Home
last modified time | relevance | path

Searched refs:blkid (Results 1 – 25 of 85) sorted by relevance

1234

/aosp12/system/sepolicy/prebuilts/api/27.0/private/
H A Dblkid.te1 # blkid called from vold
3 typeattribute blkid coredomain;
8 allow blkid block_device:dir search;
9 allow blkid userdata_block_device:blk_file r_file_perms;
10 allow blkid dm_device:blk_file r_file_perms;
13 allow blkid vold:fd use;
14 allow blkid vold:fifo_file { read write getattr };
16 # For blkid launched through popen()
17 allow blkid blkid_exec:file rx_file_perms;
20 neverallow { domain -vold } blkid:process transition;
[all …]
H A Dblkid_untrusted.te1 # blkid for untrusted block devices
13 # For blkid launched through popen()
20 # Untrusted blkid should never be run on block devices holding sensitive data
34 # Only allow entry from vold via blkid binary
/aosp12/system/sepolicy/prebuilts/api/28.0/private/
H A Dblkid.te1 # blkid called from vold
3 typeattribute blkid coredomain;
8 allow blkid block_device:dir search;
9 allow blkid userdata_block_device:blk_file r_file_perms;
10 allow blkid dm_device:blk_file r_file_perms;
13 allow blkid vold:fd use;
14 allow blkid vold:fifo_file { read write getattr };
16 # For blkid launched through popen()
17 allow blkid blkid_exec:file rx_file_perms;
20 neverallow { domain -vold } blkid:process transition;
[all …]
H A Dblkid_untrusted.te1 # blkid for untrusted block devices
13 # For blkid launched through popen()
20 # Untrusted blkid should never be run on block devices holding sensitive data
34 # Only allow entry from vold via blkid binary
/aosp12/system/sepolicy/prebuilts/api/29.0/private/
H A Dblkid.te1 # blkid called from vold
3 typeattribute blkid coredomain;
8 allow blkid block_device:dir search;
9 allow blkid userdata_block_device:blk_file r_file_perms;
10 allow blkid dm_device:blk_file r_file_perms;
13 allow blkid vold:fd use;
14 allow blkid vold:fifo_file { read write getattr };
16 # For blkid launched through popen()
17 allow blkid blkid_exec:file rx_file_perms;
20 neverallow { domain -vold } blkid:process transition;
[all …]
H A Dblkid_untrusted.te1 # blkid for untrusted block devices
13 # For blkid launched through popen()
20 # Untrusted blkid should never be run on block devices holding sensitive data
34 # Only allow entry from vold via blkid binary
/aosp12/system/sepolicy/prebuilts/api/30.0/private/
H A Dblkid.te1 # blkid called from vold
3 typeattribute blkid coredomain;
8 allow blkid block_device:dir search;
9 allow blkid userdata_block_device:blk_file r_file_perms;
10 allow blkid dm_device:blk_file r_file_perms;
13 allow blkid vold:fd use;
14 allow blkid vold:fifo_file { read write getattr };
16 # For blkid launched through popen()
17 allow blkid blkid_exec:file rx_file_perms;
20 neverallow { domain -vold } blkid:process transition;
[all …]
H A Dblkid_untrusted.te1 # blkid for untrusted block devices
13 # For blkid launched through popen()
20 # Untrusted blkid should never be run on block devices holding sensitive data
34 # Only allow entry from vold via blkid binary
/aosp12/system/sepolicy/prebuilts/api/31.0/private/
H A Dblkid.te1 # blkid called from vold
3 typeattribute blkid coredomain;
8 allow blkid block_device:dir search;
9 allow blkid userdata_block_device:blk_file r_file_perms;
10 allow blkid dm_device:blk_file r_file_perms;
13 allow blkid vold:fd use;
14 allow blkid vold:fifo_file { read write getattr };
16 # For blkid launched through popen()
