Searched refs:dhcp (Results 1 – 25 of 67) sorted by relevance
123
/system/sepolicy/prebuilts/api/26.0/public/ |
D | dhcp.te | 1 type dhcp, domain; 4 net_domain(dhcp) 6 allow dhcp cgroup:dir { create write add_name }; 7 allow dhcp self:capability { setgid setuid net_admin net_raw net_bind_service }; 8 allow dhcp self:packet_socket create_socket_perms_no_ioctl; 9 allow dhcp self:netlink_route_socket nlmsg_write; 10 allow dhcp shell_exec:file rx_file_perms; 11 allow dhcp system_file:file rx_file_perms; 12 not_full_treble(`allow dhcp vendor_file:file rx_file_perms;') 15 allow dhcp toolbox_exec:file rx_file_perms; [all …]
|
D | dnsmasq.te | 8 # TODO: Run with dhcp group to avoid need for dac_override.
|
/system/sepolicy/prebuilts/api/30.0/public/ |
D | dhcp.te | 1 type dhcp, domain; 4 net_domain(dhcp) 6 allow dhcp cgroup:dir { create write add_name }; 7 allow dhcp self:global_capability_class_set { setgid setuid net_admin net_raw net_bind_service }; 8 allow dhcp self:packet_socket create_socket_perms_no_ioctl; 9 allow dhcp self:netlink_route_socket nlmsg_write; 10 allow dhcp shell_exec:file rx_file_perms; 11 allow dhcp system_file:file rx_file_perms; 12 not_full_treble(`allow dhcp vendor_file:file rx_file_perms;') 15 allow dhcp toolbox_exec:file rx_file_perms; [all …]
|
D | dnsmasq.te | 8 # TODO: Run with dhcp group to avoid need for dac_override.
|
/system/sepolicy/prebuilts/api/27.0/public/ |
D | dhcp.te | 1 type dhcp, domain; 4 net_domain(dhcp) 6 allow dhcp cgroup:dir { create write add_name }; 7 allow dhcp self:capability { setgid setuid net_admin net_raw net_bind_service }; 8 allow dhcp self:packet_socket create_socket_perms_no_ioctl; 9 allow dhcp self:netlink_route_socket nlmsg_write; 10 allow dhcp shell_exec:file rx_file_perms; 11 allow dhcp system_file:file rx_file_perms; 12 not_full_treble(`allow dhcp vendor_file:file rx_file_perms;') 15 allow dhcp toolbox_exec:file rx_file_perms; [all …]
|
D | dnsmasq.te | 8 # TODO: Run with dhcp group to avoid need for dac_override.
|
/system/sepolicy/prebuilts/api/28.0/public/ |
D | dhcp.te | 1 type dhcp, domain; 4 net_domain(dhcp) 6 allow dhcp cgroup:dir { create write add_name }; 7 allow dhcp self:global_capability_class_set { setgid setuid net_admin net_raw net_bind_service }; 8 allow dhcp self:packet_socket create_socket_perms_no_ioctl; 9 allow dhcp self:netlink_route_socket nlmsg_write; 10 allow dhcp shell_exec:file rx_file_perms; 11 allow dhcp system_file:file rx_file_perms; 12 not_full_treble(`allow dhcp vendor_file:file rx_file_perms;') 15 allow dhcp toolbox_exec:file rx_file_perms; [all …]
|
D | dnsmasq.te | 8 # TODO: Run with dhcp group to avoid need for dac_override.
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | dhcp.te | 1 type dhcp, domain; 4 net_domain(dhcp) 6 allow dhcp cgroup:dir { create write add_name }; 7 allow dhcp self:global_capability_class_set { setgid setuid net_admin net_raw net_bind_service }; 8 allow dhcp self:packet_socket create_socket_perms_no_ioctl; 9 allow dhcp self:netlink_route_socket nlmsg_write; 10 allow dhcp shell_exec:file rx_file_perms; 11 allow dhcp system_file:file rx_file_perms; 12 not_full_treble(`allow dhcp vendor_file:file rx_file_perms;') 15 allow dhcp toolbox_exec:file rx_file_perms; [all …]
|
D | dnsmasq.te | 8 # TODO: Run with dhcp group to avoid need for dac_override.
