Lines Matching refs:domain
3 # We do not apply this to the su domain to avoid interfering with
5 domain_auto_trans({ domain userdebug_or_eng(`-su') }, crash_dump_exec, crash_dump);
6 allow domain crash_dump:process sigchld;
12 get_prop(domain, heapprofd_prop);
15 domain
35 domain
53 allow domain cgroup:dir search;
54 allow { domain -appdomain -rs } cgroup:dir w_dir_perms;
55 allow { domain -appdomain -rs } cgroup:file w_file_perms;
57 allow domain cgroup_rc_file:dir search;
58 allow domain cgroup_rc_file:file r_file_perms;
59 allow domain task_profiles_file:file r_file_perms;
60 allow domain vendor_task_profiles_file:file r_file_perms;
64 get_prop(domain, use_memfd_prop);
67 get_prop(domain, module_sdkextensions_prop)
70 get_prop(domain, bq_config_prop);
75 get_prop(domain, core_property_type)
76 get_prop(domain, exported_dalvik_prop)
77 get_prop(domain, exported_ffs_prop)
78 get_prop(domain, exported_system_radio_prop)
79 get_prop(domain, exported2_config_prop)
80 get_prop(domain, exported2_radio_prop)
81 get_prop(domain, exported2_system_prop)
82 get_prop(domain, exported2_vold_prop)
83 get_prop(domain, exported3_default_prop)
84 get_prop(domain, exported3_radio_prop)
85 get_prop(domain, exported3_system_prop)
86 get_prop(domain, vendor_default_prop)
105 get_prop({domain -coredomain -appdomain}, vendor_default_prop)
109 allow domain kernel:key search;
111 allow domain fsverity_init:key search;
114 allow domain su:key search;
118 allow domain linkerconfig_file:dir search;
119 allow domain linkerconfig_file:file r_file_perms;
122 allow domain boringssl_self_test_marker:dir search;
127 domain
137 neverallow { domain -priv_app -gmscore_app } *:keystore_key gen_unique_id;
140 domain
143 userdebug_or_eng(`-domain')
148 neverallow { domain -init -system_server } dropbox_data_file:dir *;
149 neverallow { domain -init -system_server } dropbox_data_file:file ~{ getattr read };
154 domain
162 domain
181 domain
188 domain
197 domain
203 domain
211 neverallow { domain -init -system_server -apexd -installd -iorap_inode2filename } staging_data_file…
212 neverallow { domain -init -system_app -system_server -apexd -kernel -installd -iorap_inode2filename…
213 neverallow { domain -init -system_server -installd} staging_data_file:dir no_w_dir_perms;
216 neverallow { domain -init -system_server } staging_data_file:file
220 domain
234 domain
258 domain
265 domain
278 domain
291 # Instead of granting them it is usually better to add the domain to
333 domain
347 domain
348 userdebug_or_eng(`-domain')
363 domain
370 neverallow { domain -init -system_server -vendor_init } net_dns_prop:property_service set;
371 neverallow { domain -dumpstate -init -system_server -vendor_init } net_dns_prop:file read;
374 neverallow { domain -init -vendor_init } debugfs_kprobes:file *;