HomeSort by relevance Sort by last modified time
    Searched full:vold (Results 1 - 25 of 273) sorted by null

1 2 3 4 5 6 7 8 91011

  /device/google/wahoo/sepolicy/vendor/
vold.te 1 get_prop(vold, tee_listener_prop)
3 allow vold sysfs_scsi_devices_0000:file write;
4 allow vold sysfs_scsi_devices_other:file write;
5 allow vold sysfs_devices_block:file write;
7 allow vold persist_file:dir r_dir_perms;
10 dontaudit vold proc_irq:dir read;
  /build/make/target/board/generic/sepolicy/
vold.te 1 dontaudit vold kernel:system module_request;
  /system/sepolicy/prebuilts/api/26.0/public/
blkid.te 1 # blkid called from vold
vold.te 2 type vold, domain;
6 allow vold cache_file:dir r_dir_perms;
7 allow vold cache_file:file { getattr read };
8 allow vold cache_file:lnk_file r_file_perms;
11 r_dir_file(vold, proc)
12 r_dir_file(vold, proc_net)
13 r_dir_file(vold, sysfs_type)
15 allow vold sysfs:file w_file_perms;
16 allow vold sysfs_usb:file w_file_perms;
17 allow vold sysfs_zram_uevent:file w_file_perms
    [all...]
sgdisk.te 1 # sgdisk called from vold
12 # Allow stdin/out back to vold
13 allow sgdisk vold:fd use;
14 allow sgdisk vold:fifo_file { read write getattr };
19 # Only allow entry from vold
20 neverallow { domain -vold } sgdisk:process transition;
  /system/sepolicy/prebuilts/api/27.0/public/
blkid.te 1 # blkid called from vold
vold.te 2 type vold, domain;
6 allow vold cache_file:dir r_dir_perms;
7 allow vold cache_file:file { getattr read };
8 allow vold cache_file:lnk_file r_file_perms;
11 r_dir_file(vold, proc)
12 r_dir_file(vold, proc_net)
13 r_dir_file(vold, sysfs_type)
15 allow vold sysfs:file w_file_perms;
16 allow vold sysfs_usb:file w_file_perms;
17 allow vold sysfs_zram_uevent:file w_file_perms
    [all...]
sgdisk.te 1 # sgdisk called from vold
12 # Allow stdin/out back to vold
13 allow sgdisk vold:fd use;
14 allow sgdisk vold:fifo_file { read write getattr };
19 # Only allow entry from vold
20 neverallow { domain -vold } sgdisk:process transition;
  /system/sepolicy/prebuilts/api/28.0/public/
blkid.te 1 # blkid called from vold
vold.te 2 type vold, domain;
6 allow vold cache_file:dir r_dir_perms;
7 allow vold cache_file:file { getattr read };
8 allow vold cache_file:lnk_file r_file_perms;
11 r_dir_file(vold, proc_net)
12 r_dir_file(vold, sysfs_type)
14 allow vold sysfs:file w_file_perms; # writing to /sys/*/uevent during coldboot.
15 allow vold sysfs_dm:file w_file_perms;
16 allow vold sysfs_usb:file w_file_perms;
17 allow vold sysfs_zram_uevent:file w_file_perms
    [all...]
sgdisk.te 1 # sgdisk called from vold
12 # Allow stdin/out back to vold
13 allow sgdisk vold:fd use;
14 allow sgdisk vold:fifo_file { read write getattr };
19 # Only allow entry from vold
20 neverallow { domain -vold } sgdisk:process transition;
vold_prepare_subdirs.te 1 # SELinux directory creation and labelling for vold-managed directories
  /system/sepolicy/public/
blkid.te 1 # blkid called from vold
vold.te 2 type vold, domain;
6 allow vold cache_file:dir r_dir_perms;
7 allow vold cache_file:file { getattr read };
8 allow vold cache_file:lnk_file r_file_perms;
11 r_dir_file(vold, proc_net)
12 r_dir_file(vold, sysfs_type)
14 allow vold sysfs:file w_file_perms; # writing to /sys/*/uevent during coldboot.
15 allow vold sysfs_dm:file w_file_perms;
16 allow vold sysfs_usb:file w_file_perms;
17 allow vold sysfs_zram_uevent:file w_file_perms
    [all...]
sgdisk.te 1 # sgdisk called from vold
12 # Allow stdin/out back to vold
13 allow sgdisk vold:fd use;
14 allow sgdisk vold:fifo_file { read write getattr };
