• Home
  • Raw
  • Download

Lines Matching refs:domain

10 # Old domain may exec the file and transition to the new domain.
13 # New domain is entered by executing the file.
15 # New domain can send SIGCHLD to its caller.
36 # file_type_trans(domain, dir_type, file_type)
37 # Allow domain to create a file labeled file_type in a
44 # Allow the domain to add entries to the directory.
46 # Allow the domain to create the file.
52 # file_type_auto_trans(domain, dir_type, file_type)
54 # they are created by domain in directories labeled dir_type.
65 # r_dir_file(domain, type)
66 # Allow the specified domain to read directories, files
74 # tmpfs_domain(domain)
76 # this domain when creating tmpfs / shmem / ashmem files.
109 # Mark the server domain as a PDX server.
113 # Allow the server domain to use the endpoint socket and accept connections on it.
117 # Allow the server domain to apply security context label to the channel socket pair (allow process…
119 # Allow the server domain to create a client channel socket.
122 neverallow {domain -$1} pdx_$2_endpoint_socket_type:unix_stream_socket { listen accept };
158 # init_daemon_domain(domain)
159 # Set up a transition from init to the daemon domain
167 # app_domain(domain)
178 # untrusted_app_domain(domain)
185 # net_domain(domain)
192 # bluetooth_domain(domain)
199 # hal_server_domain(domain, hal_type)
200 # Allow a base set of permissions required for a domain to offer a
204 # type hal_foo_default, domain;
214 # hal_client_domain(domain, hal_type)
215 # Allow a base set of permissions required for a domain to be a
238 # passthrough_hal_client_domain(domain, hal_type)
239 # Allow a base set of permissions required for a domain to be a
285 # Allows source domain to set the
296 # Allows source domain to read the
313 # binder_use(domain)
314 # Allow domain to use Binder IPC.
323 # all domains in domain.te.
327 # hwbinder_use(domain)
328 # Allow domain to use HwBinder IPC.
339 # all domains in domain.te.
343 # vndbinder_use(domain)
344 # Allow domain to use Binder IPC.
360 # Call the server domain and optionally transfer references to it.
369 # binder_service(domain)
370 # Mark a domain as being a Binder service domain.
377 # wakelock_use(domain)
378 # Allow domain to manage wake locks
387 # selinux_check_access(domain)
388 # Allow domain to check SELinux permissions via selinuxfs.
397 # selinux_check_context(domain)
398 # Allow domain to check SELinux contexts via selinuxfs.
406 # create_pty(domain)
407 # Allow domain to create and use a pty, isolated from any other domain ptys.
409 # Each domain gets a unique devpts type.
421 # allowed to everyone via domain.te.
488 # write_logd(domain)
497 # read_logd(domain)
506 # read_runtime_log_tags(domain)
513 # control_logd(domain)
523 # use_keystore(domain)
536 # use_drmservice(domain)
546 # add_service(domain, service)
547 # Ability for domain to add a service to service_manager
552 neverallow { domain -$1 } $2:service_manager add;
557 # add_hwservice(domain, service)
558 # Ability for domain to add a service to hwservice_manager
564 neverallow { domain -$1 } $2:hwservice_manager add;