Home
last modified time | relevance | path

Searched full:kernel (Results 1 – 25 of 1308) sorted by relevance

12345678910>>...53

/system/sepolicy/prebuilts/api/202504/private/
Dkernel.te1 typeattribute kernel coredomain;
3 domain_auto_trans(kernel, init_exec, init)
4 domain_auto_trans(kernel, snapuserd_exec, snapuserd)
6 domain_auto_trans(kernel, overlay_remounter_exec, overlay_remounter)
9 # Allow the kernel to read otapreopt_chroot's file descriptors and files under
11 allow kernel otapreopt_chroot:fd use;
12 allow kernel postinstall_file:file read;
17 # enabling enforcement, eg, in permissive mode while still in the kernel
19 allow kernel tmpfs:blk_file { getattr relabelfrom };
20 allow kernel tmpfs:chr_file { getattr relabelfrom };
[all …]
Dgenfs_contexts49 genfscon proc /sys/kernel/bpf_ u:object_r:proc_bpf:s0
50 genfscon proc /sys/kernel/core_pattern u:object_r:usermodehelper:s0
51 genfscon proc /sys/kernel/core_pipe_limit u:object_r:usermodehelper:s0
52 genfscon proc /sys/kernel/domainname u:object_r:proc_hostname:s0
53 genfscon proc /sys/kernel/dmesg_restrict u:object_r:proc_security:s0
54 genfscon proc /sys/kernel/hostname u:object_r:proc_hostname:s0
55 genfscon proc /sys/kernel/hotplug u:object_r:usermodehelper:s0
56 genfscon proc /sys/kernel/hung_task_ u:object_r:proc_hung_task:s0
57 genfscon proc /sys/kernel/kptr_restrict u:object_r:proc_security:s0
58 genfscon proc /sys/kernel/modprobe u:object_r:usermodehelper:s0
[all …]
/system/sepolicy/private/
Dkernel.te1 typeattribute kernel coredomain;
3 domain_auto_trans(kernel, init_exec, init)
4 domain_auto_trans(kernel, snapuserd_exec, snapuserd)
6 domain_auto_trans(kernel, overlay_remounter_exec, overlay_remounter)
9 # Allow the kernel to read otapreopt_chroot's file descriptors and files under
11 allow kernel otapreopt_chroot:fd use;
12 allow kernel postinstall_file:file read;
17 # enabling enforcement, eg, in permissive mode while still in the kernel
19 allow kernel tmpfs:blk_file { getattr relabelfrom };
20 allow kernel tmpfs:chr_file { getattr relabelfrom };
[all …]
Dgenfs_contexts49 genfscon proc /sys/kernel/bpf_ u:object_r:proc_bpf:s0
50 genfscon proc /sys/kernel/core_pattern u:object_r:usermodehelper:s0
51 genfscon proc /sys/kernel/core_pipe_limit u:object_r:usermodehelper:s0
52 genfscon proc /sys/kernel/domainname u:object_r:proc_hostname:s0
53 genfscon proc /sys/kernel/dmesg_restrict u:object_r:proc_security:s0
54 genfscon proc /sys/kernel/hostname u:object_r:proc_hostname:s0
55 genfscon proc /sys/kernel/hotplug u:object_r:usermodehelper:s0
56 genfscon proc /sys/kernel/hung_task_ u:object_r:proc_hung_task:s0
57 genfscon proc /sys/kernel/kptr_restrict u:object_r:proc_security:s0
58 genfscon proc /sys/kernel/modprobe u:object_r:usermodehelper:s0
[all …]
/system/sepolicy/prebuilts/api/34.0/private/
Dkernel.te1 typeattribute kernel coredomain;
3 domain_auto_trans(kernel, init_exec, init)
4 domain_auto_trans(kernel, snapuserd_exec, snapuserd)
6 # Allow the kernel to read otapreopt_chroot's file descriptors and files under
8 allow kernel otapreopt_chroot:fd use;
9 allow kernel postinstall_file:file read;
14 # enabling enforcement, eg, in permissive mode while still in the kernel
16 allow kernel tmpfs:blk_file { getattr relabelfrom };
17 allow kernel tmpfs:chr_file { getattr relabelfrom };
18 allow kernel tmpfs:lnk_file { getattr relabelfrom };
[all …]
/system/sepolicy/prebuilts/api/33.0/private/
Dkernel.te1 typeattribute kernel coredomain;
3 domain_auto_trans(kernel, init_exec, init)
4 domain_auto_trans(kernel, snapuserd_exec, snapuserd)
6 # Allow the kernel to read otapreopt_chroot's file descriptors and files under
8 allow kernel otapreopt_chroot:fd use;
9 allow kernel postinstall_file:file read;
14 # enabling enforcement, eg, in permissive mode while still in the kernel
16 allow kernel tmpfs:blk_file { getattr relabelfrom };
17 allow kernel tmpfs:chr_file { getattr relabelfrom };
18 allow kernel tmpfs:lnk_file { getattr relabelfrom };
[all …]
/system/sepolicy/prebuilts/api/202404/private/
Dkernel.te1 typeattribute kernel coredomain;
3 domain_auto_trans(kernel, init_exec, init)
4 domain_auto_trans(kernel, snapuserd_exec, snapuserd)
6 # Allow the kernel to read otapreopt_chroot's file descriptors and files under
8 allow kernel otapreopt_chroot:fd use;
9 allow kernel postinstall_file:file read;
14 # enabling enforcement, eg, in permissive mode while still in the kernel
16 allow kernel tmpfs:blk_file { getattr relabelfrom };
17 allow kernel tmpfs:chr_file { getattr relabelfrom };
18 allow kernel tmpfs:lnk_file { getattr relabelfrom };
[all …]
/system/sepolicy/prebuilts/api/29.0/public/
Dkernel.te1 # Life begins with the kernel.
