/aosp12/system/sepolicy/prebuilts/api/27.0/private/ |
H A D | blkid.te | 1 # blkid called from vold 3 typeattribute blkid coredomain; 8 allow blkid block_device:dir search; 9 allow blkid userdata_block_device:blk_file r_file_perms; 10 allow blkid dm_device:blk_file r_file_perms; 13 allow blkid vold:fd use; 14 allow blkid vold:fifo_file { read write getattr }; 16 # For blkid launched through popen() 17 allow blkid blkid_exec:file rx_file_perms; 20 neverallow { domain -vold } blkid:process transition; [all …]
|
H A D | blkid_untrusted.te | 1 # blkid for untrusted block devices 13 # For blkid launched through popen() 20 # Untrusted blkid should never be run on block devices holding sensitive data 34 # Only allow entry from vold via blkid binary
|
/aosp12/system/sepolicy/prebuilts/api/28.0/private/ |
H A D | blkid.te | 1 # blkid called from vold 3 typeattribute blkid coredomain; 8 allow blkid block_device:dir search; 9 allow blkid userdata_block_device:blk_file r_file_perms; 10 allow blkid dm_device:blk_file r_file_perms; 13 allow blkid vold:fd use; 14 allow blkid vold:fifo_file { read write getattr }; 16 # For blkid launched through popen() 17 allow blkid blkid_exec:file rx_file_perms; 20 neverallow { domain -vold } blkid:process transition; [all …]
|
H A D | blkid_untrusted.te | 1 # blkid for untrusted block devices 13 # For blkid launched through popen() 20 # Untrusted blkid should never be run on block devices holding sensitive data 34 # Only allow entry from vold via blkid binary
|
/aosp12/system/sepolicy/prebuilts/api/29.0/private/ |
H A D | blkid.te | 1 # blkid called from vold 3 typeattribute blkid coredomain; 8 allow blkid block_device:dir search; 9 allow blkid userdata_block_device:blk_file r_file_perms; 10 allow blkid dm_device:blk_file r_file_perms; 13 allow blkid vold:fd use; 14 allow blkid vold:fifo_file { read write getattr }; 16 # For blkid launched through popen() 17 allow blkid blkid_exec:file rx_file_perms; 20 neverallow { domain -vold } blkid:process transition; [all …]
|
H A D | blkid_untrusted.te | 1 # blkid for untrusted block devices 13 # For blkid launched through popen() 20 # Untrusted blkid should never be run on block devices holding sensitive data 34 # Only allow entry from vold via blkid binary
|
/aosp12/system/sepolicy/prebuilts/api/30.0/private/ |
H A D | blkid.te | 1 # blkid called from vold 3 typeattribute blkid coredomain; 8 allow blkid block_device:dir search; 9 allow blkid userdata_block_device:blk_file r_file_perms; 10 allow blkid dm_device:blk_file r_file_perms; 13 allow blkid vold:fd use; 14 allow blkid vold:fifo_file { read write getattr }; 16 # For blkid launched through popen() 17 allow blkid blkid_exec:file rx_file_perms; 20 neverallow { domain -vold } blkid:process transition; [all …]
|
H A D | blkid_untrusted.te | 1 # blkid for untrusted block devices 13 # For blkid launched through popen() 20 # Untrusted blkid should never be run on block devices holding sensitive data 34 # Only allow entry from vold via blkid binary
|
/aosp12/system/sepolicy/prebuilts/api/31.0/private/ |
H A D | blkid.te | 1 # blkid called from vold 3 typeattribute blkid coredomain; 8 allow blkid block_device:dir search; 9 allow blkid userdata_block_device:blk_file r_file_perms; 10 allow blkid dm_device:blk_file r_file_perms; 13 allow blkid vold:fd use; 14 allow blkid vold:fifo_file { read write getattr }; 16 # For blkid launched through popen() 17 allow blkid blkid_exec:file rx_file_perms; 20 neverallow { domain -vold } blkid:process transition; [all …]
