Home
last modified time | relevance | path

Searched refs:domain (Results 1 – 25 of 490) sorted by relevance

12345678910>>...20

/device/google/bonito-sepolicy/vendor/qcom/common/
Dseapp_contexts1 user=system seinfo=platform name=com.google.SSRestartDetector domain=ssr_detector_app type=system_a…
2 user=_app seinfo=platform name=com.android.pixellogger domain=logger_app type=app_data_file levelFr…
3 user=_app seinfo=platform name=com.android.ramdump domain=ramdump_app type=app_data_file levelFrom=…
5 user=_app seinfo=platform name=com.qualcomm.telephony domain=qtelephony type=app_data_file levelFro…
7 #Add new domain for DataServices
9 user=radio seinfo=platform name=.dataservices domain=dataservice_app type=radio_data_file
11 # The default domain for tango_core process
12 user=_app seinfo=tango name=com.google.tango domain=tango_core type=app_data_file levelFrom=user
13 user=_app seinfo=tango name=com.google.tango.* domain=tango_core type=app_data_file levelFrom=user
16 user=_app seinfo=tango name=com.google.tango:app domain=untrusted_app type=app_data_file levelFrom=…
[all …]
Ddomain.te2 # to be created for memory tracking, the domain of
5 allow domain debugfs_kgsl:dir search;
7 allow domain debugfs_ion:dir search;
9 get_prop(domain, public_vendor_default_prop)
10 get_prop(domain, vendor_radio_prop)
Dftmd.te1 type ftmd, domain;
5 # make transition from init to its domain
/device/google/crosshatch-sepolicy/vendor/qcom/common/
Dseapp_contexts1 user=system seinfo=platform name=com.google.SSRestartDetector domain=ssr_detector_app type=system_a…
2 user=_app seinfo=platform name=com.android.pixellogger domain=logger_app type=app_data_file levelFr…
3 user=_app seinfo=platform name=com.android.ramdump domain=ramdump_app type=app_data_file levelFrom=…
5 user=_app seinfo=platform name=com.qualcomm.telephony domain=qtelephony type=app_data_file levelFro…
7 #Add new domain for DataServices
9 user=radio seinfo=platform name=.dataservices domain=dataservice_app type=radio_data_file
11 # The default domain for tango_core process
12 user=_app seinfo=tango name=com.google.tango domain=tango_core type=app_data_file levelFrom=user
13 user=_app seinfo=tango name=com.google.tango.* domain=tango_core type=app_data_file levelFrom=user
16 user=_app seinfo=tango name=com.google.tango:app domain=untrusted_app type=app_data_file levelFrom=…
[all …]
Ddomain.te2 # to be created for memory tracking, the domain of
5 allow domain debugfs_kgsl:dir search;
7 allow domain debugfs_ion:dir search;
9 get_prop(domain, public_vendor_default_prop)
10 get_prop(domain, vendor_radio_prop)
Dftmd.te1 type ftmd, domain;
5 # make transition from init to its domain
/device/google/wahoo/sepolicy/vendor/
Dseapp_contexts1 user=system seinfo=platform name=com.google.SSRestartDetector domain=ssr_detector_app type=system_a…
2 user=_app seinfo=platform name=com.android.pixellogger domain=logger_app type=app_data_file levelFr…
3 user=_app seinfo=platform name=com.android.ramdump domain=ramdump_app type=app_data_file levelFrom=…
4 user=_app seinfo=google name=com.google.mds domain=mds_app type=app_data_file levelFrom=all
7 user=system seinfo=platform name=com.qualcomm.telephony domain=qtelephony type=system_app_data_file
9 # The default domain for tango_core / arcore process
10 user=_app seinfo=tango name=com.google.tango* domain=tango_core type=app_data_file levelFrom=user
11 user=_app seinfo=arcore name=com.google.ar.core* domain=tango_core type=app_data_file levelFrom=user
14 user=_app seinfo=tango name=com.google.tango:app domain=untrusted_app type=app_data_file levelFrom=…
17 user=_app seinfo=platform name=com.google.android.hardwareinfo domain=hardware_info_app type=app_da…
[all …]
Ddomain.te2 # to be created for memory tracking, the domain of
5 allow domain debugfs_kgsl:dir search;
7 allow domain debugfs_ion:dir search;
9 get_prop(domain, public_vendor_default_prop)
10 get_prop(domain, public_vendor_system_prop)
11 get_prop(domain, vendor_radio_prop)
Dcnd.te1 type cnd, domain;
5 # cnd is started by init, type transit from init domain to cnd domain
/device/google/coral-sepolicy/vendor/qcom/common/
Dseapp_contexts2 #user=radio seinfo=platform name=.dataservices domain=dataservice_app type=radio_data_file
3 user=system seinfo=platform name=.dataservices domain=dataservice_app type=system_app_data_file
6 user=_app seinfo=platform name=com.google.android.hardwareinfo domain=hardware_info_app type=app_da…
9 user=_app seinfo=platform name=com.google.android.factoryota domain=factory_ota_app levelFrom=all
