OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
refs:connectto
(Results
26 - 37
of
37
) sorted by null
1
2
/system/sepolicy/prebuilts/api/27.0/private/
app.te
207
# hence no sock_file or
connectto
permission. This appears to be how
336
allow appdomain adbd:unix_stream_socket
connectto
;
access_vectors
279
connectto
/system/sepolicy/prebuilts/api/28.0/public/
app.te
232
# hence no sock_file or
connectto
permission. This appears to be how
354
allow appdomain adbd:unix_stream_socket
connectto
;
/system/sepolicy/public/
app.te
232
# hence no sock_file or
connectto
permission. This appears to be how
354
allow appdomain adbd:unix_stream_socket
connectto
;
/external/selinux/libsepol/tests/policies/test-expander/
small-base.conf
207
connectto
251
connectto
/system/sepolicy/prebuilts/api/26.0/private/
access_vectors
277
connectto
app.te
194
# hence no sock_file or
connectto
permission. This appears to be how
328
allow appdomain adbd:unix_stream_socket
connectto
;
/system/sepolicy/prebuilts/api/28.0/private/
access_vectors
279
connectto
system_server.te
170
allow system_server webview_zygote:unix_stream_socket { read write
connectto
setopt };
705
allow system_server adbd:unix_stream_socket
connectto
;
[
all
...]
/system/sepolicy/private/
access_vectors
279
connectto
system_server.te
170
allow system_server webview_zygote:unix_stream_socket { read write
connectto
setopt };
705
allow system_server adbd:unix_stream_socket
connectto
;
[
all
...]
/external/selinux/libsepol/tests/policies/test-cond/
refpolicy-base.conf
193
connectto
237
connectto
[
all
...]
Completed in 177 milliseconds
1
2