| /device/google/wahoo/sepolicy/vendor/ |
| vold.te | 1 get_prop(vold, tee_listener_prop) 3 allow vold sysfs_scsi_devices_0000:file write; 4 allow vold sysfs_scsi_devices_other:file write; 5 allow vold sysfs_devices_block:file write; 7 allow vold persist_file:dir r_dir_perms; 10 dontaudit vold proc_irq:dir read;
|
| /build/make/target/board/generic/sepolicy/ |
| vold.te | 1 dontaudit vold kernel:system module_request;
|
| /system/sepolicy/prebuilts/api/26.0/public/ |
| blkid.te | 1 # blkid called from vold
|
| vold.te | 2 type vold, domain; 6 allow vold cache_file:dir r_dir_perms; 7 allow vold cache_file:file { getattr read }; 8 allow vold cache_file:lnk_file r_file_perms; 11 r_dir_file(vold, proc) 12 r_dir_file(vold, proc_net) 13 r_dir_file(vold, sysfs_type) 15 allow vold sysfs:file w_file_perms; 16 allow vold sysfs_usb:file w_file_perms; 17 allow vold sysfs_zram_uevent:file w_file_perms [all...] |
| sgdisk.te | 1 # sgdisk called from vold 12 # Allow stdin/out back to vold 13 allow sgdisk vold:fd use; 14 allow sgdisk vold:fifo_file { read write getattr }; 19 # Only allow entry from vold 20 neverallow { domain -vold } sgdisk:process transition;
|
| /system/sepolicy/prebuilts/api/27.0/public/ |
| blkid.te | 1 # blkid called from vold
|
| vold.te | 2 type vold, domain; 6 allow vold cache_file:dir r_dir_perms; 7 allow vold cache_file:file { getattr read }; 8 allow vold cache_file:lnk_file r_file_perms; 11 r_dir_file(vold, proc) 12 r_dir_file(vold, proc_net) 13 r_dir_file(vold, sysfs_type) 15 allow vold sysfs:file w_file_perms; 16 allow vold sysfs_usb:file w_file_perms; 17 allow vold sysfs_zram_uevent:file w_file_perms [all...] |
| sgdisk.te | 1 # sgdisk called from vold 12 # Allow stdin/out back to vold 13 allow sgdisk vold:fd use; 14 allow sgdisk vold:fifo_file { read write getattr }; 19 # Only allow entry from vold 20 neverallow { domain -vold } sgdisk:process transition;
|
| /system/sepolicy/prebuilts/api/28.0/public/ |
| blkid.te | 1 # blkid called from vold
|
| vold.te | 2 type vold, domain; 6 allow vold cache_file:dir r_dir_perms; 7 allow vold cache_file:file { getattr read }; 8 allow vold cache_file:lnk_file r_file_perms; 11 r_dir_file(vold, proc_net) 12 r_dir_file(vold, sysfs_type) 14 allow vold sysfs:file w_file_perms; # writing to /sys/*/uevent during coldboot. 15 allow vold sysfs_dm:file w_file_perms; 16 allow vold sysfs_usb:file w_file_perms; 17 allow vold sysfs_zram_uevent:file w_file_perms [all...] |
| sgdisk.te | 1 # sgdisk called from vold 12 # Allow stdin/out back to vold 13 allow sgdisk vold:fd use; 14 allow sgdisk vold:fifo_file { read write getattr }; 19 # Only allow entry from vold 20 neverallow { domain -vold } sgdisk:process transition;
|
| vold_prepare_subdirs.te | 1 # SELinux directory creation and labelling for vold-managed directories
|
| /system/sepolicy/public/ |
| blkid.te | 1 # blkid called from vold
|
| vold.te | 2 type vold, domain; 6 allow vold cache_file:dir r_dir_perms; 7 allow vold cache_file:file { getattr read }; 8 allow vold cache_file:lnk_file r_file_perms; 11 r_dir_file(vold, proc_net) 12 r_dir_file(vold, sysfs_type) 14 allow vold sysfs:file w_file_perms; # writing to /sys/*/uevent during coldboot. 15 allow vold sysfs_dm:file w_file_perms; 16 allow vold sysfs_usb:file w_file_perms; 17 allow vold sysfs_zram_uevent:file w_file_perms [all...] |
| sgdisk.te | 1 # sgdisk called from vold 12 # Allow stdin/out back to vold 13 allow sgdisk vold:fd use; 14 allow sgdisk vold:fifo_file { read write getattr }; 19 # Only allow entry from vold 20 neverallow { domain -vold } sgdisk:process transition;