11 user=radio isPrivApp=true seinfo=platform name=com.google.RilConfigService domain=ril_config_servic…
13 user=radio seinfo=platform name=.qtidataservices domain=qtidataservices_app type=radio_data_file
16 user=_app isPrivApp=true seinfo=platform name=com.google.android.connectivitymonitor domain=con_mon…
18 user=_app seinfo=platform name=com.qualcomm.qti.services.secureui* domain=secure_ui_service_app lev…
20 # Use a custom domain for GoogleCamera, to allow for Hexagon DSP / Easel access
21 user=_app seinfo=google name=com.google.android.GoogleCamera domain=google_camera_app type=app_data…
[all …]
Dinit_shell.te1 # Restricted domain for shell processes spawned by init.
3 # from an init*.rc file. No service should ever run in this domain.
4 type qti_init_shell, domain;
9 #TODO(b/127313550): move relevant execution from domain qti_init_shell
Dqti_logkit_app.te1 # new qti_logkit_app domain
2 type qti_logkit_app, domain;
Dvppservice.te1 # Define domain
2 type vendor_vppservice, domain;
Dmdm_helper.te2 #mdm_helper - mdm_helper domain
3 type mdm_helper, domain;
Dfidodaemon.te1 type fidodaemon, domain;
4 #Allow for transition from init domain to fidodaemon
Ddtseagleservice.te1 type dtseagleservice, domain;
4 #Allow for transition from init domain to dtseagleservice
Dseemp_health_daemon.te1 type seemp_health_daemon, domain;
4 #Allow for transition from init domain to seemp_health_daemon
Dqseeproxy.te1 type qseeproxy, domain;
4 #Allow for transition from init domain to qseeproxy
/device/google/coral-sepolicy/vendor/google/
Dseapp_contexts2 user=system seinfo=platform name=com.google.SSRestartDetector domain=ssr_detector_app type=system_a…
3 user=_app seinfo=platform name=com.android.ramdump domain=ramdump_app type=app_data_file levelFrom=…
6 user=_app isPrivApp=true seinfo=platform name=com.google.android.grilservice domain=grilservice_app…
9 user=_app seinfo=google name=com.google.mds domain=modem_diagnostic_app type=app_data_file levelFro…
12 user=_app seinfo=platform name=com.android.pixellogger domain=logger_app type=app_data_file levelFr…
15 user=_app seinfo=platform name=com.google.oslo domain=oslo_app type=app_data_file levelFrom=all
18 user=_app seinfo=platform name=com.android.refreshratecontrol domain=refreshrate_app type=app_data_…
21 user=_app seinfo=platform name=com.google.googlecbrs domain=cbrs_setup_app type=app_data_file level…
24 user=_app seinfo=platform name=com.google.android.facedebug domain=face_debug type=app_data_file le…
27 user=_app seinfo=platform name=com.google.touch.touchinspector domain=google_touch_app type=app_dat…
/device/sample/apps/SampleEmailPolicy/src/com/android/email/policy/
DEmailPolicy.java205 String domain = arguments.getString(FIND_PROVIDER); in getPolicy() local
206 if (domain != null) { in getPolicy()
207 domain = domain.toLowerCase(); in getPolicy()
210 if (knownDomain.equals(domain)) { in getPolicy()
/device/generic/goldfish/sepolicy/common/
Dexecns.te2 type execns, domain;
12 #Allow execns itself to be run by init in its own domain
15 # Allow dhcpclient to be run by execns in its own domain
18 # Allow hostapd_nohidl to be run by execns in its own domain
21 # Allow netmgr to be run by execns in its own domain
Ddomain.te1 allow domain qemu_device:chr_file rw_file_perms;
3 get_prop(domain, qemu_prop)
/device/linaro/dragonboard/qcom/pd-mapper/
Dpd-mapper.c50 const char *domain; member
86 strcpy(entry->name, pd_map->domain); in handle_get_domain_list()
87 entry->name_len = strlen(pd_map->domain); in handle_get_domain_list()
131 const char *domain; in pd_load_map() local
145 domain = json_get_string(sr_domain, "domain"); in pd_load_map()
151 if (!soc || !domain || !subdomain) { in pd_load_map()
182 map->domain = malloc(strlen(soc) + strlen(domain) + strlen(subdomain) + 3); in pd_load_map()
183 sprintf((char *)map->domain, "%s/%s/%s", soc, domain, subdomain); in pd_load_map()
/device/google/wahoo/sepolicy/private/
Dseapp_contexts1 #Add new domain for DataServices
3 user=system seinfo=platform name=.dataservices domain=dataservice_app type=system_app_data_file
6 user=_app seinfo=wfcactivation name=com.google.android.wfcactivation domain=wfc_activation_app leve…
/device/google/vrservices/vrcore/sepolicy/
Dseapp_contexts1 # The default domain for vrcore processes.
2 user=_app seinfo=vrcore name=com.google.vr.vrcore* domain=vrcore_app type=app_data_file levelFrom=u…
4 user=_app seinfo=vrcore name=com.google.vr.vrcore:app domain=untrusted_app type=app_data_file level…

12345678910>>...20