Home
last modified time | relevance | path

Searched refs:domain (Results 1 – 25 of 1883) sorted by relevance

12345678910>>...76

/system/bpf/libbpf_android/include/
Dlibbpf_android.h40 enum class domain : int { enum
54 static constexpr domain AllDomains[] = {
55 domain::unspecified,
56 domain::platform,
57 domain::tethering,
58 domain::net_private,
59 domain::net_shared,
60 domain::netd_readonly,
61 domain::netd_shared,
62 domain::vendor,
[all …]
/system/sepolicy/microdroid/system/private/
Ddomain.te4 allow domain init:process sigchld;
6 # Intra-domain accesses.
7 allow domain self:process {
24 allow domain self:fd use;
25 allow domain proc:dir r_dir_perms;
26 allow domain proc_net_type:dir search;
27 r_dir_file(domain, self)
28 allow domain self:{ fifo_file file } rw_file_perms;
29 allow domain self:unix_dgram_socket { create_socket_perms sendto };
30 allow domain self:unix_stream_socket { create_stream_socket_perms connectto };
[all …]
/system/sepolicy/prebuilts/api/34.0/private/
Dproperty.te67 neverallow domain {
75 neverallow { domain -coredomain } {
82 neverallow { domain -coredomain } {
107 neverallow domain property_type:file { ioctl lock };
138 domain
145 dontaudit domain {
157 domain
163 domain
168 domain
177 domain
[all …]
Ddomain.te3 # We do not apply this to the su domain to avoid interfering with
5 domain_auto_trans({ domain userdebug_or_eng(`-su') }, crash_dump_exec, crash_dump);
6 allow domain crash_dump:process sigchld;
12 get_prop(domain, heapprofd_prop);
16 domain
57 r_dir_file(domain, sysfs_fs_incfs_features);
60 r_dir_file(domain, sysfs_fs_fuse_features);
63 allow domain cgroup:dir search;
64 allow { domain -appdomain -rs } cgroup:dir w_dir_perms;
65 allow { domain -appdomain -rs } cgroup:file w_file_perms;
[all …]
Dbpfloader.te32 neverallow { domain } bpffs_type:dir ~{ add_name create getattr mounton remove_name sear…
33 neverallow { domain -bpfloader } bpffs_type:dir { add_name create remove_name write };
35 neverallow { domain } bpffs_type:file ~{ create getattr map open read rename setattr wri…
36 neverallow { domain -bpfloader } bpffs_type:file { create map open rename setattr };
37 neverallow { domain -bpfloader -gpuservice -lmkd -mediaprovider_app -netd -netutils_wrapper …
38 neverallow { domain -bpfloader …
39 neverallow { domain -bpfloader -networ…
40 neverallow { domain -bpfloader -networ…
41 neverallow { domain -bpfloader -netd -networ…
42 neverallow { domain -bpfloader -netd -netutils_wrapper -networ…
[all …]
Dseapp_contexts46 # restricted to run in an isolated_app domain. Processes match this selector will
80 # domain (string)
85 # domain= determines the label to be used for the app process; entries
86 # without domain= are ignored for this purpose.
116 neverallow isSystemServer=false domain=system_server
117 neverallow isSystemServer=false domain=system_server_startup
118 neverallow isSystemServer="" domain=system_server
119 neverallow isSystemServer="" domain=system_server_startup
122 neverallow user=((?!system).)* domain=system_app
130 # neverallow shared relro to any other domain
[all …]
/system/sepolicy/private/
Dproperty.te67 neverallow domain {
75 neverallow { domain -coredomain } {
82 neverallow { domain -coredomain } {
107 neverallow domain property_type:file { ioctl lock };
138 domain
145 dontaudit domain {
157 domain
163 domain
168 domain
177 domain
[all …]
Ddomain.te3 # We do not apply this to the su domain to avoid interfering with
5 domain_auto_trans({ domain userdebug_or_eng(`-su') }, crash_dump_exec, crash_dump);
6 allow domain crash_dump:process sigchld;
12 get_prop(domain, heapprofd_prop);
16 domain
57 r_dir_file(domain, sysfs_fs_incfs_features);
60 r_dir_file(domain, sysfs_fs_fuse_features);
63 allow domain cgroup:dir search;
64 allow { domain -appdomain -rs } cgroup:dir w_dir_perms;
65 allow { domain -appdomain -rs } cgroup:file w_file_perms;
[all …]
Dbpfloader.te32 neverallow { domain } bpffs_type:dir ~{ add_name create getattr mounton remove_name sear…
33 neverallow { domain -bpfloader } bpffs_type:dir { add_name create remove_name write };
35 neverallow { domain } bpffs_type:file ~{ create getattr map open read rename setattr wri…
36 neverallow { domain -bpfloader } bpffs_type:file { create map open rename setattr };
37 neverallow { domain -bpfloader -gpuservice -lmkd -mediaprovider_app -netd -netutils_wrapper …
38 neverallow { domain -bpfloader …
39 neverallow { domain -bpfloader -networ…
40 neverallow { domain -bpfloader -networ…
41 neverallow { domain -bpfloader -netd -networ…
42 neverallow { domain -bpfloader -netd -netutils_wrapper -networ…
[all …]
Dseapp_contexts46 # restricted to run in an isolated_app domain. Processes match this selector will
80 # domain (string)
85 # domain= determines the label to be used for the app process; entries
86 # without domain= are ignored for this purpose.
