Searched refs:allow (Results 1 - 25 of 319) sorted by relevance

1234567891011>>

/external/sepolicy/
H A Dsystem_server.te11 allow system_server self:process execmem;
12 allow system_server ashmem_device:chr_file execute;
13 allow system_server system_server_tmpfs:file execute;
16 allow system_server dalvikcache_data_file:file execute;
19 allow system_server resourcecache_data_file:file r_file_perms;
20 allow system_server resourcecache_data_file:dir r_dir_perms;
23 allow system_server self:process ptrace;
26 allow system_server zygote:fd use;
27 allow system_server zygote:process sigchld;
28 allow system_serve
[all...]
H A Dplatform_app.te12 allow platform_app shell_data_file:dir search;
13 allow platform_app shell_data_file:file { open getattr read };
16 allow platform_app { apk_tmp_file apk_private_tmp_file }:dir rw_dir_perms;
17 allow platform_app { apk_tmp_file apk_private_tmp_file }:file rw_file_perms;
18 allow platform_app apk_private_data_file:dir search;
20 allow platform_app asec_apk_file:dir create_dir_perms;
21 allow platform_app asec_apk_file:file create_file_perms;
24 allow platform_app media_rw_data_file:dir create_dir_perms;
25 allow platform_app media_rw_data_file:file create_file_perms;
28 allow platform_ap
[all...]
H A Dsystem_app.te12 allow system_app system_app_data_file:dir create_dir_perms;
13 allow system_app system_app_data_file:file create_file_perms;
16 allow system_app keychain_data_file:dir r_dir_perms;
17 allow system_app keychain_data_file:file r_file_perms;
21 allow system_app system_data_file:dir create_dir_perms;
22 allow system_app system_data_file:file create_file_perms;
23 allow system_app misc_user_data_file:dir create_dir_perms;
24 allow system_app misc_user_data_file:file create_file_perms;
31 allow system_app wallpaper_file:file r_file_perms;
35 allow system_ap
[all...]
H A Dtee.te10 allow tee self:capability { dac_override };
11 allow tee tee_device:chr_file rw_file_perms;
12 allow tee tee_data_file:dir rw_dir_perms;
13 allow tee tee_data_file:file create_file_perms;
14 allow tee self:netlink_socket create_socket_perms;
H A Dunconfined.te19 allow unconfineddomain self:capability ~{ sys_ptrace sys_rawio mknod sys_module audit_write audit_control linux_immutable };
20 allow unconfineddomain self:capability2 ~{ mac_override mac_admin };
21 allow unconfineddomain kernel:security ~{ load_policy setenforce setcheckreqprot setbool setsecparam };
22 allow unconfineddomain kernel:system ~{ syslog_read syslog_mod syslog_console };
23 allow unconfineddomain domain:fd *;
24 allow unconfineddomain domain:dir r_dir_perms;
25 allow unconfineddomain domain:lnk_file r_file_perms;
26 allow unconfineddomain domain:{ fifo_file file } rw_file_perms;
27 allow unconfineddomain domain:{
45 allow unconfineddomai
[all...]
H A Duntrusted_app.te30 allow untrusted_app app_data_file:file { rx_file_perms execmod };
32 allow untrusted_app tun_device:chr_file rw_file_perms;
35 allow untrusted_app asec_apk_file:file r_file_perms;
37 allow untrusted_app asec_public_file:file { execute execmod };
47 allow untrusted_app shell_data_file:file r_file_perms;
48 allow untrusted_app shell_data_file:dir r_dir_perms;
56 allow untrusted_app anr_data_file:file r_file_perms;
64 allow untrusted_app mtp_device:chr_file rw_file_perms;
67 allow untrusted_app media_rw_data_file:dir create_dir_perms;
68 allow untrusted_ap
[all...]
H A Dapp.te11 allow appdomain self:process execmem;
12 allow appdomain ashmem_device:chr_file execute;
15 allow appdomain zygote:fd use;
19 allow appdomain zygote_exec:file rx_file_perms;
