zone rules data.
/system/sepolicy/prebuilts/api/28.0/private/
binderservicedomain.te
1
# Rules common to all binder service
domains
logpersist.te
3
# android debug log storage in logpersist
domains
(eng and userdebug only)
/system/sepolicy/private/
binderservicedomain.te
1
# Rules common to all binder service
domains
logpersist.te
3
# android debug log storage in logpersist
domains
(eng and userdebug only)
Completed in 818 milliseconds
1
2
3
4
5
6
7
8
9
10
11
>>