/device/google/bonito-sepolicy/vendor/qcom/common/ |
D | seapp_contexts | 1 user=system seinfo=platform name=com.google.SSRestartDetector domain=ssr_detector_app type=system_a… 2 user=_app seinfo=platform name=com.android.pixellogger domain=logger_app type=app_data_file levelFr… 3 user=_app seinfo=platform name=com.android.ramdump domain=ramdump_app type=app_data_file levelFrom=… 5 user=_app seinfo=platform name=com.qualcomm.telephony domain=qtelephony type=app_data_file levelFro… 7 #Add new domain for DataServices 9 user=radio seinfo=platform name=.dataservices domain=dataservice_app type=radio_data_file 11 # The default domain for tango_core process 12 user=_app seinfo=tango name=com.google.tango domain=tango_core type=app_data_file levelFrom=user 13 user=_app seinfo=tango name=com.google.tango.* domain=tango_core type=app_data_file levelFrom=user 16 user=_app seinfo=tango name=com.google.tango:app domain=untrusted_app type=app_data_file levelFrom=… [all …]
|
D | domain.te | 2 # to be created for memory tracking, the domain of 5 allow domain debugfs_kgsl:dir search; 7 allow domain debugfs_ion:dir search; 9 get_prop(domain, public_vendor_default_prop) 10 get_prop(domain, vendor_radio_prop)
|
D | ftmd.te | 1 type ftmd, domain; 5 # make transition from init to its domain
|
/device/google/crosshatch-sepolicy/vendor/qcom/common/ |
D | seapp_contexts | 1 user=system seinfo=platform name=com.google.SSRestartDetector domain=ssr_detector_app type=system_a… 2 user=_app seinfo=platform name=com.android.pixellogger domain=logger_app type=app_data_file levelFr… 3 user=_app seinfo=platform name=com.android.ramdump domain=ramdump_app type=app_data_file levelFrom=… 5 user=_app seinfo=platform name=com.qualcomm.telephony domain=qtelephony type=app_data_file levelFro… 7 #Add new domain for DataServices 9 user=radio seinfo=platform name=.dataservices domain=dataservice_app type=radio_data_file 11 # The default domain for tango_core process 12 user=_app seinfo=tango name=com.google.tango domain=tango_core type=app_data_file levelFrom=user 13 user=_app seinfo=tango name=com.google.tango.* domain=tango_core type=app_data_file levelFrom=user 16 user=_app seinfo=tango name=com.google.tango:app domain=untrusted_app type=app_data_file levelFrom=… [all …]
|
D | domain.te | 2 # to be created for memory tracking, the domain of 5 allow domain debugfs_kgsl:dir search; 7 allow domain debugfs_ion:dir search; 9 get_prop(domain, public_vendor_default_prop) 10 get_prop(domain, vendor_radio_prop)
|
D | ftmd.te | 1 type ftmd, domain; 5 # make transition from init to its domain
|
/device/google/wahoo/sepolicy/vendor/ |
D | seapp_contexts | 1 user=system seinfo=platform name=com.google.SSRestartDetector domain=ssr_detector_app type=system_a… 2 user=_app seinfo=platform name=com.android.pixellogger domain=logger_app type=app_data_file levelFr… 3 user=_app seinfo=platform name=com.android.ramdump domain=ramdump_app type=app_data_file levelFrom=… 4 user=_app seinfo=google name=com.google.mds domain=mds_app type=app_data_file levelFrom=all 7 user=system seinfo=platform name=com.qualcomm.telephony domain=qtelephony type=system_app_data_file 9 # The default domain for tango_core / arcore process 10 user=_app seinfo=tango name=com.google.tango* domain=tango_core type=app_data_file levelFrom=user 11 user=_app seinfo=arcore name=com.google.ar.core* domain=tango_core type=app_data_file levelFrom=user 14 user=_app seinfo=tango name=com.google.tango:app domain=untrusted_app type=app_data_file levelFrom=… 17 user=_app seinfo=platform name=com.google.android.hardwareinfo domain=hardware_info_app type=app_da… [all …]
|
D | domain.te | 2 # to be created for memory tracking, the domain of 5 allow domain debugfs_kgsl:dir search; 7 allow domain debugfs_ion:dir search; 9 get_prop(domain, public_vendor_default_prop) 10 get_prop(domain, public_vendor_system_prop) 11 get_prop(domain, vendor_radio_prop)
|
D | cnd.te | 1 type cnd, domain; 5 # cnd is started by init, type transit from init domain to cnd domain
|
/device/google/coral-sepolicy/vendor/qcom/common/ |