|
/system/sepolicy/prebuilts/api/31.0/public/ |
D | dhcp.te | 1 type dhcp, domain; 4 net_domain(dhcp) 6 allow dhcp cgroup:dir { create write add_name }; 7 allow dhcp cgroup_v2:dir { create write add_name }; 8 allow dhcp self:global_capability_class_set { setgid setuid net_admin net_raw net_bind_service }; 9 allow dhcp self:packet_socket create_socket_perms_no_ioctl; 10 allow dhcp self:netlink_route_socket nlmsg_write; 11 allow dhcp shell_exec:file rx_file_perms; 12 allow dhcp system_file:file rx_file_perms; 13 not_full_treble(`allow dhcp vendor_file:file rx_file_perms;') [all …]
|
D | dnsmasq.te | 8 # TODO: Run with dhcp group to avoid need for dac_override.
|
/system/sepolicy/public/ |
D | dhcp.te | 1 type dhcp, domain; 4 net_domain(dhcp) 6 allow dhcp cgroup:dir { create write add_name }; 7 allow dhcp cgroup_v2:dir { create write add_name }; 8 allow dhcp self:global_capability_class_set { setgid setuid net_admin net_raw net_bind_service }; 9 allow dhcp self:packet_socket create_socket_perms_no_ioctl; 10 allow dhcp self:netlink_route_socket nlmsg_write; 11 allow dhcp shell_exec:file rx_file_perms; 12 allow dhcp system_file:file rx_file_perms; 13 not_full_treble(`allow dhcp vendor_file:file rx_file_perms;') [all …]
|
D | dnsmasq.te | 8 # TODO: Run with dhcp group to avoid need for dac_override.
|
/system/sepolicy/private/ |
D | dhcp.te | 1 typeattribute dhcp coredomain; 3 init_daemon_domain(dhcp) 4 type_transition dhcp system_data_file:{ dir file } dhcp_data_file; 6 set_prop(dhcp, dhcp_prop) 7 set_prop(dhcp, pan_result_prop)
|
/system/sepolicy/prebuilts/api/31.0/private/ |
D | dhcp.te | 1 typeattribute dhcp coredomain; 3 init_daemon_domain(dhcp) 4 type_transition dhcp system_data_file:{ dir file } dhcp_data_file; 6 set_prop(dhcp, dhcp_prop) 7 set_prop(dhcp, pan_result_prop)
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | dhcp.te | 1 typeattribute dhcp coredomain; 2 typeattribute dhcp domain_deprecated; 4 init_daemon_domain(dhcp) 5 type_transition dhcp system_data_file:{ dir file } dhcp_data_file;
|
D | property_contexts | 29 dhcp. u:object_r:dhcp_prop:s0 30 dhcp.bt-pan.result u:object_r:pan_result_prop:s0
|
/system/sepolicy/prebuilts/api/27.0/private/ |
D | dhcp.te | 1 typeattribute dhcp coredomain; 2 typeattribute dhcp domain_deprecated; 4 init_daemon_domain(dhcp) 5 type_transition dhcp system_data_file:{ dir file } dhcp_data_file;
|
D | property_contexts | 29 dhcp. u:object_r:dhcp_prop:s0 30 dhcp.bt-pan.result u:object_r:pan_result_prop:s0
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | dhcp.te | 1 typeattribute dhcp coredomain; 3 init_daemon_domain(dhcp) 4 type_transition dhcp system_data_file:{ dir file } dhcp_data_file;
|
/system/sepolicy/prebuilts/api/28.0/private/ |
D | dhcp.te | 1 typeattribute dhcp coredomain; 3 init_daemon_domain(dhcp) 4 type_transition dhcp system_data_file:{ dir file } dhcp_data_file;
|
D | property_contexts | 29 dhcp. u:object_r:dhcp_prop:s0 30 dhcp.bt-pan.result u:object_r:pan_result_prop:s0
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | dhcp.te | 1 typeattribute dhcp coredomain; 3 init_daemon_domain(dhcp) 4 type_transition dhcp system_data_file:{ dir file } dhcp_data_file;
|
/system/core/libnetutils/ |
D | packet.c | 160 struct dhcp_msg dhcp; in receive_packet() member 250 memcpy(msg, &packet.dhcp, dhcp_size); in receive_packet()
|
123