22 allow appdomain self:process ptrace;
25 allow appdomain zygote_tmpfs:file read;
28 allow appdomain zygote:process sigchld;
31 allow appdomain shell:process sigchld;
32 allow appdomain adbd:process sigchld;
35 allow appdomai
[all...]
H A Disolated_app.te18 # Needed to allow dlopen() from Chrome renderer processes.
20 allow isolated_app app_data_file:file execute;
/external/wpa_supplicant_8/wpa_supplicant/dbus/
H A Ddbus-wpa_supplicant.conf6 <allow own="fi.epitest.hostap.WPASupplicant"/>
8 <allow send_destination="fi.epitest.hostap.WPASupplicant"/>
9 <allow send_interface="fi.epitest.hostap.WPASupplicant"/>
11 <allow own="fi.w1.wpa_supplicant1"/>
13 <allow send_destination="fi.w1.wpa_supplicant1"/>
14 <allow send_interface="fi.w1.wpa_supplicant1"/>
15 <allow receive_sender="fi.w1.wpa_supplicant1" receive_type="signal"/>
/external/libsepol/tests/policies/test-deps/
H A Dmodreq-role-global.conf12 allow role_req_r user_r;
H A Dmodreq-bool-global.conf14 allow a_t b_t : file { read write };
H A Dmodreq-obj-global.conf12 allow mod_foo_t mod_bar_t : sem { create destroy };
H A Dmodreq-perm-global.conf10 allow a_t b_t: msg { send receive };
H A Dmodreq-role-opt.conf16 allow role_req_r user_r;
H A Dmodreq-type-global.conf12 allow test_t type_req_t : file { read write };
H A Dmodreq-type-opt.conf15 allow type_req_t file_t : file { read write };
H A Dmodule.conf15 allow system_t file_t : file { read write };
19 allow sysadm_t file_t : file { read write };
H A Dmodreq-bool-opt.conf20 allow a_t b_t : file { read write };
H A Dmodreq-obj-opt.conf19 allow mod_foo_t mod_bar_t : sem { create destroy };
H A Dmodreq-perm-opt.conf17 allow a_mod_t b_mod_t: msg { send receive };
/external/dnsmasq/dbus/
H A Ddnsmasq.conf6 <allow own="uk.org.thekelleys.dnsmasq"/>
7 <allow send_destination="uk.org.thekelleys.dnsmasq"/>
/external/nist-sip/java/gov/nist/javax/sip/parser/
H A DAllowParser.java45 * @param allow the header to parse
47 public AllowParser(String allow) { argument
48 super(allow);
73 Allow allow = new Allow();
74 allow.setHeaderName(SIPHeaderNames.ALLOW);
79 allow.setMethod(token.getTokenValue());
81 list.add(allow);
87 allow = new Allow();
90 allow.setMethod(token.getTokenValue());
92 list.add(allow);
[all...]
/external/chromium_org/chrome/browser/chromeos/dbus/
H A Dorg.chromium.LibCrosService.conf12 <allow own="org.chromium.LibCrosService"/>
13 <allow receive_sender="org.chromium.LibCrosService"/>
14 <allow send_destination="org.chromium.LibCrosService"/>
19 <allow send_destination="org.chromium.LibCrosService"/>
24 <allow send_destination="org.chromium.LibCrosService"/>
29 <allow send_destination="org.chromium.LibCrosService"/>
34 <allow send_destination="org.chromium.LibCrosService"/>
/external/libsepol/tests/policies/test-cond/
H A Drefpolicy-base.conf977 allow bin_t fs_t:filesystem associate;
978 allow bin_t noxattrfs:filesystem associate;
980 allow sbin_t fs_t:filesystem associate;
981 allow sbin_t noxattrfs:filesystem associate;
983 allow ls_exec_t fs_t:filesystem associate;
984 allow ls_exec_t noxattrfs:filesystem associate;
987 allow shell_exec_t fs_t:filesystem associate;
988 allow shell_exec_t noxattrfs:filesystem associate;
990 allow chroot_exec_t fs_t:filesystem associate;
991 allow chroot_exec_
[all...]
/external/chromium_org/chrome/browser/download/
H A Ddownload_resource_throttle.cc63 void DownloadResourceThrottle::ContinueDownload(bool allow) { argument
65 request_allowed_ = allow;
67 if (allow) {
77 if (allow) {

Completed in 8089 milliseconds

1234567891011>>