Searched refs:symlinks (Results 1 – 25 of 40) sorted by relevance
12
/system/sepolicy/private/ |
D | dexoptanalyzer.te | 23 # Read symlinks in /data/dalvik-cache. This is required for PIC mode boot 52 # Allow testing /data/user/0 which symlinks to /data/data
|
D | bpfdomain.te | 17 # and thus any created symlinks end up as 'fs_bpf:lnk_type',
|
D | hal_health.te | 16 # Allow to read files under /sys/class/power_supply. Implementations typically have symlinks
|
D | otapreopt_slot.te | 15 # (du follows symlinks)
|
D | system_suspend.te | 19 # To resolve arbitrary sysfs paths from /sys/class/wakeup/* symlinks.
|
D | artd.te | 92 # Allow symlinks for secondary dex files. This has be to restricted because 93 # symlinks can cause various security issues. We allow "privapp_data_file" just 94 # for GMS because so far we only see GMS using symlinks.
|
D | mls | 69 # For symlinks in app data files, require equivalence in order to manipulate or follow (read). 72 # But for priv_app_data_file, continue to use dominance for symlinks because dynamite relies on thi…
|
D | installd.te | 103 # and lib symlinks before the setfilecon call. May want to 106 # Also, allow read for lnk_file so that we can process symlinks within 164 # setting owner/mode, creating symlinks within them, and deleting them
|
D | ephemeral_app.te | 27 # Follow priv-app symlinks. This is used for dynamite functionality.
|
D | postinstall_dexopt.te | 61 # Write to /data/ota(/*). Create symlinks in /data/ota(/*)
|
D | vendor_init.te | 41 # Create and remove symlinks in /. 349 # Never read/follow symlinks created by shell or untrusted apps.
|
D | dex2oat.te | 93 # Create and read symlinks in /data/ota/dalvik-cache. This is required for PIC mode boot images,
|
D | zygote.te | 46 # Create symlinks in /data/dalvik-cache. 103 # Relabel dirs and symlinks in the app and sdk sandbox data isolation tmpfs mounts to their
|
/system/netd/netutils_wrappers/ |
D | Android.bp | 21 symlinks: [
|
/system/core/toolbox/ |
D | Android.bp | 58 symlinks: [
|
/system/logging/logcat/ |
D | Android.bp | 67 symlinks: [
|
/system/core/init/ |
D | devices.cpp | 396 std::vector<std::string> symlinks = {"/dev/block/mapper/" + partition}; in GetBlockDeviceSymlinks() local 398 symlinks.emplace_back("/dev/block/mapper/by-uuid/" + uuid); in GetBlockDeviceSymlinks() 400 return symlinks; in GetBlockDeviceSymlinks()
|
/system/sepolicy/microdroid/system/private/ |
D | zipfuse.te | 16 # allow access to /dev/vd* block device files and also access to the symlinks
|
D | domain.te | 86 # To allow following symlinks at /system/bin/linker, /system/lib/libc.so, etc. 99 # /vendor/odm symlinks. 112 # read and stat any sysfs symlinks 417 # Do not mount on top of symlinks, fifos, or sockets. 457 # Minimize read access to shell-writable symlinks.
|
D | apexd.te | 47 # allow apexd to create symlinks in /apex
|
D | vendor_init.te | 10 # Create and remove symlinks in /.
|
/system/core/rootdir/ |
D | Android.bp | 23 symlinks: [
|
/system/core/fs_mgr/ |
D | Android.bp | 234 symlinks: [
|
/system/core/fs_mgr/libsnapshot/snapuserd/ |
D | Android.bp | 187 symlinks: ["snapuserd"],
|
/system/libziparchive/ |
D | Android.bp | 247 symlinks: [
|
12