Home
last modified time | relevance | path

Searched refs:rootfs (Results 1 – 25 of 324) sorted by relevance

12345678910>>...13

/aosp12/system/sepolicy/prebuilts/api/29.0/private/
H A Dinit.te6 domain_trans(init, rootfs, healthd)
7 domain_trans(init, rootfs, slideshow)
13 # Files in recovery image are labeled as rootfs.
14 domain_trans(init, rootfs, adbd)
15 domain_trans(init, rootfs, charger)
16 domain_trans(init, rootfs, fastbootd)
17 domain_trans(init, rootfs, recovery)
22 domain_trans(init, { rootfs toolbox_exec }, modprobe)
/aosp12/system/sepolicy/prebuilts/api/28.0/private/
H A Dinit.te6 domain_trans(init, rootfs, charger)
7 domain_trans(init, rootfs, healthd)
8 domain_trans(init, rootfs, slideshow)
11 domain_trans(init, rootfs, adbd)
12 domain_trans(init, rootfs, recovery)
18 domain_trans(init, { rootfs toolbox_exec }, modprobe)
/aosp12/system/sepolicy/prebuilts/api/26.0/private/
H A Dinit.te6 domain_trans(init, rootfs, adbd)
7 domain_trans(init, rootfs, charger)
8 domain_trans(init, rootfs, healthd)
9 domain_trans(init, rootfs, slideshow)
11 domain_trans(init, rootfs, recovery)
16 domain_trans(init, { rootfs toolbox_exec }, modprobe)
H A Ddomain_deprecated.te32 allow domain_deprecated rootfs:dir r_dir_perms;
33 allow domain_deprecated rootfs:file r_file_perms;
34 allow domain_deprecated rootfs:lnk_file r_file_perms;
47 } rootfs:dir { open getattr read ioctl lock }; # search granted in domain
58 } rootfs:file r_file_perms;
70 } rootfs:lnk_file { getattr open ioctl lock }; # read granted in domain
/aosp12/system/sepolicy/prebuilts/api/30.0/private/
H A Dinit.te6 domain_trans(init, rootfs, healthd)
7 domain_trans(init, rootfs, slideshow)
13 # Files in recovery image are labeled as rootfs.
14 domain_trans(init, rootfs, adbd)
15 domain_trans(init, rootfs, charger)
16 domain_trans(init, rootfs, fastbootd)
17 domain_trans(init, rootfs, recovery)
18 domain_trans(init, rootfs, linkerconfig)
23 domain_trans(init, { rootfs toolbox_exec }, modprobe)
/aosp12/system/sepolicy/prebuilts/api/27.0/private/
H A Dinit.te6 domain_trans(init, rootfs, charger)
7 domain_trans(init, rootfs, healthd)
8 domain_trans(init, rootfs, slideshow)
11 domain_trans(init, rootfs, adbd)
12 domain_trans(init, rootfs, recovery)
17 domain_trans(init, { rootfs toolbox_exec }, modprobe)
H A Dfile_contexts3 / u:object_r:rootfs:s0
7 /build\.prop u:object_r:rootfs:s0
8 /default\.prop u:object_r:rootfs:s0
9 /fstab\..* u:object_r:rootfs:s0
10 /init\..* u:object_r:rootfs:s0
11 /res(/.*)? u:object_r:rootfs:s0
12 /selinux_version u:object_r:rootfs:s0
13 /ueventd\..* u:object_r:rootfs:s0
14 /verity_key u:object_r:rootfs:s0
17 /charger u:object_r:rootfs:s0
[all …]
/aosp12/system/sepolicy/prebuilts/api/31.0/private/
H A Dinit.te6 domain_trans(init, rootfs, healthd)
7 domain_trans(init, rootfs, slideshow)
13 # Files in recovery image are labeled as rootfs.
14 domain_trans(init, rootfs, adbd)
15 domain_trans(init, rootfs, charger)
16 domain_trans(init, rootfs, fastbootd)
17 domain_trans(init, rootfs, recovery)
18 domain_trans(init, rootfs, linkerconfig)
19 domain_trans(init, rootfs, snapuserd)
24 domain_trans(init, { rootfs toolbox_exec }, modprobe)
/aosp12/system/sepolicy/prebuilts/api/32.0/private/
H A Dinit.te6 domain_trans(init, rootfs, healthd)
7 domain_trans(init, rootfs, slideshow)
13 # Files in recovery image are labeled as rootfs.
14 domain_trans(init, rootfs, adbd)
15 domain_trans(init, rootfs, charger)
16 domain_trans(init, rootfs, fastbootd)
17 domain_trans(init, rootfs, recovery)
18 domain_trans(init, rootfs, linkerconfig)
19 domain_trans(init, rootfs, snapuserd)
24 domain_trans(init, { rootfs toolbox_exec }, modprobe)
/aosp12/system/sepolicy/private/
H A Dinit.te6 domain_trans(init, rootfs, healthd)
7 domain_trans(init, rootfs, slideshow)
13 # Files in recovery image are labeled as rootfs.
14 domain_trans(init, rootfs, adbd)
15 domain_trans(init, rootfs, charger)
16 domain_trans(init, rootfs, fastbootd)
17 domain_trans(init, rootfs, recovery)
18 domain_trans(init, rootfs, linkerconfig)
19 domain_trans(init, rootfs, snapuserd)
