Home
last modified time | relevance | path

Searched refs:domain (Results 1 – 25 of 1246) sorted by relevance

12345678910>>...50

/system/sepolicy/prebuilts/api/30.0/private/
Ddomain.te3 # We do not apply this to the su domain to avoid interfering with
5 domain_auto_trans({ domain userdebug_or_eng(`-su') }, crash_dump_exec, crash_dump);
6 allow domain crash_dump:process sigchld;
12 get_prop(domain, heapprofd_prop);
15 domain
35 domain
53 allow domain cgroup:dir search;
54 allow { domain -appdomain -rs } cgroup:dir w_dir_perms;
55 allow { domain -appdomain -rs } cgroup:file w_file_perms;
57 allow domain cgroup_rc_file:dir search;
[all …]
Dbpfloader.te2 type bpfloader, domain;
20 neverallow { domain -init -vendor_init } fs_bpf:dir setattr;
21 neverallow { domain -bpfloader } fs_bpf:dir { write add_name };
22 neverallow domain fs_bpf:dir { reparent rename rmdir };
25 neverallow { domain -bpfloader -init -vendor_init } fs_bpf:file setattr;
26 neverallow { domain -bpfloader } fs_bpf:file create;
27 neverallow domain fs_bpf:file { rename unlink };
29 neverallow { domain -bpfloader } *:bpf { map_create prog_load };
30 neverallow { domain -bpfloader -netd -netutils_wrapper -system_server } *:bpf prog_run;
31 neverallow { domain -bpfloader -netd -system_server } *:bpf { map_read map_write };
[all …]
Dseapp_contexts74 # domain (string)
79 # domain= determines the label to be used for the app process; entries
80 # without domain= are ignored for this purpose.
108 # only the system server can be in system_server domain
109 neverallow isSystemServer=false domain=system_server
110 neverallow isSystemServer="" domain=system_server
113 neverallow user=((?!system).)* domain=system_app
121 # neverallow shared relro to any other domain
123 neverallow user=shared_relro domain=((?!shared_relro).)*
124 neverallow user=((?!shared_relro).)* domain=shared_relro
[all …]
/system/sepolicy/private/
Ddomain.te3 # We do not apply this to the su domain to avoid interfering with
5 domain_auto_trans({ domain userdebug_or_eng(`-su') }, crash_dump_exec, crash_dump);
6 allow domain crash_dump:process sigchld;
12 get_prop(domain, heapprofd_prop);
15 domain
35 domain
53 allow domain cgroup:dir search;
54 allow { domain -appdomain -rs } cgroup:dir w_dir_perms;
55 allow { domain -appdomain -rs } cgroup:file w_file_perms;
57 allow domain cgroup_rc_file:dir search;
[all …]
Dbpfloader.te2 type bpfloader, domain;
20 neverallow { domain -init -vendor_init } fs_bpf:dir setattr;
21 neverallow { domain -bpfloader } fs_bpf:dir { write add_name };
22 neverallow domain fs_bpf:dir { reparent rename rmdir };
25 neverallow { domain -bpfloader -init -vendor_init } fs_bpf:file setattr;
26 neverallow { domain -bpfloader } fs_bpf:file create;
27 neverallow domain fs_bpf:file { rename unlink };
29 neverallow { domain -bpfloader } *:bpf { map_create prog_load };
30 neverallow { domain -bpfloader -netd -netutils_wrapper -system_server } *:bpf prog_run;
31 neverallow { domain -bpfloader -netd -system_server } *:bpf { map_read map_write };
[all …]
Dseapp_contexts74 # domain (string)
79 # domain= determines the label to be used for the app process; entries
80 # without domain= are ignored for this purpose.
108 # only the system server can be in system_server domain
109 neverallow isSystemServer=false domain=system_server
110 neverallow isSystemServer="" domain=system_server
113 neverallow user=((?!system).)* domain=system_app
121 # neverallow shared relro to any other domain
123 neverallow user=shared_relro domain=((?!shared_relro).)*
124 neverallow user=((?!shared_relro).)* domain=shared_relro
[all …]
/system/sepolicy/prebuilts/api/29.0/private/
Ddomain.te3 # We do not apply this to the su domain to avoid interfering with
5 domain_auto_trans({ domain userdebug_or_eng(`-su') }, crash_dump_exec, crash_dump);
6 allow domain crash_dump:process sigchld;
12 get_prop(domain, heapprofd_prop);
15 domain
32 allow domain cgroup:dir search;
33 allow { domain -appdomain -rs } cgroup:dir w_dir_perms;
34 allow { domain -appdomain -rs } cgroup:file w_file_perms;
36 allow domain cgroup_rc_file:dir search;
37 allow domain cgroup_rc_file:file r_file_perms;
[all …]
Dseapp_contexts74 # domain (string)
79 # domain= determines the label to be used for the app process; entries
80 # without domain= are ignored for this purpose.
