Home
last modified time | relevance | path

Searched refs:domain (Results 1 – 25 of 1252) sorted by relevance

12345678910>>...51

/system/sepolicy/prebuilts/api/30.0/private/
Ddomain.te3 # We do not apply this to the su domain to avoid interfering with
5 domain_auto_trans({ domain userdebug_or_eng(`-su') }, crash_dump_exec, crash_dump);
6 allow domain crash_dump:process sigchld;
12 get_prop(domain, heapprofd_prop);
15 domain
35 domain
53 allow domain cgroup:dir search;
54 allow { domain -appdomain -rs } cgroup:dir w_dir_perms;
55 allow { domain -appdomain -rs } cgroup:file w_file_perms;
57 allow domain cgroup_rc_file:dir search;
[all …]
Dbpfloader.te2 type bpfloader, domain;
20 neverallow { domain -init -vendor_init } fs_bpf:dir setattr;
21 neverallow { domain -bpfloader } fs_bpf:dir { write add_name };
22 neverallow domain fs_bpf:dir { reparent rename rmdir };
25 neverallow { domain -bpfloader -init -vendor_init } fs_bpf:file setattr;
26 neverallow { domain -bpfloader } fs_bpf:file create;
27 neverallow domain fs_bpf:file { rename unlink };
29 neverallow { domain -bpfloader } *:bpf { map_create prog_load };
30 neverallow { domain -bpfloader -netd -netutils_wrapper -system_server } *:bpf prog_run;
31 neverallow { domain -bpfloader -netd -system_server } *:bpf { map_read map_write };
[all …]
Dseapp_contexts74 # domain (string)
79 # domain= determines the label to be used for the app process; entries
80 # without domain= are ignored for this purpose.
108 # only the system server can be in system_server domain
109 neverallow isSystemServer=false domain=system_server
110 neverallow isSystemServer="" domain=system_server
113 neverallow user=((?!system).)* domain=system_app
121 # neverallow shared relro to any other domain
123 neverallow user=shared_relro domain=((?!shared_relro).)*
124 neverallow user=((?!shared_relro).)* domain=shared_relro
[all …]
/system/sepolicy/public/
Ddomain.te4 allow domain init:process sigchld;
6 # Intra-domain accesses.
7 allow domain self:process {
24 allow domain self:fd use;
25 allow domain proc:dir r_dir_perms;
26 allow domain proc_net_type:dir search;
27 r_dir_file(domain, self)
28 allow domain self:{ fifo_file file } rw_file_perms;
29 allow domain self:unix_dgram_socket { create_socket_perms sendto };
30 allow domain self:unix_stream_socket { create_stream_socket_perms connectto };
[all …]
/system/sepolicy/prebuilts/api/29.0/private/
Ddomain.te3 # We do not apply this to the su domain to avoid interfering with
5 domain_auto_trans({ domain userdebug_or_eng(`-su') }, crash_dump_exec, crash_dump);
6 allow domain crash_dump:process sigchld;
12 get_prop(domain, heapprofd_prop);
15 domain
32 allow domain cgroup:dir search;
33 allow { domain -appdomain -rs } cgroup:dir w_dir_perms;
34 allow { domain -appdomain -rs } cgroup:file w_file_perms;
36 allow domain cgroup_rc_file:dir search;
37 allow domain cgroup_rc_file:file r_file_perms;
[all …]
Dseapp_contexts74 # domain (string)
79 # domain= determines the label to be used for the app process; entries
80 # without domain= are ignored for this purpose.
108 # only the system server can be in system_server domain
109 neverallow isSystemServer=false domain=system_server
110 neverallow isSystemServer="" domain=system_server
113 neverallow user=((?!system).)* domain=system_app
120 # neverallow shared relro to any other domain
122 neverallow user=shared_relro domain=((?!shared_relro).)*
123 neverallow user=((?!shared_relro).)* domain=shared_relro
[all …]
Dbpfloader.te2 type bpfloader, domain;
20 neverallow { domain -bpfloader } *:bpf { map_create prog_load };
21 neverallow { domain -bpfloader -netd -netutils_wrapper } *:bpf prog_run;
22 neverallow { domain -bpfloader -init } bpfloader_exec:file { execute execute_no_trans };
23 neverallow bpfloader domain:{ tcp_socket udp_socket rawip_socket } *;
25 neverallow { domain -system_server -netd -bpfloader} *:bpf { map_read map_write };
27 # No domain should be allowed to ptrace bpfloader
28 neverallow { domain userdebug_or_eng(`-llkd') } bpfloader:process ptrace;
/system/sepolicy/private/
Ddomain.te3 # We do not apply this to the su domain to avoid interfering with
5 domain_auto_trans({ domain userdebug_or_eng(`-su') }, crash_dump_exec, crash_dump);
6 allow domain crash_dump:process sigchld;
12 get_prop(domain, heapprofd_prop);
15 domain
35 domain
53 allow domain cgroup:dir search;
54 allow { domain -appdomain -rs } cgroup:dir w_dir_perms;
55 allow { domain -appdomain -rs } cgroup:file w_file_perms;
57 allow domain cgroup_rc_file:dir search;
[all …]
Dbpfloader.te2 type bpfloader, domain;
20 neverallow { domain -init -vendor_init } fs_bpf:dir setattr;
21 neverallow { domain -bpfloader } fs_bpf:dir { write add_name };
22 neverallow domain fs_bpf:dir { reparent rename rmdir };
25 neverallow { domain -bpfloader -init -vendor_init } fs_bpf:file setattr;
26 neverallow { domain -bpfloader } fs_bpf:file create;
27 neverallow domain fs_bpf:file { rename unlink };
29 neverallow { domain -bpfloader } *:bpf { map_create prog_load };
30 neverallow { domain -bpfloader -gpuservice -netd -netutils_wrapper -system_server } *:bpf prog_run;
31 neverallow { domain -bpfloader -gpuservice -netd -system_server } *:bpf { map_read map_write };
[all …]
Dseapp_contexts74 # domain (string)
79 # domain= determines the label to be used for the app process; entries
80 # without domain= are ignored for this purpose.
