HomeSort by relevance Sort by last modified time
    Searched full:domains (Results 76 - 100 of 985) sorted by null

1 2 34 5 6 7 8 91011>>

  /system/netd/server/
ResolverController.h 69 std::vector<std::string>* domains, __res_params* params,
75 const std::vector<std::string>& domains, const std::vector<int32_t>& params,
80 std::vector<std::string>* domains, std::vector<int32_t>* params,
  /system/sepolicy/prebuilts/api/28.0/public/
domain.te 1 # Rules for all domains.
67 # /dev/binder can be accessed by non-vendor domains and by apps
168 # All domains are allowed to open and read directories
182 # All domains get access to /vendor/etc
187 # Allow all domains to be able to follow /system/vendor and/or
196 # Allow reading and executing out of /vendor to all vendor domains
260 # Restrict all domains to a whitelist for common socket types. Additional
261 # ioctl commands may be added to individual domains, but this sets safe
306 # Limit device node creation to these whitelisted domains.
315 # Limit raw I/O to these whitelisted domains. Do not apply to debug builds
    [all...]
hal_wifi_supplicant.te 8 # in addition to ioctls whitelisted for all domains, grant hal_wifi_supplicant priv_sock_ioctls.
servicemanager.te 9 # created by other domains. It never passes its own references
tzdatacheck.te 10 # clear that only these domains should modify the actual time zone rules data.
  /system/sepolicy/public/
domain.te 1 # Rules for all domains.
67 # /dev/binder can be accessed by non-vendor domains and by apps
168 # All domains are allowed to open and read directories
182 # All domains get access to /vendor/etc
187 # Allow all domains to be able to follow /system/vendor and/or
196 # Allow reading and executing out of /vendor to all vendor domains
260 # Restrict all domains to a whitelist for common socket types. Additional
261 # ioctl commands may be added to individual domains, but this sets safe
306 # Limit device node creation to these whitelisted domains.
315 # Limit raw I/O to these whitelisted domains. Do not apply to debug builds
    [all...]
hal_wifi_supplicant.te 8 # in addition to ioctls whitelisted for all domains, grant hal_wifi_supplicant priv_sock_ioctls.
  /external/autotest/client/site_tests/policy_PluginsAllowedForUrls/
control.sitenotallowed_block 18 policy PluginsAllowedForUrls contains URLs whose domains do not match the page
  /external/autotest/client/site_tests/policy_PluginsBlockedForUrls/
control.sitenotblocked_run 18 policy PluginsBlockedForUrls contains URLs whose domains do not match the page
  /external/libjpeg-turbo/release/
Distribution.xml 7 <domains
  /external/selinux/libselinux/man/man3/
is_context_customizable.3 14 administrators set on files, usually to allow certain domains to share the file content. restorecon and setfiles, by default, leave these context in place.
  /external/selinux/python/sepolicy/
sepolicy-manpage.8 16 Generate Man Pages for All Domains
sepolicy-transition.8 14 sepolicy transition will show all domains that a give SELinux source domain can transition to, including the entrypoint.
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/include/cloog/
union_domain.h 24 * A structure representing the input domains and scattering functions.
  /system/sepolicy/prebuilts/api/26.0/private/
binderservicedomain.te 1 # Rules common to all binder service domains
logpersist.te 3 # android debug log storage in logpersist domains (eng and userdebug only)
  /system/sepolicy/prebuilts/api/26.0/public/
servicemanager.te 9 # created by other domains. It never passes its own references
  /system/sepolicy/prebuilts/api/27.0/private/
binderservicedomain.te 1 # Rules common to all binder service domains
logpersist.te 3 # android debug log storage in logpersist domains (eng and userdebug only)
  /system/sepolicy/prebuilts/api/27.0/public/
servicemanager.te 9 # created by other domains. It never passes its own references
tzdatacheck.te 10 # clear that only these domains should modify the actual time zone rules data.
  /system/sepolicy/prebuilts/api/28.0/private/
binderservicedomain.te 1 # Rules common to all binder service domains
logpersist.te 3 # android debug log storage in logpersist domains (eng and userdebug only)
  /system/sepolicy/private/
binderservicedomain.te 1 # Rules common to all binder service domains
logpersist.te 3 # android debug log storage in logpersist domains (eng and userdebug only)

Completed in 818 milliseconds

1 2 34 5 6 7 8 91011>>