D | seapp_contexts | 2 #user=radio seinfo=platform name=.dataservices domain=dataservice_app type=radio_data_file 3 user=system seinfo=platform name=.dataservices domain=dataservice_app type=system_app_data_file 6 user=_app seinfo=platform name=com.google.android.hardwareinfo domain=hardware_info_app type=app_da… 9 user=_app seinfo=platform name=com.google.android.factoryota domain=factory_ota_app levelFrom=all 11 user=radio isPrivApp=true seinfo=platform name=com.google.RilConfigService domain=ril_config_servic… 13 user=radio seinfo=platform name=.qtidataservices domain=qtidataservices_app type=radio_data_file 16 user=_app isPrivApp=true seinfo=platform name=com.google.android.connectivitymonitor domain=con_mon… 18 user=_app seinfo=platform name=com.qualcomm.qti.services.secureui* domain=secure_ui_service_app lev… 20 # Use a custom domain for GoogleCamera, to allow for Hexagon DSP / Easel access 21 user=_app seinfo=google name=com.google.android.GoogleCamera domain=google_camera_app type=app_data… [all …]
|
D | init_shell.te | 1 # Restricted domain for shell processes spawned by init. 3 # from an init*.rc file. No service should ever run in this domain. 4 type qti_init_shell, domain; 9 #TODO(b/127313550): move relevant execution from domain qti_init_shell
|
D | qti_logkit_app.te | 1 # new qti_logkit_app domain 2 type qti_logkit_app, domain;
|
D | vppservice.te | 1 # Define domain 2 type vendor_vppservice, domain;
|
D | mdm_helper.te | 2 #mdm_helper - mdm_helper domain 3 type mdm_helper, domain;
|
D | fidodaemon.te | 1 type fidodaemon, domain; 4 #Allow for transition from init domain to fidodaemon
|
D | dtseagleservice.te | 1 type dtseagleservice, domain; 4 #Allow for transition from init domain to dtseagleservice
|
D | seemp_health_daemon.te | 1 type seemp_health_daemon, domain; 4 #Allow for transition from init domain to seemp_health_daemon
|
D | qseeproxy.te | 1 type qseeproxy, domain; 4 #Allow for transition from init domain to qseeproxy
|
/device/google/coral-sepolicy/vendor/google/ |
D | seapp_contexts | 2 user=system seinfo=platform name=com.google.SSRestartDetector domain=ssr_detector_app type=system_a… 3 user=_app seinfo=platform name=com.android.ramdump domain=ramdump_app type=app_data_file levelFrom=… 6 user=_app isPrivApp=true seinfo=platform name=com.google.android.grilservice domain=grilservice_app… 9 user=_app seinfo=google name=com.google.mds domain=modem_diagnostic_app type=app_data_file levelFro… 12 user=_app seinfo=platform name=com.android.pixellogger domain=logger_app type=app_data_file levelFr… 15 user=_app seinfo=platform name=com.google.oslo domain=oslo_app type=app_data_file levelFrom=all 18 user=_app seinfo=platform name=com.android.refreshratecontrol domain=refreshrate_app type=app_data_… 21 user=_app seinfo=platform name=com.google.googlecbrs domain=cbrs_setup_app type=app_data_file level… 24 user=_app seinfo=platform name=com.google.android.facedebug domain=face_debug type=app_data_file le… 27 user=_app seinfo=platform name=com.google.touch.touchinspector domain=google_touch_app type=app_dat…
|
/device/sample/apps/SampleEmailPolicy/src/com/android/email/policy/ |
D | EmailPolicy.java | 205 String domain = arguments.getString(FIND_PROVIDER); in getPolicy() local 206 if (domain != null) { in getPolicy() 207 domain = domain.toLowerCase(); in getPolicy() 210 if (knownDomain.equals(domain)) { in getPolicy()
|
/device/generic/goldfish/sepolicy/common/ |
D | execns.te | 2 type execns, domain; 12 #Allow execns itself to be run by init in its own domain 15 # Allow dhcpclient to be run by execns in its own domain 18 # Allow hostapd_nohidl to be run by execns in its own domain 21 # Allow netmgr to be run by execns in its own domain
|
D | domain.te | 1 allow domain qemu_device:chr_file rw_file_perms; 3 get_prop(domain, qemu_prop)
|
/device/linaro/dragonboard/qcom/pd-mapper/ |
D | pd-mapper.c | 50 const char *domain; member 86 strcpy(entry->name, pd_map->domain); in handle_get_domain_list() 87 entry->name_len = strlen(pd_map->domain); in handle_get_domain_list() 131 const char *domain; in pd_load_map() local 145 domain = json_get_string(sr_domain, "domain"); in pd_load_map() 151 if (!soc || !domain || !subdomain) { in pd_load_map() 182 map->domain = malloc(strlen(soc) + strlen(domain) + strlen(subdomain) + 3); in pd_load_map() 183 sprintf((char *)map->domain, "%s/%s/%s", soc, domain, subdomain); in pd_load_map()
|
/device/google/wahoo/sepolicy/private/ |
D | seapp_contexts | 1 #Add new domain for DataServices 3 user=system seinfo=platform name=.dataservices domain=dataservice_app type=system_app_data_file 6 user=_app seinfo=wfcactivation name=com.google.android.wfcactivation domain=wfc_activation_app leve…
|
/device/google/vrservices/vrcore/sepolicy/ |
D | seapp_contexts | 1 # The default domain for vrcore processes. 2 user=_app seinfo=vrcore name=com.google.vr.vrcore* domain=vrcore_app type=app_data_file levelFrom=u… 4 user=_app seinfo=vrcore name=com.google.vr.vrcore:app domain=untrusted_app type=app_data_file level…
|