HomeSort by relevance Sort by last modified time
    Searched refs:connectto (Results 26 - 37 of 37) sorted by null

12

  /system/sepolicy/prebuilts/api/27.0/private/
app.te 207 # hence no sock_file or connectto permission. This appears to be how
336 allow appdomain adbd:unix_stream_socket connectto;
access_vectors 279 connectto
  /system/sepolicy/prebuilts/api/28.0/public/
app.te 232 # hence no sock_file or connectto permission. This appears to be how
354 allow appdomain adbd:unix_stream_socket connectto;
  /system/sepolicy/public/
app.te 232 # hence no sock_file or connectto permission. This appears to be how
354 allow appdomain adbd:unix_stream_socket connectto;
  /external/selinux/libsepol/tests/policies/test-expander/
small-base.conf 207 connectto
251 connectto
  /system/sepolicy/prebuilts/api/26.0/private/
access_vectors 277 connectto
app.te 194 # hence no sock_file or connectto permission. This appears to be how
328 allow appdomain adbd:unix_stream_socket connectto;
  /system/sepolicy/prebuilts/api/28.0/private/
access_vectors 279 connectto
system_server.te 170 allow system_server webview_zygote:unix_stream_socket { read write connectto setopt };
705 allow system_server adbd:unix_stream_socket connectto;
    [all...]
  /system/sepolicy/private/
access_vectors 279 connectto
system_server.te 170 allow system_server webview_zygote:unix_stream_socket { read write connectto setopt };
705 allow system_server adbd:unix_stream_socket connectto;
    [all...]
  /external/selinux/libsepol/tests/policies/test-cond/
refpolicy-base.conf 193 connectto
237 connectto
    [all...]

Completed in 177 milliseconds

12