116 neverallow isSystemServer=false domain=system_server
117 neverallow isSystemServer=false domain=system_server_startup
118 neverallow isSystemServer="" domain=system_server
119 neverallow isSystemServer="" domain=system_server_startup
122 neverallow user=((?!system).)* domain=system_app
130 # neverallow shared relro to any other domain
[all …]
/system/sepolicy/prebuilts/api/31.0/private/
Dproperty.te49 neverallow domain {
57 neverallow { domain -coredomain } {
64 neverallow { domain -coredomain } {
89 neverallow domain property_type:file { ioctl lock };
120 domain
127 dontaudit domain {
139 domain
144 domain
153 domain
172 domain
[all …]
Ddomain.te3 # We do not apply this to the su domain to avoid interfering with
5 domain_auto_trans({ domain userdebug_or_eng(`-su') }, crash_dump_exec, crash_dump);
6 allow domain crash_dump:process sigchld;
12 get_prop(domain, heapprofd_prop);
15 domain
35 domain
53 r_dir_file(domain, sysfs_fs_incfs_features);
56 allow domain cgroup:dir search;
57 allow { domain -appdomain -rs } cgroup:dir w_dir_perms;
58 allow { domain -appdomain -rs } cgroup:file w_file_perms;
[all …]
/system/sepolicy/prebuilts/api/32.0/private/
Dproperty.te50 neverallow domain {
58 neverallow { domain -coredomain } {
65 neverallow { domain -coredomain } {
90 neverallow domain property_type:file { ioctl lock };
121 domain
128 dontaudit domain {
140 domain
145 domain
154 domain
173 domain
[all …]
Ddomain.te3 # We do not apply this to the su domain to avoid interfering with
5 domain_auto_trans({ domain userdebug_or_eng(`-su') }, crash_dump_exec, crash_dump);
6 allow domain crash_dump:process sigchld;
12 get_prop(domain, heapprofd_prop);
15 domain
35 domain
53 r_dir_file(domain, sysfs_fs_incfs_features);
56 allow domain cgroup:dir search;
57 allow { domain -appdomain -rs } cgroup:dir w_dir_perms;
58 allow { domain -appdomain -rs } cgroup:file w_file_perms;
[all …]
/system/sepolicy/prebuilts/api/33.0/private/
Dproperty.te60 neverallow domain {
68 neverallow { domain -coredomain } {
75 neverallow { domain -coredomain } {
100 neverallow domain property_type:file { ioctl lock };
132 domain
139 dontaudit domain {
151 domain
156 domain
165 domain
184 domain
[all …]
/system/sepolicy/prebuilts/api/33.0/public/
Ddomain.te4 allow domain init:process sigchld;
6 # Intra-domain accesses.
7 allow domain self:process {
24 allow domain self:fd use;
25 allow domain proc:dir r_dir_perms;
26 allow domain proc_net_type:dir search;
27 r_dir_file(domain, self)
28 allow domain self:{ fifo_file file } rw_file_perms;
29 allow domain self:unix_dgram_socket { create_socket_perms sendto };
30 allow domain self:unix_stream_socket { create_stream_socket_perms connectto };
[all …]
/system/sepolicy/prebuilts/api/31.0/public/
Ddomain.te4 allow domain init:process sigchld;
6 # Intra-domain accesses.
7 allow domain self:process {
24 allow domain self:fd use;
25 allow domain proc:dir r_dir_perms;
26 allow domain proc_net_type:dir search;
27 r_dir_file(domain, self)
28 allow domain self:{ fifo_file file } rw_file_perms;
29 allow domain self:unix_dgram_socket { create_socket_perms sendto };
30 allow domain self:unix_stream_socket { create_stream_socket_perms connectto };
[all …]
/system/sepolicy/prebuilts/api/32.0/public/
Ddomain.te4 allow domain init:process sigchld;
6 # Intra-domain accesses.