24 domain_trans(init, { rootfs toolbox_exec }, modprobe)
/aosp12/system/sepolicy/prebuilts/api/29.0/public/
H A Dkernel.te7 r_dir_file(kernel, rootfs)
18 allow kernel rootfs:file relabelfrom;
99 # The label for the dynamic linker is rootfs in the recovery partition. This is because
100 # the recovery partition which is rootfs does not support xattr and thus labeling can't be
101 # done at build-time. All files are by default labeled as rootfs upon booting.
103 allow kernel rootfs:file execute;
118 # ever execute a program outside the rootfs without changing to another domain.
H A Dmodprobe.te7 allow modprobe rootfs:system module_load;
8 allow modprobe rootfs:file r_file_perms;
H A Dueventd.te2 # it lives in the rootfs and has no unique file type.
12 r_dir_file(ueventd, rootfs)
43 # Everything is labeled as rootfs in recovery mode. ueventd has to execute
46 allow ueventd rootfs:file { r_file_perms execute };
/aosp12/system/sepolicy/prebuilts/api/30.0/public/
H A Dkernel.te7 r_dir_file(kernel, rootfs)
18 allow kernel rootfs:file relabelfrom;
102 # The label for the dynamic linker is rootfs in the recovery partition. This is because
103 # the recovery partition which is rootfs does not support xattr and thus labeling can't be
104 # done at build-time. All files are by default labeled as rootfs upon booting.
106 allow kernel rootfs:file execute;
121 # ever execute a program outside the rootfs without changing to another domain.
H A Dmodprobe.te8 allow modprobe rootfs:system module_load;
9 allow modprobe rootfs:file r_file_perms;
/aosp12/system/sepolicy/prebuilts/api/31.0/public/
H A Dkernel.te7 r_dir_file(kernel, rootfs)
23 allow kernel rootfs:file relabelfrom;
107 # The label for the dynamic linker is rootfs in the recovery partition. This is because
108 # the recovery partition which is rootfs does not support xattr and thus labeling can't be
109 # done at build-time. All files are by default labeled as rootfs upon booting.
111 allow kernel rootfs:file execute;
126 # ever execute a program outside the rootfs without changing to another domain.
H A Dmodprobe.te8 allow modprobe rootfs:system module_load;
9 allow modprobe rootfs:file r_file_perms;
/aosp12/system/sepolicy/prebuilts/api/32.0/public/
H A Dkernel.te7 r_dir_file(kernel, rootfs)
23 allow kernel rootfs:file relabelfrom;
107 # The label for the dynamic linker is rootfs in the recovery partition. This is because
108 # the recovery partition which is rootfs does not support xattr and thus labeling can't be
109 # done at build-time. All files are by default labeled as rootfs upon booting.
111 allow kernel rootfs:file execute;
126 # ever execute a program outside the rootfs without changing to another domain.
H A Dmodprobe.te8 allow modprobe rootfs:system module_load;
9 allow modprobe rootfs:file r_file_perms;
/aosp12/system/sepolicy/public/
H A Dkernel.te7 r_dir_file(kernel, rootfs)
23 allow kernel rootfs:file relabelfrom;
107 # The label for the dynamic linker is rootfs in the recovery partition. This is because
108 # the recovery partition which is rootfs does not support xattr and thus labeling can't be
109 # done at build-time. All files are by default labeled as rootfs upon booting.
111 allow kernel rootfs:file execute;
126 # ever execute a program outside the rootfs without changing to another domain.
H A Dmodprobe.te8 allow modprobe rootfs:system module_load;
9 allow modprobe rootfs:file r_file_perms;
/aosp12/system/sepolicy/prebuilts/api/28.0/public/
H A Dmodprobe.te7 allow modprobe rootfs:system module_load;
8 allow modprobe rootfs:file r_file_perms;
/aosp12/system/sepolicy/prebuilts/api/26.0/public/
H A Dmodprobe.te7 allow modprobe rootfs:system module_load;
8 allow modprobe rootfs:file r_file_perms;
/aosp12/system/sepolicy/prebuilts/api/27.0/public/
H A Dmodprobe.te7 allow modprobe rootfs:system module_load;
8 allow modprobe rootfs:file r_file_perms;
/aosp12/build/make/target/board/generic_arm64/sepolicy/
H A Dfile_contexts5 /tombstones u:object_r:rootfs:s0
6 /dsp u:object_r:rootfs:s0

12345678910>>...13