2 type kernel, domain, mlstrustedsubject; type
4 allow kernel self:global_capability_class_set sys_nice;
7 r_dir_file(kernel, rootfs)
8 allow kernel proc_cmdline:file r_file_perms;
11 allow kernel selinuxfs:dir r_dir_perms;
12 allow kernel selinuxfs:file r_file_perms;
15 allow kernel file_contexts_file:file r_file_perms;
18 allow kernel rootfs:file relabelfrom;
19 allow kernel init_exec:file relabelto;
[all …]
/system/sepolicy/microdroid/system/private/
Dkernel.te1 typeattribute kernel coredomain;
3 domain_auto_trans(kernel, init_exec, init)
8 # enabling enforcement, eg, in permissive mode while still in the kernel
10 allow kernel tmpfs:blk_file { getattr relabelfrom };
11 allow kernel tmpfs:chr_file { getattr relabelfrom };
12 allow kernel tmpfs:lnk_file { getattr relabelfrom };
13 allow kernel tmpfs:dir { open read relabelfrom };
15 allow kernel block_device:blk_file relabelto;
16 allow kernel block_device:lnk_file relabelto;
17 allow kernel dm_device:chr_file relabelto;
[all …]
/system/sepolicy/prebuilts/api/34.0/public/
Dkernel.te1 # Life begins with the kernel.
2 type kernel, domain, mlstrustedsubject; type
4 allow kernel self:global_capability_class_set sys_nice;
7 r_dir_file(kernel, rootfs)
10 allow kernel {
16 allow kernel selinuxfs:dir r_dir_perms;
17 allow kernel selinuxfs:file r_file_perms;
20 allow kernel file_contexts_file:file r_file_perms;
23 allow kernel rootfs:file relabelfrom;
24 allow kernel init_exec:file relabelto;
[all …]
/system/sepolicy/prebuilts/api/202404/public/
Dkernel.te1 # Life begins with the kernel.
2 type kernel, domain, mlstrustedsubject; type
4 allow kernel self:global_capability_class_set sys_nice;
7 r_dir_file(kernel, rootfs)
10 allow kernel {
16 allow kernel selinuxfs:dir r_dir_perms;
17 allow kernel selinuxfs:file r_file_perms;
20 allow kernel file_contexts_file:file r_file_perms;
23 allow kernel rootfs:file relabelfrom;
24 allow kernel init_exec:file relabelto;
[all …]
/system/sepolicy/prebuilts/api/33.0/public/
Dkernel.te1 # Life begins with the kernel.
2 type kernel, domain, mlstrustedsubject; type
4 allow kernel self:global_capability_class_set sys_nice;
7 r_dir_file(kernel, rootfs)
10 allow kernel {
16 allow kernel selinuxfs:dir r_dir_perms;
17 allow kernel selinuxfs:file r_file_perms;
20 allow kernel file_contexts_file:file r_file_perms;
23 allow kernel rootfs:file relabelfrom;
24 allow kernel init_exec:file relabelto;
[all …]
/system/sepolicy/prebuilts/api/32.0/public/
Dkernel.te1 # Life begins with the kernel.