17 allow blkid blkid_exec:file rx_file_perms;
20 neverallow { domain -vold } blkid:process transition;
[all …]
H A Dblkid_untrusted.te1 # blkid for untrusted block devices
13 # For blkid launched through popen()
20 # Untrusted blkid should never be run on block devices holding sensitive data
34 # Only allow entry from vold via blkid binary
/aosp12/system/sepolicy/prebuilts/api/32.0/private/
H A Dblkid.te1 # blkid called from vold
3 typeattribute blkid coredomain;
8 allow blkid block_device:dir search;
9 allow blkid userdata_block_device:blk_file r_file_perms;
10 allow blkid dm_device:blk_file r_file_perms;
13 allow blkid vold:fd use;
14 allow blkid vold:fifo_file { read write getattr };
16 # For blkid launched through popen()
17 allow blkid blkid_exec:file rx_file_perms;
20 neverallow { domain -vold } blkid:process transition;
[all …]
H A Dblkid_untrusted.te1 # blkid for untrusted block devices
13 # For blkid launched through popen()
20 # Untrusted blkid should never be run on block devices holding sensitive data
34 # Only allow entry from vold via blkid binary
/aosp12/system/sepolicy/private/
H A Dblkid.te1 # blkid called from vold
3 typeattribute blkid coredomain;
8 allow blkid block_device:dir search;
9 allow blkid userdata_block_device:blk_file r_file_perms;
10 allow blkid dm_device:blk_file r_file_perms;
13 allow blkid vold:fd use;
14 allow blkid vold:fifo_file { read write getattr };
16 # For blkid launched through popen()
17 allow blkid blkid_exec:file rx_file_perms;
20 neverallow { domain -vold } blkid:process transition;
[all …]
H A Dblkid_untrusted.te1 # blkid for untrusted block devices
13 # For blkid launched through popen()
20 # Untrusted blkid should never be run on block devices holding sensitive data
34 # Only allow entry from vold via blkid binary
/aosp12/system/sepolicy/prebuilts/api/26.0/private/
H A Dblkid.te1 # blkid called from vold
3 typeattribute blkid coredomain;
8 allow blkid block_device:dir search;
9 allow blkid userdata_block_device:blk_file r_file_perms;
10 allow blkid dm_device:blk_file r_file_perms;
13 allow blkid vold:fd use;
14 allow blkid vold:fifo_file { read write getattr };
16 # For blkid launched through popen()
17 allow blkid blkid_exec:file rx_file_perms;
20 neverallow { domain -vold } blkid:process transition;
[all …]
H A Dblkid_untrusted.te1 # blkid for untrusted block devices
13 # For blkid launched through popen()
20 # Untrusted blkid should never be run on block devices holding sensitive data
34 # Only allow entry from vold via blkid binary
/aosp12/system/sepolicy/prebuilts/api/26.0/public/
H A Dblkid.te1 # blkid called from vold
2 type blkid, domain;
/aosp12/system/sepolicy/prebuilts/api/27.0/public/
H A Dblkid.te1 # blkid called from vold
2 type blkid, domain;
/aosp12/system/sepolicy/prebuilts/api/30.0/public/
H A Dblkid.te1 # blkid called from vold
2 type blkid, domain;
/aosp12/system/sepolicy/prebuilts/api/28.0/public/
H A Dblkid.te1 # blkid called from vold
2 type blkid, domain;
H A Dblkid_untrusted.te1 # blkid for untrusted block devices
/aosp12/system/sepolicy/prebuilts/api/29.0/public/
H A Dblkid.te1 # blkid called from vold
2 type blkid, domain;
/aosp12/system/sepolicy/prebuilts/api/31.0/public/
H A Dblkid.te1 # blkid called from vold
2 type blkid, domain;
/aosp12/system/sepolicy/prebuilts/api/32.0/public/
H A Dblkid.te1 # blkid called from vold
2 type blkid, domain;
/aosp12/system/sepolicy/public/
H A Dblkid.te1 # blkid called from vold
2 type blkid, domain;

1234