7 allow domain self:process {
24 allow domain self:fd use;
25 allow domain proc:dir r_dir_perms;
26 allow domain proc_net_type:dir search;
27 r_dir_file(domain, self)
28 allow domain self:{ fifo_file file } rw_file_perms;
29 allow domain self:unix_dgram_socket { create_socket_perms sendto };
30 allow domain self:unix_stream_socket { create_stream_socket_perms connectto };
[all …]
/system/sepolicy/prebuilts/api/30.0/private/
Ddomain.te3 # We do not apply this to the su domain to avoid interfering with
5 domain_auto_trans({ domain userdebug_or_eng(`-su') }, crash_dump_exec, crash_dump);
6 allow domain crash_dump:process sigchld;
12 get_prop(domain, heapprofd_prop);
15 domain
35 domain
53 allow domain cgroup:dir search;
54 allow { domain -appdomain -rs } cgroup:dir w_dir_perms;
55 allow { domain -appdomain -rs } cgroup:file w_file_perms;
57 allow domain cgroup_rc_file:dir search;
[all …]
Dbpfloader.te2 type bpfloader, domain;
20 neverallow { domain -init -vendor_init } fs_bpf:dir setattr;
21 neverallow { domain -bpfloader } fs_bpf:dir { write add_name };
22 neverallow domain fs_bpf:dir { reparent rename rmdir };
25 neverallow { domain -bpfloader -init -vendor_init } fs_bpf:file setattr;
26 neverallow { domain -bpfloader } fs_bpf:file create;
27 neverallow domain fs_bpf:file { rename unlink };
29 neverallow { domain -bpfloader } *:bpf { map_create prog_load };
30 neverallow { domain -bpfloader -netd -netutils_wrapper -system_server } *:bpf prog_run;
31 neverallow { domain -bpfloader -netd -system_server } *:bpf { map_read map_write };
[all …]
/system/sepolicy/prebuilts/api/29.0/private/
Ddomain.te3 # We do not apply this to the su domain to avoid interfering with
5 domain_auto_trans({ domain userdebug_or_eng(`-su') }, crash_dump_exec, crash_dump);
6 allow domain crash_dump:process sigchld;
12 get_prop(domain, heapprofd_prop);
15 domain
32 allow domain cgroup:dir search;
33 allow { domain -appdomain -rs } cgroup:dir w_dir_perms;
34 allow { domain -appdomain -rs } cgroup:file w_file_perms;
36 allow domain cgroup_rc_file:dir search;
37 allow domain cgroup_rc_file:file r_file_perms;
[all …]
/system/sepolicy/prebuilts/api/30.0/public/
Ddomain.te4 allow domain init:process sigchld;
6 # Intra-domain accesses.
7 allow domain self:process {
24 allow domain self:fd use;
25 allow domain proc:dir r_dir_perms;
26 allow domain proc_net_type:dir search;
27 r_dir_file(domain, self)
28 allow domain self:{ fifo_file file } rw_file_perms;
29 allow domain self:unix_dgram_socket { create_socket_perms sendto };
30 allow domain self:unix_stream_socket { create_stream_socket_perms connectto };
[all …]
/system/sepolicy/prebuilts/api/29.0/public/
Ddomain.te4 allow domain init:process sigchld;
6 # Intra-domain accesses.
7 allow domain self:process {
24 allow domain self:fd use;
25 allow domain proc:dir r_dir_perms;
26 allow domain proc_net_type:dir search;
27 r_dir_file(domain, self)
28 allow domain self:{ fifo_file file } rw_file_perms;
29 allow domain self:unix_dgram_socket { create_socket_perms sendto };
30 allow domain self:unix_stream_socket { create_stream_socket_perms connectto };
[all …]
/system/sepolicy/public/
Ddomain.te4 allow domain init:process sigchld;
6 # Intra-domain accesses.
7 allow domain self:process {
24 allow domain self:fd use;
25 allow domain proc:dir r_dir_perms;
26 allow domain proc_net_type:dir search;
27 r_dir_file(domain, self)
28 allow domain self:{ fifo_file file } rw_file_perms;
29 allow domain self:unix_dgram_socket { create_socket_perms sendto };
30 allow domain self:unix_stream_socket { create_stream_socket_perms connectto };
[all …]
/system/sepolicy/prebuilts/api/34.0/public/
Ddomain.te4 allow domain init:process sigchld;
6 # Intra-domain accesses.
7 allow domain self:process {
24 allow domain self:fd use;
25 allow domain proc:dir r_dir_perms;
26 allow domain proc_net_type:dir search;
27 r_dir_file(domain, self)
28 allow domain self:{ fifo_file file } rw_file_perms;
29 allow domain self:unix_dgram_socket { create_socket_perms sendto };
30 allow domain self:unix_stream_socket { create_stream_socket_perms connectto };
[all …]

12345678910>>...76