|
H A D | blkid_untrusted.te | 1 # blkid for untrusted block devices 13 # For blkid launched through popen() 20 # Untrusted blkid should never be run on block devices holding sensitive data 34 # Only allow entry from vold via blkid binary
|
/aosp12/system/sepolicy/prebuilts/api/32.0/private/ |
H A D | blkid.te | 1 # blkid called from vold 3 typeattribute blkid coredomain; 8 allow blkid block_device:dir search; 9 allow blkid userdata_block_device:blk_file r_file_perms; 10 allow blkid dm_device:blk_file r_file_perms; 13 allow blkid vold:fd use; 14 allow blkid vold:fifo_file { read write getattr }; 16 # For blkid launched through popen() 17 allow blkid blkid_exec:file rx_file_perms; 20 neverallow { domain -vold } blkid:process transition; [all …]
|
H A D | blkid_untrusted.te | 1 # blkid for untrusted block devices 13 # For blkid launched through popen() 20 # Untrusted blkid should never be run on block devices holding sensitive data 34 # Only allow entry from vold via blkid binary
|
/aosp12/system/sepolicy/private/ |
H A D | blkid.te | 1 # blkid called from vold 3 typeattribute blkid coredomain; 8 allow blkid block_device:dir search; 9 allow blkid userdata_block_device:blk_file r_file_perms; 10 allow blkid dm_device:blk_file r_file_perms; 13 allow blkid vold:fd use; 14 allow blkid vold:fifo_file { read write getattr }; 16 # For blkid launched through popen() 17 allow blkid blkid_exec:file rx_file_perms; 20 neverallow { domain -vold } blkid:process transition; [all …]
|
H A D | blkid_untrusted.te | 1 # blkid for untrusted block devices 13 # For blkid launched through popen() 20 # Untrusted blkid should never be run on block devices holding sensitive data 34 # Only allow entry from vold via blkid binary
|
/aosp12/system/sepolicy/prebuilts/api/26.0/private/ |
H A D | blkid.te | 1 # blkid called from vold 3 typeattribute blkid coredomain; 8 allow blkid block_device:dir search; 9 allow blkid userdata_block_device:blk_file r_file_perms; 10 allow blkid dm_device:blk_file r_file_perms; 13 allow blkid vold:fd use; 14 allow blkid vold:fifo_file { read write getattr }; 16 # For blkid launched through popen() 17 allow blkid blkid_exec:file rx_file_perms; 20 neverallow { domain -vold } blkid:process transition; [all …]
|
H A D | blkid_untrusted.te | 1 # blkid for untrusted block devices 13 # For blkid launched through popen() 20 # Untrusted blkid should never be run on block devices holding sensitive data 34 # Only allow entry from vold via blkid binary
|
/aosp12/system/sepolicy/prebuilts/api/26.0/public/ |
H A D | blkid.te | 1 # blkid called from vold 2 type blkid, domain;
|
/aosp12/system/sepolicy/prebuilts/api/27.0/public/ |
H A D | blkid.te | 1 # blkid called from vold 2 type blkid, domain;
|
/aosp12/system/sepolicy/prebuilts/api/30.0/public/ |
H A D | blkid.te | 1 # blkid called from vold 2 type blkid, domain;
|
/aosp12/system/sepolicy/prebuilts/api/28.0/public/ |
H A D | blkid.te | 1 # blkid called from vold 2 type blkid, domain;
|
H A D | blkid_untrusted.te | 1 # blkid for untrusted block devices
|
/aosp12/system/sepolicy/prebuilts/api/29.0/public/ |
H A D | blkid.te | 1 # blkid called from vold 2 type blkid, domain;
|
/aosp12/system/sepolicy/prebuilts/api/31.0/public/ |
H A D | blkid.te | 1 # blkid called from vold 2 type blkid, domain;
|
/aosp12/system/sepolicy/prebuilts/api/32.0/public/ |
H A D | blkid.te | 1 # blkid called from vold 2 type blkid, domain;
|
/aosp12/system/sepolicy/public/ |
H A D | blkid.te | 1 # blkid called from vold 2 type blkid, domain;
|