Home
last modified time | relevance | path

Searched refs:dev_type (Results 1 – 25 of 49) sorted by relevance

12

/system/sepolicy/public/
Ddevice.te2 type device, dev_type, fs_type;
3 type ashmem_device, dev_type, mlstrustedobject;
4 type ashmem_libcutils_device, dev_type, mlstrustedobject;
5 type audio_device, dev_type;
6 type binder_device, dev_type, mlstrustedobject;
7 type hwbinder_device, dev_type, mlstrustedobject, isolated_compute_allowed_device;
8 type vndbinder_device, dev_type;
9 type block_device, dev_type;
10 type bt_device, dev_type;
11 type camera_device, dev_type;
[all …]
Dtee.te7 type tee_device, dev_type;
/system/sepolicy/microdroid/system/public/
Ddevice.te1 type block_device, dev_type;
2 type console_device, dev_type;
3 type device, dev_type, fs_type;
4 type dm_device, dev_type;
5 type dm_user_device, dev_type;
6 type fuse_device, dev_type;
7 type hw_random_device, dev_type;
8 type kmsg_debug_device, dev_type;
9 type kmsg_device, dev_type;
10 type loop_control_device, dev_type;
[all …]
/system/core/trusty/storage/proxy/
Drpmb.h23 enum dev_type { UNKNOWN_RPMB, MMC_RPMB, VIRT_RPMB, UFS_RPMB, SOCK_RPMB }; enum
25 int rpmb_open(const char* rpmb_devname, enum dev_type dev_type);
Dproxy.c46 static enum dev_type dev_type = MMC_RPMB; variable
51 static enum dev_type parse_dev_type(const char* dev_type_name) { in parse_dev_type()
255 dev_type = parse_dev_type(optarg); in parse_args()
256 if (dev_type == UNKNOWN_RPMB) { in parse_args()
326 rc = rpmb_open(rpmb_devname, dev_type); in main()
Drpmb.c117 static enum dev_type dev_type = UNKNOWN_RPMB; variable
543 if (dev_type == MMC_RPMB) { in rpmb_send()
549 } else if (dev_type == UFS_RPMB) { in rpmb_send()
556 } else if ((dev_type == VIRT_RPMB) || (dev_type == SOCK_RPMB)) { in rpmb_send()
594 int rpmb_open(const char* rpmb_devname, enum dev_type open_dev_type) { in rpmb_open()
596 dev_type = open_dev_type; in rpmb_open()
598 if (dev_type != SOCK_RPMB) { in rpmb_open()
607 if (dev_type == UFS_RPMB) { in rpmb_open()
/system/sepolicy/private/
Dueventd.te23 allow ueventd dev_type:dir create_dir_perms;
24 allow ueventd dev_type:lnk_file { create unlink };
25 allow ueventd dev_type:chr_file { getattr create setattr unlink };
26 allow ueventd dev_type:blk_file { getattr relabelfrom relabelto create setattr unlink };
83 neverallow ueventd dev_type:blk_file ~{ getattr relabelfrom relabelto create setattr unlink };
Drecovery_refresh.te15 neverallow recovery_refresh dev_type:blk_file { read write };
Dfsck.te35 allowxperm fsck dev_type:blk_file ioctl {
50 allow fsck dev_type:blk_file getattr;
De2fs.te3 allow e2fs dev_type:blk_file getattr;
Drecovery_persist.te22 neverallow recovery_persist dev_type:blk_file { read write };
Dvendor_init.te24 dev_type
179 allow vendor_init dev_type:dir create_dir_perms;
180 allow vendor_init dev_type:lnk_file create;
214 allow vendor_init dev_type:blk_file getattr;
Dlogpersist.te38 neverallow logpersist dev_type:blk_file { read write };
/system/sepolicy/microdroid/system/private/
Dueventd.te22 allow ueventd dev_type:dir create_dir_perms;
23 allow ueventd dev_type:lnk_file { create unlink };
24 allow ueventd dev_type:chr_file { getattr create setattr unlink };
25 allow ueventd dev_type:blk_file { getattr relabelfrom relabelto create setattr unlink };
Dvendor_init.te80 allow vendor_init dev_type:dir create_dir_perms;
81 allow vendor_init dev_type:lnk_file create;
108 allow vendor_init dev_type:blk_file getattr;
142 dev_type
Dshell.te89 allow shell dev_type:dir r_dir_perms;
90 allow shell dev_type:chr_file getattr;
94 allow shell dev_type:blk_file getattr;
Dfile.te5 allow dev_type tmpfs:filesystem associate;
Dsu.te21 dontaudit su {fs_type dev_type file_type}:dir_file_class_set *;
Dapexd.te20 allow apexd dev_type:dir r_dir_perms;
21 allow apexd dev_type:blk_file getattr;
Dinit.te28 dev_type
130 allow init dev_type:blk_file r_file_perms;
131 allowxperm init dev_type:blk_file ioctl BLKROSET;
215 allow init dev_type:dir create_dir_perms;
216 allow init dev_type:lnk_file create;
Dtraced_probes.te41 neverallow traced_probes dev_type:blk_file { read write };
Dcrash_dump.te47 dontaudit crash_dump { devpts dev_type }:chr_file { read write };
Dperfetto.te56 neverallow perfetto dev_type:blk_file { read write };
/system/sepolicy/vendor/
Dhal_rebootescrow_default.te8 type rebootescrow_device, dev_type;
/system/sepolicy/private/compat/34.0/
D34.0.compat.cil14 (typeattributeset dev_type (vendor_hidraw_device))

12