108 # only the system server can be in system_server domain
109 neverallow isSystemServer=false domain=system_server
110 neverallow isSystemServer="" domain=system_server
113 neverallow user=((?!system).)* domain=system_app
121 # neverallow shared relro to any other domain
123 neverallow user=shared_relro domain=((?!shared_relro).)*
124 neverallow user=((?!shared_relro).)* domain=shared_relro
[all …]
Dproperty.te28 # neverallow domain {
35 neverallow { domain -coredomain } {
42 neverallow { domain -coredomain } {
67 neverallow domain property_type:file { ioctl lock };
99 domain
106 dontaudit domain {
118 domain
123 domain
132 domain
152 domain
[all …]
/system/sepolicy/prebuilts/api/30.0/public/
Ddomain.te4 allow domain init:process sigchld;
6 # Intra-domain accesses.
7 allow domain self:process {
24 allow domain self:fd use;
25 allow domain proc:dir r_dir_perms;
26 allow domain proc_net_type:dir search;
27 r_dir_file(domain, self)
28 allow domain self:{ fifo_file file } rw_file_perms;
29 allow domain self:unix_dgram_socket { create_socket_perms sendto };
30 allow domain self:unix_stream_socket { create_stream_socket_perms connectto };
[all …]
/system/sepolicy/prebuilts/api/29.0/public/
Ddomain.te4 allow domain init:process sigchld;
6 # Intra-domain accesses.
7 allow domain self:process {
24 allow domain self:fd use;
25 allow domain proc:dir r_dir_perms;
26 allow domain proc_net_type:dir search;
27 r_dir_file(domain, self)
28 allow domain self:{ fifo_file file } rw_file_perms;
29 allow domain self:unix_dgram_socket { create_socket_perms sendto };
30 allow domain self:unix_stream_socket { create_stream_socket_perms connectto };
[all …]
/system/sepolicy/prebuilts/api/28.0/public/
Ddomain.te4 allow domain init:process sigchld;
6 # Intra-domain accesses.
7 allow domain self:process {
24 allow domain self:fd use;
25 allow domain proc:dir r_dir_perms;
26 allow domain proc_net:dir search;
27 r_dir_file(domain, self)
28 allow domain self:{ fifo_file file } rw_file_perms;
29 allow domain self:unix_dgram_socket { create_socket_perms sendto };
30 allow domain self:unix_stream_socket { create_stream_socket_perms connectto };
[all …]
Dte_macros10 # Old domain may exec the file and transition to the new domain.
13 # New domain is entered by executing the file.
15 # New domain can send SIGCHLD to its caller.
36 # file_type_trans(domain, dir_type, file_type)
37 # Allow domain to create a file labeled file_type in a
44 # Allow the domain to add entries to the directory.
46 # Allow the domain to create the file.
52 # file_type_auto_trans(domain, dir_type, file_type)
54 # they are created by domain in directories labeled dir_type.
65 # r_dir_file(domain, type)
[all …]
/system/sepolicy/prebuilts/api/27.0/public/
Ddomain.te4 allow domain init:process sigchld;
6 # Intra-domain accesses.
7 allow domain self:process {
24 allow domain self:fd use;
25 allow domain proc:dir r_dir_perms;
26 allow domain proc_net:dir search;
27 r_dir_file(domain, self)
28 allow domain self:{ fifo_file file } rw_file_perms;
29 allow domain self:unix_dgram_socket { create_socket_perms sendto };
30 allow domain self:unix_stream_socket { create_stream_socket_perms connectto };
[all …]
Dsu.te3 type su, domain;
10 # after performing an adb root command. The domain definition is
24 dontaudit su domain:process *;
25 dontaudit su domain:fd *;
26 dontaudit su domain:dir *;
27 dontaudit su domain:lnk_file *;
28 dontaudit su domain:{ fifo_file file } *;
29 dontaudit su domain:socket_class_set *;
30 dontaudit su domain:ipc_class_set *;
31 dontaudit su domain:key *;
[all …]
Dte_macros10 # Old domain may exec the file and transition to the new domain.
