Home
last modified time | relevance | path

Searched refs:symlinks (Results 1 – 25 of 40) sorted by relevance

12

/system/sepolicy/private/
Ddexoptanalyzer.te23 # Read symlinks in /data/dalvik-cache. This is required for PIC mode boot
52 # Allow testing /data/user/0 which symlinks to /data/data
Dbpfdomain.te17 # and thus any created symlinks end up as 'fs_bpf:lnk_type',
Dhal_health.te16 # Allow to read files under /sys/class/power_supply. Implementations typically have symlinks
Dotapreopt_slot.te15 # (du follows symlinks)
Dsystem_suspend.te19 # To resolve arbitrary sysfs paths from /sys/class/wakeup/* symlinks.
Dartd.te92 # Allow symlinks for secondary dex files. This has be to restricted because
93 # symlinks can cause various security issues. We allow "privapp_data_file" just
94 # for GMS because so far we only see GMS using symlinks.
Dmls69 # For symlinks in app data files, require equivalence in order to manipulate or follow (read).
72 # But for priv_app_data_file, continue to use dominance for symlinks because dynamite relies on thi…
Dinstalld.te103 # and lib symlinks before the setfilecon call. May want to
106 # Also, allow read for lnk_file so that we can process symlinks within
164 # setting owner/mode, creating symlinks within them, and deleting them
Dephemeral_app.te27 # Follow priv-app symlinks. This is used for dynamite functionality.
Dpostinstall_dexopt.te61 # Write to /data/ota(/*). Create symlinks in /data/ota(/*)
Dvendor_init.te41 # Create and remove symlinks in /.
349 # Never read/follow symlinks created by shell or untrusted apps.
Ddex2oat.te93 # Create and read symlinks in /data/ota/dalvik-cache. This is required for PIC mode boot images,
Dzygote.te46 # Create symlinks in /data/dalvik-cache.
103 # Relabel dirs and symlinks in the app and sdk sandbox data isolation tmpfs mounts to their
/system/netd/netutils_wrappers/
DAndroid.bp21 symlinks: [
/system/core/toolbox/
DAndroid.bp58 symlinks: [
/system/logging/logcat/
DAndroid.bp67 symlinks: [
/system/core/init/
Ddevices.cpp396 std::vector<std::string> symlinks = {"/dev/block/mapper/" + partition}; in GetBlockDeviceSymlinks() local
398 symlinks.emplace_back("/dev/block/mapper/by-uuid/" + uuid); in GetBlockDeviceSymlinks()
400 return symlinks; in GetBlockDeviceSymlinks()
/system/sepolicy/microdroid/system/private/
Dzipfuse.te16 # allow access to /dev/vd* block device files and also access to the symlinks
Ddomain.te86 # To allow following symlinks at /system/bin/linker, /system/lib/libc.so, etc.
99 # /vendor/odm symlinks.
112 # read and stat any sysfs symlinks
417 # Do not mount on top of symlinks, fifos, or sockets.
457 # Minimize read access to shell-writable symlinks.
Dapexd.te47 # allow apexd to create symlinks in /apex
Dvendor_init.te10 # Create and remove symlinks in /.
/system/core/rootdir/
DAndroid.bp23 symlinks: [
/system/core/fs_mgr/
DAndroid.bp234 symlinks: [
/system/core/fs_mgr/libsnapshot/snapuserd/
DAndroid.bp187 symlinks: ["snapuserd"],
/system/libziparchive/
DAndroid.bp247 symlinks: [

12