19 # Only allow entry from vold
20 neverallow { domain -vold } sgdisk:process transition;
vold_prepare_subdirs.te 1 # SELinux directory creation and labelling for vold-managed directories
  /device/google/marlin/sepolicy/
vold.te 2 dontaudit vold proc_irq:dir read;
4 allow vold sysfs_scsi_devices_0000:file w_file_perms;
5 allow vold sysfs_scsi_devices_other:file w_file_perms;
6 allow vold sysfs_devices_block:file w_file_perms;
7 allow vold persist_file:dir r_dir_perms;
  /system/sepolicy/prebuilts/api/26.0/private/
vold.te 1 typeattribute vold coredomain;
2 typeattribute vold domain_deprecated;
4 init_daemon_domain(vold)
7 domain_auto_trans(vold, sgdisk_exec, sgdisk);
8 domain_auto_trans(vold, sdcardd_exec, sdcardd);
12 domain_trans(vold, shell_exec, blkid);
13 domain_trans(vold, shell_exec, blkid_untrusted);
14 domain_trans(vold, fsck_exec, fsck);
15 domain_trans(vold, fsck_exec, fsck_untrusted);
19 type_transition vold storage_file:dir storage_stub_file
    [all...]
blkid.te 1 # blkid called from vold
12 # Allow stdin/out back to vold
13 allow blkid vold:fd use;
14 allow blkid vold:fifo_file { read write getattr };
19 # Only allow entry from vold
20 neverallow { domain -vold } blkid:process transition;
  /system/sepolicy/prebuilts/api/27.0/private/
vold.te 1 typeattribute vold coredomain;
2 typeattribute vold domain_deprecated;
4 init_daemon_domain(vold)
7 domain_auto_trans(vold, sgdisk_exec, sgdisk);
8 domain_auto_trans(vold, sdcardd_exec, sdcardd);
12 domain_trans(vold, shell_exec, blkid);
13 domain_trans(vold, shell_exec, blkid_untrusted);
14 domain_trans(vold, fsck_exec, fsck);
15 domain_trans(vold, fsck_exec, fsck_untrusted);
19 type_transition vold storage_file:dir storage_stub_file
    [all...]
blkid.te 1 # blkid called from vold
12 # Allow stdin/out back to vold
13 allow blkid vold:fd use;
14 allow blkid vold:fifo_file { read write getattr };
19 # Only allow entry from vold
20 neverallow { domain -vold } blkid:process transition;
  /system/sepolicy/prebuilts/api/28.0/private/
vold.te 1 typeattribute vold coredomain;
3 init_daemon_domain(vold)
6 domain_auto_trans(vold, sgdisk_exec, sgdisk);
7 domain_auto_trans(vold, sdcardd_exec, sdcardd);
11 domain_trans(vold, shell_exec, blkid);
12 domain_trans(vold, shell_exec, blkid_untrusted);
13 domain_trans(vold, fsck_exec, fsck);
14 domain_trans(vold, fsck_exec, fsck_untrusted);
18 type_transition vold storage_file:dir storage_stub_file;
19 type_transition vold mnt_media_rw_file:dir mnt_media_rw_stub_file
    [all...]
blkid.te 1 # blkid called from vold
12 # Allow stdin/out back to vold
13 allow blkid vold:fd use;
14 allow blkid vold:fifo_file { read write getattr };
19 # Only allow entry from vold
20 neverallow { domain -vold } blkid:process transition;
  /system/sepolicy/private/
vold.te 1 typeattribute vold coredomain;
3 init_daemon_domain(vold)
6 domain_auto_trans(vold, sgdisk_exec, sgdisk);
7 domain_auto_trans(vold, sdcardd_exec, sdcardd);
11 domain_trans(vold, shell_exec, blkid);
12 domain_trans(vold, shell_exec, blkid_untrusted);
13 domain_trans(vold, fsck_exec, fsck);
14 domain_trans(vold, fsck_exec, fsck_untrusted);
18 type_transition vold storage_file:dir storage_stub_file;
19 type_transition vold mnt_media_rw_file:dir mnt_media_rw_stub_file
    [all...]
blkid.te 1 # blkid called from vold
12 # Allow stdin/out back to vold
13 allow blkid vold:fd use;
14 allow blkid vold:fifo_file { read write getattr };
19 # Only allow entry from vold
20 neverallow { domain -vold } blkid:process transition;

Completed in 785 milliseconds

1 2 3 4 5 6 7 8 91011