13 # New domain is entered by executing the file.
15 # New domain can send SIGCHLD to its caller.
36 # file_type_trans(domain, dir_type, file_type)
37 # Allow domain to create a file labeled file_type in a
44 # Allow the domain to add entries to the directory.
46 # Allow the domain to create the file.
52 # file_type_auto_trans(domain, dir_type, file_type)
54 # they are created by domain in directories labeled dir_type.
65 # r_dir_file(domain, type)
[all …]
/system/sepolicy/prebuilts/api/26.0/public/
Ddomain.te4 allow domain init:process sigchld;
6 # Intra-domain accesses.
7 allow domain self:process {
24 allow domain self:fd use;
25 allow domain proc:dir r_dir_perms;
26 allow domain proc_net:dir search;
27 r_dir_file(domain, self)
28 allow domain self:{ fifo_file file } rw_file_perms;
29 allow domain self:unix_dgram_socket { create_socket_perms sendto };
30 allow domain self:unix_stream_socket { create_stream_socket_perms connectto };
[all …]
Dsu.te3 type su, domain;
10 # after performing an adb root command. The domain definition is
24 dontaudit su domain:process *;
25 dontaudit su domain:fd *;
26 dontaudit su domain:dir *;
27 dontaudit su domain:lnk_file *;
28 dontaudit su domain:{ fifo_file file } *;
29 dontaudit su domain:socket_class_set *;
30 dontaudit su domain:ipc_class_set *;
31 dontaudit su domain:key *;
[all …]
Dte_macros10 # Old domain may exec the file and transition to the new domain.
13 # New domain is entered by executing the file.
15 # New domain can send SIGCHLD to its caller.
36 # file_type_trans(domain, dir_type, file_type)
37 # Allow domain to create a file labeled file_type in a
44 # Allow the domain to add entries to the directory.
46 # Allow the domain to create the file.
52 # file_type_auto_trans(domain, dir_type, file_type)
54 # they are created by domain in directories labeled dir_type.
65 # r_dir_file(domain, type)
[all …]
/system/sepolicy/prebuilts/api/28.0/private/
Dseapp_contexts48 # domain (string)
52 # Only entries that specify domain= will be used for app process labeling.
68 # only the system server can be in system_server domain
69 neverallow isSystemServer=false domain=system_server
70 neverallow isSystemServer="" domain=system_server
73 neverallow user=((?!system).)* domain=system_app
80 # neverallow shared relro to any other domain
82 neverallow user=shared_relro domain=((?!shared_relro).)*
83 neverallow user=((?!shared_relro).)* domain=shared_relro
85 # neverallow non-isolated uids into isolated_app domain
[all …]
/system/sepolicy/prebuilts/api/26.0/private/
Dseapp_contexts48 # domain (string)
52 # Only entries that specify domain= will be used for app process labeling.
68 # only the system server can be in system_server domain
69 neverallow isSystemServer=false domain=system_server
70 neverallow isSystemServer="" domain=system_server
73 neverallow user=((?!system).)* domain=system_app
80 # neverallow shared relro to any other domain
82 neverallow user=shared_relro domain=((?!shared_relro).)*
83 neverallow user=((?!shared_relro).)* domain=shared_relro
85 # neverallow non-isolated uids into isolated_app domain
[all …]
/system/sepolicy/prebuilts/api/27.0/private/
Dseapp_contexts48 # domain (string)
52 # Only entries that specify domain= will be used for app process labeling.
68 # only the system server can be in system_server domain
69 neverallow isSystemServer=false domain=system_server
70 neverallow isSystemServer="" domain=system_server
73 neverallow user=((?!system).)* domain=system_app
80 # neverallow shared relro to any other domain
82 neverallow user=shared_relro domain=((?!shared_relro).)*
83 neverallow user=((?!shared_relro).)* domain=shared_relro
85 # neverallow non-isolated uids into isolated_app domain
[all …]
/system/sepolicy/tests/
Dtreble_sepolicy_tests.py88 domain = alldomains[d]
91 if "coredomain" in domain.attributes:
92 domain.coredomain = True
104 if not domain.entrypointpaths:
107 for path in domain.entrypointpaths:
120 domain.error += "Unrecognized entrypoint for " + d + " at " + path + "\n"
122 domain.fromSystem = domain.fromSystem or system
123 domain.fromVendor = domain.fromVendor or vendor
149 for domain in alldomains:
150 for result in pol.QueryTypeAttribute(domain, False):
[all …]

12345678910>>...51