|
| vold_prepare_subdirs.te | 1 # SELinux directory creation and labelling for vold-managed directories
|
| /device/google/marlin/sepolicy/ |
| vold.te | 2 dontaudit vold proc_irq:dir read; 4 allow vold sysfs_scsi_devices_0000:file w_file_perms; 5 allow vold sysfs_scsi_devices_other:file w_file_perms; 6 allow vold sysfs_devices_block:file w_file_perms; 7 allow vold persist_file:dir r_dir_perms;
|
| /system/sepolicy/prebuilts/api/26.0/private/ |
| vold.te | 1 typeattribute vold coredomain; 2 typeattribute vold domain_deprecated; 4 init_daemon_domain(vold) 7 domain_auto_trans(vold, sgdisk_exec, sgdisk); 8 domain_auto_trans(vold, sdcardd_exec, sdcardd); 12 domain_trans(vold, shell_exec, blkid); 13 domain_trans(vold, shell_exec, blkid_untrusted); 14 domain_trans(vold, fsck_exec, fsck); 15 domain_trans(vold, fsck_exec, fsck_untrusted); 19 type_transition vold storage_file:dir storage_stub_file [all...] |
| blkid.te | 1 # blkid called from vold 12 # Allow stdin/out back to vold 13 allow blkid vold:fd use; 14 allow blkid vold:fifo_file { read write getattr }; 19 # Only allow entry from vold 20 neverallow { domain -vold } blkid:process transition;
|
| /system/sepolicy/prebuilts/api/27.0/private/ |
| vold.te | 1 typeattribute vold coredomain; 2 typeattribute vold domain_deprecated; 4 init_daemon_domain(vold) 7 domain_auto_trans(vold, sgdisk_exec, sgdisk); 8 domain_auto_trans(vold, sdcardd_exec, sdcardd); 12 domain_trans(vold, shell_exec, blkid); 13 domain_trans(vold, shell_exec, blkid_untrusted); 14 domain_trans(vold, fsck_exec, fsck); 15 domain_trans(vold, fsck_exec, fsck_untrusted); 19 type_transition vold storage_file:dir storage_stub_file [all...] |
| blkid.te | 1 # blkid called from vold 12 # Allow stdin/out back to vold 13 allow blkid vold:fd use; 14 allow blkid vold:fifo_file { read write getattr }; 19 # Only allow entry from vold 20 neverallow { domain -vold } blkid:process transition;
|
| /system/sepolicy/prebuilts/api/28.0/private/ |
| vold.te | 1 typeattribute vold coredomain; 3 init_daemon_domain(vold) 6 domain_auto_trans(vold, sgdisk_exec, sgdisk); 7 domain_auto_trans(vold, sdcardd_exec, sdcardd); 11 domain_trans(vold, shell_exec, blkid); 12 domain_trans(vold, shell_exec, blkid_untrusted); 13 domain_trans(vold, fsck_exec, fsck); 14 domain_trans(vold, fsck_exec, fsck_untrusted); 18 type_transition vold storage_file:dir storage_stub_file; 19 type_transition vold mnt_media_rw_file:dir mnt_media_rw_stub_file [all...] |
| blkid.te | 1 # blkid called from vold 12 # Allow stdin/out back to vold 13 allow blkid vold:fd use; 14 allow blkid vold:fifo_file { read write getattr }; 19 # Only allow entry from vold 20 neverallow { domain -vold } blkid:process transition;
|
| /system/sepolicy/private/ |
| vold.te | 1 typeattribute vold coredomain; 3 init_daemon_domain(vold) 6 domain_auto_trans(vold, sgdisk_exec, sgdisk); 7 domain_auto_trans(vold, sdcardd_exec, sdcardd); 11 domain_trans(vold, shell_exec, blkid); 12 domain_trans(vold, shell_exec, blkid_untrusted); 13 domain_trans(vold, fsck_exec, fsck); 14 domain_trans(vold, fsck_exec, fsck_untrusted); 18 type_transition vold storage_file:dir storage_stub_file; 19 type_transition vold mnt_media_rw_file:dir mnt_media_rw_stub_file [all...] |
| blkid.te | 1 # blkid called from vold 12 # Allow stdin/out back to vold 13 allow blkid vold:fd use; 14 allow blkid vold:fifo_file { read write getattr }; 19 # Only allow entry from vold 20 neverallow { domain -vold } blkid:process transition;
|