2 type kernel, domain, mlstrustedsubject; type
4 allow kernel self:global_capability_class_set sys_nice;
7 r_dir_file(kernel, rootfs)
10 allow kernel {
16 allow kernel selinuxfs:dir r_dir_perms;
17 allow kernel selinuxfs:file r_file_perms;
20 allow kernel file_contexts_file:file r_file_perms;
23 allow kernel rootfs:file relabelfrom;
24 allow kernel init_exec:file relabelto;
[all …]
/system/sepolicy/prebuilts/api/30.0/public/
Dkernel.te1 # Life begins with the kernel.
2 type kernel, domain, mlstrustedsubject; type
4 allow kernel self:global_capability_class_set sys_nice;
7 r_dir_file(kernel, rootfs)
8 allow kernel proc_cmdline:file r_file_perms;
11 allow kernel selinuxfs:dir r_dir_perms;
12 allow kernel selinuxfs:file r_file_perms;
15 allow kernel file_contexts_file:file r_file_perms;
18 allow kernel rootfs:file relabelfrom;
19 allow kernel init_exec:file relabelto;
[all …]
/system/sepolicy/prebuilts/api/31.0/public/
Dkernel.te1 # Life begins with the kernel.
2 type kernel, domain, mlstrustedsubject; type
4 allow kernel self:global_capability_class_set sys_nice;
7 r_dir_file(kernel, rootfs)
10 allow kernel {
16 allow kernel selinuxfs:dir r_dir_perms;
17 allow kernel selinuxfs:file r_file_perms;
20 allow kernel file_contexts_file:file r_file_perms;
23 allow kernel rootfs:file relabelfrom;
24 allow kernel init_exec:file relabelto;
[all …]
/system/sepolicy/prebuilts/api/31.0/private/
Dkernel.te1 typeattribute kernel coredomain;
3 domain_auto_trans(kernel, init_exec, init)
4 domain_auto_trans(kernel, snapuserd_exec, snapuserd)
6 # Allow the kernel to read otapreopt_chroot's file descriptors and files under
8 allow kernel otapreopt_chroot:fd use;
9 allow kernel postinstall_file:file read;
14 # enabling enforcement, eg, in permissive mode while still in the kernel
16 allow kernel tmpfs:blk_file { getattr relabelfrom };
17 allow kernel tmpfs:chr_file { getattr relabelfrom };
18 allow kernel tmpfs:lnk_file { getattr relabelfrom };
[all …]
/system/sepolicy/prebuilts/api/32.0/private/
Dkernel.te1 typeattribute kernel coredomain;
3 domain_auto_trans(kernel, init_exec, init)
4 domain_auto_trans(kernel, snapuserd_exec, snapuserd)
6 # Allow the kernel to read otapreopt_chroot's file descriptors and files under
8 allow kernel otapreopt_chroot:fd use;
9 allow kernel postinstall_file:file read;
14 # enabling enforcement, eg, in permissive mode while still in the kernel
16 allow kernel tmpfs:blk_file { getattr relabelfrom };
17 allow kernel tmpfs:chr_file { getattr relabelfrom };
18 allow kernel tmpfs:lnk_file { getattr relabelfrom };
[all …]
/system/extras/simpleperf/testdata/
Dperf_with_jit_symbol.foldedstack_addrs2 …inActivity$1.run;[kernel.kallsyms][+ffffff93eb483f36];[kernel.kallsyms][+ffffff93eb481f72];[kernel
4kernel.kallsyms][+ffffff93eb483f36];[kernel.kallsyms][+ffffff93eb481f72];[kernel.kallsyms][+ffffff…
5kernel.kallsyms][+ffffff93eb483f36];[kernel.kallsyms][+ffffff93eb481f72];[kernel.kallsyms][+ffffff…
7 …::Object>, long, int, bool, art::ThreadState);syscall;[kernel.kallsyms][+ffffff93eb484126];[kernel
8 …adState);syscall;[kernel.kallsyms][+ffffff93eb484156];[kernel.kallsyms][+ffffff93eb64c252];[kernel
9kernel.kallsyms][+ffffff93eb484156];[kernel.kallsyms][+ffffff93eb64c252];[kernel.kallsyms][+ffffff…
10kernel.kallsyms][+ffffff93eb484156];[kernel.kallsyms][+ffffff93eb64c252];[kernel.kallsyms][+ffffff…
/system/libvintf/
DKernelInfo.cpp43 ss << "Kernel config errors:"; in matchKernelConfigs()
87 // Check matrix kernel level in getMatchedKernelRequirements()
89 // Use legacy behavior when kernel FCM version is not specified. Blindly add all of them in getMatchedKernelRequirements()
107 // matrix level >= kernel level in getMatchedKernelRequirements()
