/device/google/dragon/sepolicy/ |
tee.te | 3 allow tee block_device:dir search;
|
/system/extras/verity/ |
build_verity_metadata.py | 40 def build_verity_table(block_device, data_blocks, root_hash, salt): 42 table %= ( block_device, 43 block_device, 53 salt, block_device, signer_path, signing_key): 55 verity_table = build_verity_table(block_device, data_blocks, root_hash, salt) 72 block_device = sys.argv[5] variable 76 salt, block_device, signer_path, signing_key)
|
/system/sepolicy/ |
uncrypt.te | 34 allow uncrypt block_device:blk_file w_file_perms; 35 auditallow uncrypt block_device:blk_file w_file_perms; 37 allow uncrypt block_device:dir r_dir_perms;
|
update_verifier.te | 9 allow update_verifier block_device:dir search;
|
blkid.te | 6 allow blkid block_device:dir search;
|
otapreopt_chroot.te | 11 allow otapreopt_chroot block_device:dir search;
|
sgdisk.te | 6 allow sgdisk block_device:dir search;
|
blkid_untrusted.te | 5 allow blkid_untrusted block_device:dir search;
|
fsck_untrusted.te | 12 allow fsck_untrusted block_device:dir search;
|
install_recovery.te | 19 allow install_recovery block_device:dir search;
|
toolbox.te | 20 allow toolbox block_device:dir search;
|
/device/htc/flounder/sepolicy/ |
tee.te | 9 allow tee block_device:dir { search };
|
kickstart.te | 18 allow kickstart block_device:dir { getattr write search };
|
/device/google/marlin/sepolicy/ |
boot_control_hal.te | 5 # partition names in the block_device directory /dev/block/.../by-name 6 allow boot_control_hal block_device:dir { open read };
|
hrdump.te | 17 allow htc_ramdump block_device:dir { search };
|
rmt.te | 15 allow rmt block_device:dir search;
|
tee.te | 8 allow tee block_device:dir r_dir_perms;
|
/device/huawei/angler/sepolicy/ |
rmt.te | 19 allow rmt block_device:dir search;
|
tee.te | 3 allow tee block_device:dir { getattr search };
|
/device/moto/shamu/sepolicy/ |
tee.te | 8 allow tee block_device:dir search;
|
mdm_helper.te | 18 allow mdm_helper block_device:dir { getattr write search }; 25 allow mdm_helper block_device:dir getattr;
|
/system/core/adb/ |
set_verity_enable_state_service.cpp | 46 static int set_verity_enabled_state(int fd, const char *block_device, 49 if (!make_block_device_writable(block_device)) { 51 block_device, strerror(errno)); 55 fec::io fh(block_device, O_RDWR); 58 WriteFdFmt(fd, "Could not open block device %s (%s).\n", block_device, strerror(errno)); 83 block_device, strerror(errno));
|
/device/lge/bullhead/sepolicy/ |
rmt.te | 16 allow rmt block_device:dir r_dir_perms;
|
tee.te | 4 allow tee block_device:dir r_dir_perms;
|
/system/extras/ext4_utils/ |
ext4_sb.h | 46 bool block_device; /* target fd is a block device? */ member in struct:fs_info
|