108 # only the system server can be in system_server domain
109 neverallow isSystemServer=false domain=system_server
110 neverallow isSystemServer="" domain=system_server
113 neverallow user=((?!system).)* domain=system_app
120 # neverallow shared relro to any other domain
122 neverallow user=shared_relro domain=((?!shared_relro).)*
123 neverallow user=((?!shared_relro).)* domain=shared_relro
[all …]
Dbpfloader.te2 type bpfloader, domain;
20 neverallow { domain -bpfloader } *:bpf { map_create prog_load };
21 neverallow { domain -bpfloader -netd -netutils_wrapper } *:bpf prog_run;
22 neverallow { domain -bpfloader -init } bpfloader_exec:file { execute execute_no_trans };
23 neverallow bpfloader domain:{ tcp_socket udp_socket rawip_socket } *;
25 neverallow { domain -system_server -netd -bpfloader} *:bpf { map_read map_write };
27 # No domain should be allowed to ptrace bpfloader
28 neverallow { domain userdebug_or_eng(`-llkd') } bpfloader:process ptrace;
/system/sepolicy/prebuilts/api/30.0/public/
Ddomain.te4 allow domain init:process sigchld;
6 # Intra-domain accesses.
7 allow domain self:process {
24 allow domain self:fd use;
25 allow domain proc:dir r_dir_perms;
26 allow domain proc_net_type:dir search;
27 r_dir_file(domain, self)
28 allow domain self:{ fifo_file file } rw_file_perms;
29 allow domain self:unix_dgram_socket { create_socket_perms sendto };
30 allow domain self:unix_stream_socket { create_stream_socket_perms connectto };
[all …]
/system/sepolicy/public/
Ddomain.te4 allow domain init:process sigchld;
6 # Intra-domain accesses.
7 allow domain self:process {
24 allow domain self:fd use;
25 allow domain proc:dir r_dir_perms;
26 allow domain proc_net_type:dir search;
27 r_dir_file(domain, self)
28 allow domain self:{ fifo_file file } rw_file_perms;
29 allow domain self:unix_dgram_socket { create_socket_perms sendto };
30 allow domain self:unix_stream_socket { create_stream_socket_perms connectto };
[all …]
/system/sepolicy/prebuilts/api/29.0/public/
Ddomain.te4 allow domain init:process sigchld;
6 # Intra-domain accesses.
7 allow domain self:process {
24 allow domain self:fd use;
25 allow domain proc:dir r_dir_perms;
26 allow domain proc_net_type:dir search;
27 r_dir_file(domain, self)
28 allow domain self:{ fifo_file file } rw_file_perms;
29 allow domain self:unix_dgram_socket { create_socket_perms sendto };
30 allow domain self:unix_stream_socket { create_stream_socket_perms connectto };
[all …]
Dte_macros10 # Old domain may exec the file and transition to the new domain.
13 # New domain is entered by executing the file.
15 # New domain can send SIGCHLD to its caller.
36 # file_type_trans(domain, dir_type, file_type)
37 # Allow domain to create a file labeled file_type in a
44 # Allow the domain to add entries to the directory.
46 # Allow the domain to create the file.
52 # file_type_auto_trans(domain, dir_type, file_type)
54 # they are created by domain in directories labeled dir_type.
65 # r_dir_file(domain, type)
[all …]
Dapexd.te2 type apexd, domain;
9 neverallow { domain -init -apexd -system_server } apex_service:service_manager find;
10 neverallow { domain -init -apexd -system_server } apexd:binder call;
12 neverallow { domain userdebug_or_eng(`-crash_dump') } apexd:process ptrace;
15 neverallow { domain -apexd -init } apexd_prop:property_service set;
/system/sepolicy/prebuilts/api/28.0/public/
Ddomain.te4 allow domain init:process sigchld;
6 # Intra-domain accesses.
7 allow domain self:process {
24 allow domain self:fd use;
25 allow domain proc:dir r_dir_perms;
26 allow domain proc_net:dir search;
27 r_dir_file(domain, self)
28 allow domain self:{ fifo_file file } rw_file_perms;
29 allow domain self:unix_dgram_socket { create_socket_perms sendto };
30 allow domain self:unix_stream_socket { create_stream_socket_perms connectto };
[all …]
Dte_macros10 # Old domain may exec the file and transition to the new domain.
13 # New domain is entered by executing the file.
15 # New domain can send SIGCHLD to its caller.
36 # file_type_trans(domain, dir_type, file_type)
37 # Allow domain to create a file labeled file_type in a
44 # Allow the domain to add entries to the directory.
46 # Allow the domain to create the file.
52 # file_type_auto_trans(domain, dir_type, file_type)
54 # they are created by domain in directories labeled dir_type.
65 # r_dir_file(domain, type)
[all …]
/system/sepolicy/prebuilts/api/27.0/public/
Ddomain.te4 allow domain init:process sigchld;
6 # Intra-domain accesses.