109 // for kernel level >= S, do not allow matrix level > kernel level; i.e. only check in getMatchedKernelRequirements()
121 ss << "No kernel entry found for kernel version " << mVersion.dropMinor() in getMatchedKernelRequirements()
122 << " at kernel FCM version " in getMatchedKernelRequirements()
124 << ". The following kernel requirements are checked:"; in getMatchedKernelRequirements()
127 << ", kernel FCM version: " << matrixKernel.getSourceMatrixLevel() in getMatchedKernelRequirements()
135 // At this point, kernelsForLevel contains kernel requirements for each level. in getMatchedKernelRequirements()
[all …]
/system/extras/simpleperf/scripts/test/script_testdata/
Dperf_with_interpreter_frames.gecko.json17 "name": "Kernel",
4269 "[kernel.kallsyms][+ffffffc000086b4a] (in [kernel.kallsyms])",
4270 "[kernel.kallsyms][+ffffffc0001fb826] (in [kernel.kallsyms])",
4271 "[kernel.kallsyms][+ffffffc0001fb51a] (in [kernel.kallsyms])",
4272 "[kernel.kallsyms][+ffffffc0009898ce] (in [kernel.kallsyms])",
4273 "[kernel.kallsyms][+ffffffc000989206] (in [kernel.kallsyms])",
4274 "[kernel.kallsyms][+ffffffc0009843ba] (in [kernel.kallsyms])",
4275 "[kernel.kallsyms][+ffffffc000fe8782] (in [kernel.kallsyms])",
4276 "[kernel.kallsyms][+ffffffc000fe826a] (in [kernel.kallsyms])",
4277 "[kernel.kallsyms][+ffffffc0000d7e12] (in [kernel.kallsyms])",
[all …]
Dperf_with_jit_symbol.gecko.json17 "name": "Kernel",
1457 "[kernel.kallsyms][+ffffff93eb484156] (in [kernel.kallsyms])",
1458 "[kernel.kallsyms][+ffffff93eb64c252] (in [kernel.kallsyms])",
1459 "[kernel.kallsyms][+ffffff93eb645bee] (in [kernel.kallsyms])",
1460 "[kernel.kallsyms][+ffffff93eb647ffa] (in [kernel.kallsyms])",
1461 "[kernel.kallsyms][+ffffff93eb64ab86] (in [kernel.kallsyms])",
1462 "[kernel.kallsyms][+ffffff93ed05e93e] (in [kernel.kallsyms])",
1463 "[kernel.kallsyms][+ffffff93eb58b094] (in [kernel.kallsyms])",
1464 "[kernel.kallsyms][+ffffff93eb483f36] (in [kernel.kallsyms])",
1465 "[kernel.kallsyms][+ffffff93eb481f72] (in [kernel.kallsyms])",
[all …]
/system/connectivity/wificond/net/kernel-header-latest/
DREADME.txt3 This folder contains any wifi kernel header updates to the kernels running on
4 the latest devices, but not present in external/kernel-headers.
5 external/kernel-headers has the headers from the stable kernel tree which is generally
9 cp <kernel-dir>/aosp/include/uapi/linux/nl80211.h
10 <android-source-dir>/system/connectivity/wificond/net/kernel-header-latest/nl80211.h
12 Last update from kernel branch: `android14-linux-6.1-XX`
/system/bpf/include/vmlinux/
DREADME5 …create the infrastructure to periodically update this to a version with the latest tracking kernel.
7 …cess internal kernel data structures. They do not need to track the target kernel perfectly, but i…
9 … problem for arm64 or x86_64 architectures, as the 64bit system userspace matches the 64bit kernel.
11 …ld time if the kernel we will be running on will be 32bit or 64bit. For this reason, we default to…
/system/sepolicy/prebuilts/api/30.0/private/
Dfsverity_init.te9 # Kernel only prints the keys that can be accessed and only kernel keyring is needed here.
12 allow fsverity_init kernel:key { view search write setattr };
18 # When kernel requests an algorithm, the crypto API first looks for an
19 # already registered algorithm with that name. If it fails, the kernel creates
21 dontaudit fsverity_init kernel:system module_request;
Dkernel.te1 typeattribute kernel coredomain;
3 domain_auto_trans(kernel, init_exec, init)
5 # Allow the kernel to read otapreopt_chroot's file descriptors and files under
7 allow kernel otapreopt_chroot:fd use;
8 allow kernel postinstall_file:file read;

12345678910>>...53