7 allow domain self:process {
24 allow domain self:fd use;
25 allow domain proc:dir r_dir_perms;
26 allow domain proc_net:dir search;
27 r_dir_file(domain, self)
28 allow domain self:{ fifo_file file } rw_file_perms;
29 allow domain self:unix_dgram_socket { create_socket_perms sendto };
30 allow domain self:unix_stream_socket { create_stream_socket_perms connectto };
[all …]
Dsu.te3 type su, domain;
10 # after performing an adb root command. The domain definition is
24 dontaudit su domain:process *;
25 dontaudit su domain:fd *;
26 dontaudit su domain:dir *;
27 dontaudit su domain:lnk_file *;
28 dontaudit su domain:{ fifo_file file } *;
29 dontaudit su domain:socket_class_set *;
30 dontaudit su domain:ipc_class_set *;
31 dontaudit su domain:key *;
[all …]
Dte_macros10 # Old domain may exec the file and transition to the new domain.
13 # New domain is entered by executing the file.
15 # New domain can send SIGCHLD to its caller.
36 # file_type_trans(domain, dir_type, file_type)
37 # Allow domain to create a file labeled file_type in a
44 # Allow the domain to add entries to the directory.
46 # Allow the domain to create the file.
52 # file_type_auto_trans(domain, dir_type, file_type)
54 # they are created by domain in directories labeled dir_type.
65 # r_dir_file(domain, type)
[all …]
/system/sepolicy/prebuilts/api/26.0/public/
Ddomain.te4 allow domain init:process sigchld;
6 # Intra-domain accesses.
7 allow domain self:process {
24 allow domain self:fd use;
25 allow domain proc:dir r_dir_perms;
26 allow domain proc_net:dir search;
27 r_dir_file(domain, self)
28 allow domain self:{ fifo_file file } rw_file_perms;
29 allow domain self:unix_dgram_socket { create_socket_perms sendto };
30 allow domain self:unix_stream_socket { create_stream_socket_perms connectto };
[all …]
Dsu.te3 type su, domain;
10 # after performing an adb root command. The domain definition is
24 dontaudit su domain:process *;
25 dontaudit su domain:fd *;
26 dontaudit su domain:dir *;
27 dontaudit su domain:lnk_file *;
28 dontaudit su domain:{ fifo_file file } *;
29 dontaudit su domain:socket_class_set *;
30 dontaudit su domain:ipc_class_set *;
31 dontaudit su domain:key *;
[all …]
Dte_macros10 # Old domain may exec the file and transition to the new domain.
13 # New domain is entered by executing the file.
15 # New domain can send SIGCHLD to its caller.
36 # file_type_trans(domain, dir_type, file_type)
37 # Allow domain to create a file labeled file_type in a
44 # Allow the domain to add entries to the directory.
46 # Allow the domain to create the file.
52 # file_type_auto_trans(domain, dir_type, file_type)
54 # they are created by domain in directories labeled dir_type.
65 # r_dir_file(domain, type)
[all …]
/system/sepolicy/prebuilts/api/28.0/private/
Dseapp_contexts48 # domain (string)
52 # Only entries that specify domain= will be used for app process labeling.
68 # only the system server can be in system_server domain
69 neverallow isSystemServer=false domain=system_server
70 neverallow isSystemServer="" domain=system_server
73 neverallow user=((?!system).)* domain=system_app
80 # neverallow shared relro to any other domain
82 neverallow user=shared_relro domain=((?!shared_relro).)*
83 neverallow user=((?!shared_relro).)* domain=shared_relro
85 # neverallow non-isolated uids into isolated_app domain
[all …]
/system/sepolicy/prebuilts/api/27.0/private/
Dseapp_contexts48 # domain (string)
52 # Only entries that specify domain= will be used for app process labeling.
68 # only the system server can be in system_server domain
69 neverallow isSystemServer=false domain=system_server
70 neverallow isSystemServer="" domain=system_server
73 neverallow user=((?!system).)* domain=system_app
80 # neverallow shared relro to any other domain
82 neverallow user=shared_relro domain=((?!shared_relro).)*
83 neverallow user=((?!shared_relro).)* domain=shared_relro
85 # neverallow non-isolated uids into isolated_app domain
[all …]
/system/sepolicy/prebuilts/api/26.0/private/
Dseapp_contexts48 # domain (string)
52 # Only entries that specify domain= will be used for app process labeling.
68 # only the system server can be in system_server domain
69 neverallow isSystemServer=false domain=system_server
70 neverallow isSystemServer="" domain=system_server
73 neverallow user=((?!system).)* domain=system_app
80 # neverallow shared relro to any other domain
82 neverallow user=shared_relro domain=((?!shared_relro).)*
83 neverallow user=((?!shared_relro).)* domain=shared_relro
85 # neverallow non-isolated uids into isolated_app domain
[all …]

12345678910>>...50